Hi! Here's a summary of the proposals that have changed their status and become closed, dead, or superseded since the last one of these emails I sent out (last year).
I'll summarize the current status of open proposals in my next mail. I'll try to send these out more regularly. ===== Newly DEAD or SUPERSEDED: 146 Add new flag to reflect long-term stability [SUPERSEDED] From time to time we get the idea of having clients ship with a reasonably recent consensus (or a list of directory mirrors), so instead of bootstrapping from one of the authorities, they can bootstrap from a regular directory cache. The problem here is that by the time the client is run, most of the directory mirrors will be down or will have changed their IP. This proposal tried to address that. The applications of this design are achieved by proposal 206 instead. Instead of having the authorities track long-term stability for nodes that might be useful as directories in a fallback consensus, we eliminated the idea of a fallback consensus, and just have a DirSource configuration option. 213 Remove stream-level sendmes from the design [DEAD] Roger had an idea to improve flow control, then decided it wasn't a good one. See the comments in this proposal for more discussion. ===== Implemented in 0.2.3 or earlier 162 Publish the consensus in multiple flavors [FINISHED] This one got mostly implemented in 0.2.2, with the introduction of microdescriptor consensus, and in 0.2.3, where microdescriptors were finished. We never implemented the meta-document that was going to describe other, future flavors, however. I should extract that into a new proposal. ===== Implemented in 0.2.4 117 IPv6 exits [CLOSED] 208 IPv6 Exits Redux [CLOSED] We implemented IPv6 exit support in 0.2.4.x. There are some lingering issues not addressed in these proposals -- see tickets tagged with "ipv6". 186 Multiple addresses for one OR or bridge [CLOSED] The protocol side of this is implemented as part of the IPv6 work in 0.2.4. Tor doesn't yet use the full range of options that the format allows, however. See for example #9729 for work in that area (which needs review!) 198 Restore semantics of TLS ClientHello [CLOSED] We did this one in 0.2.4.x. This put us back on the track of being TLS users in good standing, and let us use better ciphersuites (like ECDHE ones) than the ones we had picked out in v1 and v2 of the link protocol. 200 Adding new, extensible CREATE, EXTEND, and related cells [CLOSED] 216 Improved circuit-creation key exchange [CLOSED] These came in 0.2.4.x; the first one allowed us to change our circuit handshake; the latter specified the ntor handshake that 0.2.4.x clients and later prefer today. 204 Subdomain support for Hidden Service addresses [FINISHED] This one allows an (ignored) foo at the front of foo.bar.onion, for subdomain support. Sadly, I bet it will never see much use with the introduction of longer onion addresses in our next-gen hidden service design. 205 Remove global client-side DNS caching [CLOSED] Caching DNS addresses across circuits presented a user tagging opportunity, and exposed some linkability across circuits. This proposal removed the client-side DNS cache entirely for most purposes in 0.2.4. 206 Preconfigured directory sources for bootstrapping [CLOSED] This proposal introduces the DirSource option, with 0.2.4 clients (and later) can be set up with to avoid hammering on the authorities during their initial bootstrapping on the network. 207 Directory guards [CLOSED] To avoid client enumeration, this proposal says that clients should use a guard . Implemented in 0.2.4. 214 Allow 4-byte circuit IDs in a new link protocol [CLOSED] We've been at risk of having more than 65535 circuits on a link for a while now; this proposal increased the size of circuit IDs to avoid that. 221 Stop using CREATE_FAST [CLOSED] The CREATE_FAST handshake was introduced to avoid using the TAP handshake on the first hop of circuits, since the TAP circuit extension handshake provides no benefit over the . But now that the ntor handshake is (sometimes) available, that reasoning no longer holds. Implemented in 0.2.4. 222 Stop sending client timestamps [CLOSED] This proposal enumerated all the places in our protocol where eavesdroppers, clients, or servers get a view of a client or server's current time, and explained how to ameliorate or remove those linkability. Implemented in 0.2.4. ===== Implemented in 0.2.5 217 Tor Extended ORPort Authentication [FINISHED] We could use an authentication step for using the extended ORPort, to ensure that local connections are coming from an authorized pluggable transport. This proposal explains how. We implemented this in 0.2.5.x as part of the ExtORPort work. 218 Controller events to better understand connection/circuit usage [CLOSED] This one is actually going to be in 0.2.5.2-alpha; it adds more controller events for researchers. _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev