1 Filename: 000-index.txt
2 Title: Index of Tor Proposals
9 This document provides an index to Tor proposals.
11 This is an informational document.
13 Everything in this document below the line of '=' signs is automatically
14 generated by reindex.py; do not edit by hand.
16 ============================================================
19 000 Index of Tor Proposals [META]
20 001 The Tor Proposal Process [META]
21 098 Proposals that should be written [META]
22 099 Miscellaneous proposals [META]
23 100 Tor Unreliable Datagram Extension Proposal [DEAD]
24 101 Voting on the Tor Directory System [CLOSED]
25 102 Dropping "opt" from the directory format [CLOSED]
26 103 Splitting identity key from regularly used signing key [CLOSED]
27 104 Long and Short Router Descriptors [CLOSED]
28 105 Version negotiation for the Tor protocol [CLOSED]
29 106 Checking fewer things during TLS handshakes [CLOSED]
30 107 Uptime Sanity Checking [CLOSED]
31 108 Base "Stable" Flag on Mean Time Between Failures [CLOSED]
32 109 No more than one server per IP address [CLOSED]
33 110 Avoiding infinite length circuits [ACCEPTED]
34 111 Prioritizing local traffic over relayed traffic [CLOSED]
35 112 Bring Back Pathlen Coin Weight [SUPERSEDED]
36 113 Simplifying directory authority administration [SUPERSEDED]
37 114 Distributed Storage for Tor Hidden Service Descriptors [CLOSED]
38 115 Two Hop Paths [DEAD]
39 116 Two hop paths from entry guards [DEAD]
40 117 IPv6 exits [ACCEPTED]
41 118 Advertising multiple ORPorts at once [SUPERSEDED]
42 119 New PROTOCOLINFO command for controllers [CLOSED]
43 120 Shutdown descriptors when Tor servers stop [DEAD]
44 121 Hidden Service Authentication [FINISHED]
45 122 Network status entries need a new Unnamed flag [CLOSED]
46 123 Naming authorities automatically create bindings [CLOSED]
47 124 Blocking resistant TLS certificate usage [SUPERSEDED]
48 125 Behavior for bridge users, bridge relays, and bridge authorities [CLOSED]
49 126 Getting GeoIP data and publishing usage summaries [CLOSED]
50 127 Relaying dirport requests to Tor download site / website [DRAFT]
51 128 Families of private bridges [DEAD]
52 129 Block Insecure Protocols by Default [CLOSED]
53 130 Version 2 Tor connection protocol [CLOSED]
54 131 Help users to verify they are using Tor [NEEDS-REVISION]
55 132 A Tor Web Service For Verifying Correct Browser Configuration [DRAFT]
56 133 Incorporate Unreachable ORs into the Tor Network [DRAFT]
57 134 More robust consensus voting with diverse authority sets [REJECTED]
58 135 Simplify Configuration of Private Tor Networks [CLOSED]
59 136 Mass authority migration with legacy keys [CLOSED]
60 137 Keep controllers informed as Tor bootstraps [CLOSED]
61 138 Remove routers that are not Running from consensus documents [CLOSED]
62 139 Download consensus documents only when it will be trusted [CLOSED]
63 140 Provide diffs between consensuses [ACCEPTED]
64 141 Download server descriptors on demand [DRAFT]
65 142 Combine Introduction and Rendezvous Points [DEAD]
66 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
67 144 Increase the diversity of circuits by detecting nodes belonging the same provider [DRAFT]
68 145 Separate "suitable as a guard" from "suitable as a new guard" [NEEDS-RESEARCH]
69 146 Add new flag to reflect long-term stability [NEEDS-RESEARCH]
70 147 Eliminate the need for v2 directories in generating v3 directories [ACCEPTED]
71 148 Stream end reasons from the client side should be uniform [CLOSED]
72 149 Using data from NETINFO cells [SUPERSEDED]
73 150 Exclude Exit Nodes from a circuit [CLOSED]
74 151 Improving Tor Path Selection [FINISHED]
75 152 Optionally allow exit from single-hop circuits [CLOSED]
