summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-04-09 06:38:01 +0000
committerRoger Dingledine <arma@torproject.org>2006-04-09 06:38:01 +0000
commitfc320a24f6f1d897a8aadd080d778e2ac3d90412 (patch)
tree303feb105e5a85924aceba6355e839dd4fd127f5
parenta699f38bc517cb777d311b820f11aa08653d7d2f (diff)
downloadtor-fc320a24f6f1d897a8aadd080d778e2ac3d90412.tar.gz
tor-fc320a24f6f1d897a8aadd080d778e2ac3d90412.zip
work through more todo items
svn:r6336
-rw-r--r--doc/TODO32
1 files changed, 14 insertions, 18 deletions
diff --git a/doc/TODO b/doc/TODO
index 1936fac22c..911b33692a 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -17,9 +17,8 @@ N - Mark up spec; note unclear points about servers
N - Mention controller libs someplace.
D FAQ entry: why gnutls is bad/not good for tor
P - flesh out the rest of the section 6 of the faq
-P - gather pointers to livecd distros that include tor
-R . more pictures from ren. he wants to describe the tor handshake, i want to
- talk about hidden services.
+R . more pictures from ren. he wants to describe the tor handshake
+R - make a page with the hidden service diagrams.
NR- write a spec appendix for 'being nice with tor'
- tor-in-the-media page
- Remove need for HACKING file.
@@ -46,18 +45,18 @@ N - building on freebsd 6.0: (with multiple openssl installations)
when they feel like it.
- update dir-spec with what we decided for each of these
- - find 10 dirservers.
- - Make it no longer default for v2 dirservers to support v1.
- - non-versioning dirservers don't need to set recommended*versions.
- - non-naming dirservers don't need to have an approved-routers file.
- - What are criteria to be a dirserver? Write a policy.
+ o find N dirservers.
+ o Make it no longer default for v2 dirservers to support v1.
+ o non-versioning dirservers don't need to set recommended*versions.
+ o non-naming dirservers don't need to have an approved-routers file.
+ o What are criteria to be a dirserver? Write a policy.
- are there other options that we haven't documented so far?
- - look at the proposed os x uninstaller:
+ . look at the proposed os x uninstaller:
http://archives.seul.org/or/talk/Jan-2006/msg00038.html
- Interim things:
- provide no-cache no-index headers from the dirport?
- - remove down/useless descriptors from v1 directory?
+ o remove down/useless descriptors from v1 directory?
Deferred from 0.1.1.x:
@@ -77,7 +76,7 @@ R - Christian Grothoff's attack of infinite-length circuit.
- Specify, including thought about
- Implement
-R - When we connect to a Tor server, it sends back a signed cell listing
+R - When we connect to a Tor server, it sends back a cell listing
the IP it believes it is using. Use this to block dvorak's attack.
Also, this is a fine time to say what time you think it is.
- Verify that a new cell type is okay with deployed codebase
@@ -85,9 +84,6 @@ R - When we connect to a Tor server, it sends back a signed cell listing
- Implement
R - failed rend desc fetches sometimes don't get retried.
- - Add config options to not publish and not fetch rend descs.
- - Add controller interfaces to hear rend desc events and learn
- about rend descs. In base16 I guess for now.
N - Display the reasons in 'destroy' and 'truncated' cells under some
circumstances?
@@ -175,13 +171,13 @@ R - kill dns workers more slowly
. for os x
. figure out how to make nt service stuff work?
. Document it.
- . Add version number to directory.
+ o Add version number to directory.
N - Vet all pending installer patches
- Win32 installer plus privoxy, sockscap/freecap, etc.
- Vet win32 systray helper code
- document:
- - torcp needs more attention in the tor-doc-win32.
+ o torcp needs more attention in the tor-doc-win32.
- recommend gaim.
- unrecommend IE because of ftp:// bug.
- torrc.complete.in needs attention?
@@ -205,6 +201,8 @@ N - Vet all pending installer patches
- and there's some amount of backwards compatibility.
- teach clients, intro points, and hidservs about auth mechanisms.
- come up with a few more auth mechanisms.
+ - auth mechanisms to let hidden service midpoint and responder filter
+ connection requests.
. Come up with a coherent strategy for bandwidth buckets and TLS. (The
logic for reading from TLS sockets is likely to overrun the bandwidth
@@ -256,8 +254,6 @@ Future version:
- Track uptime as %-of-time-up, as well as time-since-last-down.
- hidserv offerers shouldn't need to define a SocksPort
* figure out what breaks for this, and do it.
- - auth mechanisms to let hidden service midpoint and responder filter
- connection requests.
- Relax clique assumptions.
X start handling server descriptors without a socksport?
- tor should be able to have a pool of outgoing IP addresses