1 Filename: 000-index.txt
2 Title: Index of Tor Proposals
11 This document provides an index to Tor proposals.
13 This is an informational document.
15 Everything in this document below the line of '=' signs is automatically
16 generated by reindex.py; do not edit by hand.
18 ============================================================
21 000 Index of Tor Proposals [META]
22 001 The Tor Proposal Process [META]
23 098 Proposals that should be written [META]
24 099 Miscellaneous proposals [META]
25 100 Tor Unreliable Datagram Extension Proposal [DEAD]
26 101 Voting on the Tor Directory System [CLOSED]
27 102 Dropping "opt" from the directory format [CLOSED]
28 103 Splitting identity key from regularly used signing key [CLOSED]
29 104 Long and Short Router Descriptors [CLOSED]
30 105 Version negotiation for the Tor protocol [CLOSED]
31 106 Checking fewer things during TLS handshakes [CLOSED]
32 107 Uptime Sanity Checking [CLOSED]
33 108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
34 109 No more than one server per IP address [CLOSED]
35 110 Avoiding infinite length circuits [ACCEPTED]
36 111 Prioritizing local traffic over relayed traffic [CLOSED]
37 112 Bring Back Pathlen Coin Weight [SUPERSEDED]
38 113 Simplifying directory authority administration [SUPERSEDED]
39 114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
40 115 Two Hop Paths [DEAD]
41 116 Two hop paths from entry guards [DEAD]
42 117 IPv6 exits [ACCEPTED]
43 118 Advertising multiple ORPorts at once [ACCEPTED]
44 119 New PROTOCOLINFO command for controllers [CLOSED]
45 120 Shutdown descriptors when Tor servers stop [DEAD]
46 121 Hidden Service Authentication [FINISHED]
47 122 Network status entries need a new Unnamed flag [CLOSED]
48 123 Naming authorities automatically create bindings [CLOSED]
49 124 Blocking resistant TLS certificate usage [SUPERSEDED]
50 125 Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
51 126 Getting GeoIP data and publishing usage summaries [CLOSED]
52 127 Relaying dirport requests to Tor download site / website [DRAFT]
53 128 Families of private bridges [FINISHED]
54 129 Block Insecure Protocols by Default [CLOSED]
55 130 Version 2 Tor connection protocol [CLOSED]
56 131 Help users to verify they are using Tor [NEEDS-REVISION]
57 132 A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
58 133 Incorporate Unreachable ORs into the Tor Network [DRAFT]
59 134 More robust consensus voting with diverse authority sets [ACCEPTED]
60 135 Simplify Configuration of Private Tor Networks [CLOSED]
61 136 Mass authority migration with legacy keys [CLOSED]
62 137 Keep controllers informed as Tor bootstraps [CLOSED]
63 138 Remove routers that are not Running from consensus documents [CLOSED]
64 139 Download consensus documents only when it will be trusted [CLOSED]
65 140 Provide diffs between consensuses [ACCEPTED]
66 141 Download server descriptors on demand [DRAFT]
67 142 Combine Introduction and Rendezvous Points [DEAD]
68 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
69 144 Increase the diversity of circuits by detecting nodes belonging the same provider [DRAFT]
70 145 Separate "suitable as a guard" from "suitable as a new guard" [OPEN]
71 146 Add new flag to reflect long-term stability [OPEN]
72 147 Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
73 148 Stream end reasons from the client side should be uniform [ACCEPTED]
74 149 Using data from NETINFO cells [OPEN]
75 150 Exclude Exit Nodes from a circuit [CLOSED]
76 151 Improving Tor Path Selection [DRAFT]
77 152 Optionally allow exit from single-hop circuits [CLOSED]
78 153 Automatic software update protocol [SUPERSEDED]
79 154 Automatic Software Update Protocol [SUPERSEDED]
80 155 Four Improvements of Hidden Service Performance [FINISHED]
81 156 Tracking blocked ports on the client side [OPEN]
82 157 Make certificate downloads specific [OPEN]
88 127 Relaying dirport requests to Tor download site / website
89 132 A Tor Web Service For Verifying Correct Browser Configuration
90 133 Incorporate Unreachable ORs into the Tor Network
91 141 Download server descriptors on demand
92 144 Increase the diversity of circuits by detecting nodes belonging the same provider
93 151 Improving Tor Path Selection
95 131 Help users to verify they are using Tor
97 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [for 0.2.1.x]
98 145 Separate "suitable as a guard" from "suitable as a new guard" [for 0.2.1.x]
99 146 Add new flag to reflect long-term stability [for 0.2.1.x]
100 149 Using data from NETINFO cells [for 0.2.1.x]
101 156 Tracking blocked ports on the client side [for 0.2.?]
102 157 Make certificate downloads specific [for 0.2.1.x]
104 110 Avoiding infinite length circuits [for 0.2.1.x] [in 0.2.1.3-alpha]
105 117 IPv6 exits [for 0.2.1.x]
106 118 Advertising multiple ORPorts at once [for 0.2.1.x]
107 134 More robust consensus voting with diverse authority sets [for 0.2.1.x]
108 140 Provide diffs between consensuses [for 0.2.1.x]
109 147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.1.x]
110 148 Stream end reasons from the client side should be uniform [for 0.2.1.x]
112 000 Index of Tor Proposals
113 001 The Tor Proposal Process
114 098 Proposals that should be written
115 099 Miscellaneous proposals
117 121 Hidden Service Authentication [in 0.2.1.x]
118 128 Families of private bridges [in 0.2.0.x]
119 155 Four Improvements of Hidden Service Performance [in 0.2.1.x]
121 101 Voting on the Tor Directory System [in 0.2.0.x]
122 102 Dropping "opt" from the directory format [in 0.2.0.x]
123 103 Splitting identity key from regularly used signing key [in 0.2.0.x]
124 104 Long and Short Router Descriptors [in 0.2.0.x]
125 105 Version negotiation for the Tor protocol [in 0.2.0.x]
126 106 Checking fewer things during TLS handshakes [in 0.2.0.x]
127 107 Uptime Sanity Checking [in 0.2.0.x]
128 108 Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
129 109 No more than one server per IP address [in 0.2.0.x]
130 111 Prioritizing local traffic over relayed traffic [in 0.2.0.x]
131 114 Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
132 119 New PROTOCOLINFO command for controllers [in 0.2.0.x]
133 122 Network status entries need a new Unnamed flag [in 0.2.0.x]
134 123 Naming authorities automatically create bindings [in 0.2.0.x]
135 125 Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
136 126 Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
137 129 Block Insecure Protocols by Default [in 0.2.0.x]
138 130 Version 2 Tor connection protocol [in 0.2.0.x]
139 135 Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
140 136 Mass authority migration with legacy keys [in 0.2.0.x]
141 137 Keep controllers informed as Tor bootstraps [in 0.2.1.x]
142 138 Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
143 139 Download consensus documents only when it will be trusted [in 0.2.1.x]
144 150 Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
145 152 Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
147 112 Bring Back Pathlen Coin Weight
148 113 Simplifying directory authority administration
149 124 Blocking resistant TLS certificate usage
150 153 Automatic software update protocol
151 154 Automatic Software Update Protocol
153 100 Tor Unreliable Datagram Extension Proposal
155 116 Two hop paths from entry guards
156 120 Shutdown descriptors when Tor servers stop
157 142 Combine Introduction and Rendezvous Points