76 153 Automatic software update protocol [SUPERSEDED]
77 154 Automatic Software Update Protocol [SUPERSEDED]
78 155 Four Improvements of Hidden Service Performance [FINISHED]
79 156 Tracking blocked ports on the client side [OPEN]
80 157 Make certificate downloads specific [ACCEPTED]
81 158 Clients download consensus + microdescriptors [FINISHED]
82 159 Exit Scanning [OPEN]
83 160 Authorities vote for bandwidth offsets in consensus [FINISHED]
84 161 Computing Bandwidth Adjustments [FINISHED]
85 162 Publish the consensus in multiple flavors [FINISHED]
86 163 Detecting whether a connection comes from a client [SUPERSEDED]
87 164 Reporting the status of server votes [OPEN]
88 165 Easy migration for voting authority sets [OPEN]
89 166 Including Network Statistics in Extra-Info Documents [CLOSED]
90 167 Vote on network parameters in consensus [CLOSED]
91 168 Reduce default circuit window [OPEN]
92 169 Eliminate TLS renegotiation for the Tor connection handshake [SUPERSEDED]
93 170 Configuration options regarding circuit building [SUPERSEDED]
94 171 Separate streams across circuits by connection metadata [CLOSED]
95 172 GETINFO controller option for circuit information [ACCEPTED]
96 173 GETINFO Option Expansion [ACCEPTED]
97 174 Optimistic Data for Tor: Server Side [CLOSED]
98 175 Automatically promoting Tor clients to nodes [DRAFT]
99 176 Proposed version-3 link handshake for Tor [CLOSED]
100 177 Abstaining from votes on individual flags [OPEN]
101 178 Require majority of authorities to vote for consensus parameters [OPEN]
102 179 TLS certificate and parameter normalization [DRAFT]
103 180 Pluggable transports for circumvention [OPEN]
104 181 Optimistic Data for Tor: Client Side [CLOSED]
105 182 Credit Bucket [DRAFT]
106 183 Refill Intervals [CLOSED]
107 184 Miscellaneous changes for a v3 Tor link protocol [CLOSED]
108 185 Directory caches without DirPort [OPEN]
109 186 Multiple addresses for one OR or bridge [DRAFT]
110 187 Reserve a cell type to allow client authorization [OPEN]
111 188 Bridge Guards and other anti-enumeration defenses [OPEN]
117 127 Relaying dirport requests to Tor download site / website
118 132 A Tor Web Service For Verifying Correct Browser Configuration
119 133 Incorporate Unreachable ORs into the Tor Network
120 141 Download server descriptors on demand
121 144 Increase the diversity of circuits by detecting nodes belonging the same provider
122 175 Automatically promoting Tor clients to nodes
123 179 TLS certificate and parameter normalization [for 0.2.3.x]
125 186 Multiple addresses for one OR or bridge
127 131 Help users to verify they are using Tor
129 145 Separate "suitable as a guard" from "suitable as a new guard"
130 146 Add new flag to reflect long-term stability
132 143 Improvements of Distributed Storage for Tor Hidden Service Descriptors
133 156 Tracking blocked ports on the client side
135 164 Reporting the status of server votes
136 165 Easy migration for voting authority sets
137 168 Reduce default circuit window
138 177 Abstaining from votes on individual flags [for 0.2.3.x]
139 178 Require majority of authorities to vote for consensus parameters [for 0.2.3.x]
140 180 Pluggable transports for circumvention [for 0.2.3.x]
141 185 Directory caches without DirPort
142 187 Reserve a cell type to allow client authorization [for 0.2.3.x]
143 188 Bridge Guards and other anti-enumeration defenses
145 110 Avoiding infinite length circuits [for 0.2.3.x] [in 0.2.1.3-alpha]
146 117 IPv6 exits [for 0.2.3.x]
147 140 Provide diffs between consensuses
148 147 Eliminate the need for v2 directories in generating v3 directories [for 0.2.3.x]
149 157 Make certificate downloads specific [for 0.2.3.x]
150 172 GETINFO controller option for circuit information [for 0.2.3.x]
151 173 GETINFO Option Expansion [for 0.2.3.x]
153 000 Index of Tor Proposals
154 001 The Tor Proposal Process
155 098 Proposals that should be written
156 099 Miscellaneous proposals
158 121 Hidden Service Authentication [in 0.2.1.x]
159 151 Improving Tor Path Selection
160 155 Four Improvements of Hidden Service Performance [in 0.2.1.x]
161 158 Clients download consensus + microdescriptors [in 0.2.3.1-alpha]
162 160 Authorities vote for bandwidth offsets in consensus [for 0.2.1.x]
163 161 Computing Bandwidth Adjustments [for 0.2.1.x]
164 162 Publish the consensus in multiple flavors [in 0.2.3.1-alpha]
166 101 Voting on the Tor Directory System [in 0.2.0.x]
167 102 Dropping "opt" from the directory format [in 0.2.0.x]
168 103 Splitting identity key from regularly used signing key [in 0.2.0.x]
169 104 Long and Short Router Descriptors [in 0.2.0.x]
170 105 Version negotiation for the Tor protocol [in 0.2.0.x]
171 106 Checking fewer things during TLS handshakes [in 0.2.0.x]
172 107 Uptime Sanity Checking [in 0.2.0.x]
173 108 Base "Stable" Flag on Mean Time Between Failures [in 0.2.0.x]
174 109 No more than one server per IP address [in 0.2.0.x]
175 111 Prioritizing local traffic over relayed traffic [in 0.2.0.x]
176 114 Distributed Storage for Tor Hidden Service Descriptors [in 0.2.0.x]
177 119 New PROTOCOLINFO command for controllers [in 0.2.0.x]
178 122 Network status entries need a new Unnamed flag [in 0.2.0.x]
179 123 Naming authorities automatically create bindings [in 0.2.0.x]
180 125 Behavior for bridge users, bridge relays, and bridge authorities [in 0.2.0.x]
181 126 Getting GeoIP data and publishing usage summaries [in 0.2.0.x]
182 129 Block Insecure Protocols by Default [in 0.2.0.x]
183 130 Version 2 Tor connection protocol [in 0.2.0.x]
184 135 Simplify Configuration of Private Tor Networks [for 0.2.1.x] [in 0.2.1.2-alpha]
185 136 Mass authority migration with legacy keys [in 0.2.0.x]
186 137 Keep controllers informed as Tor bootstraps [in 0.2.1.x]
187 138 Remove routers that are not Running from consensus documents [in 0.2.1.2-alpha]
188 139 Download consensus documents only when it will be trusted [in 0.2.1.x]
189 148 Stream end reasons from the client side should be uniform [in 0.2.1.9-alpha]
190 150 Exclude Exit Nodes from a circuit [in 0.2.1.3-alpha]
191 152 Optionally allow exit from single-hop circuits [in 0.2.1.6-alpha]
192 166 Including Network Statistics in Extra-Info Documents [for 0.2.2]
193 167 Vote on network parameters in consensus [in 0.2.2]
194 171 Separate streams across circuits by connection metadata [in 0.2.3.3-alpha]
195 174 Optimistic Data for Tor: Server Side [in 0.2.3.1-alpha]
196 176 Proposed version-3 link handshake for Tor [for 0.2.3]
197 181 Optimistic Data for Tor: Client Side [in 0.2.3.3-alpha]
198 183 Refill Intervals [in 0.2.3.5-alpha]
199 184 Miscellaneous changes for a v3 Tor link protocol [for 0.2.3.x]
201 112 Bring Back Pathlen Coin Weight
202 113 Simplifying directory authority administration
203 118 Advertising multiple ORPorts at once
204 124 Blocking resistant TLS certificate usage
205 149 Using data from NETINFO cells
206 153 Automatic software update protocol
207 154 Automatic Software Update Protocol
208 163 Detecting whether a connection comes from a client
209 169 Eliminate TLS renegotiation for the Tor connection handshake
210 170 Configuration options regarding circuit building
212 100 Tor Unreliable Datagram Extension Proposal
214 116 Two hop paths from entry guards
215 120 Shutdown descriptors when Tor servers stop
216 128 Families of private bridges
217 142 Combine Introduction and Rendezvous Points
219 134 More robust consensus voting with diverse authority sets