summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2005-11-12 21:41:24 +0000
committerRoger Dingledine <arma@torproject.org>2005-11-12 21:41:24 +0000
commitb72323fab871382204531b25f411269d9f52bad1 (patch)
treedb92c2d65ba328f96b686707b7e4c872c1f306bd
parent014c6bfe00d4f07144fb0a02915df7e0aa85630f (diff)
downloadtor-b72323fab871382204531b25f411269d9f52bad1.tar.gz
tor-b72323fab871382204531b25f411269d9f52bad1.zip
start to clean up and add to and rearrange the todo
svn:r5362
-rw-r--r--doc/TODO69
1 files changed, 37 insertions, 32 deletions
diff --git a/doc/TODO b/doc/TODO
index a65f574e3a..588be8ec84 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -22,7 +22,7 @@ P - flesh out the rest of the section 6 of the faq
P - gather pointers to livecd distros that include tor
- put the logo on the website, in source form, so people can put it on
stickers directly, etc.
- - more pictures from ren. he wants to describe the tor handshake, i want to
+R . more pictures from ren. he wants to describe the tor handshake, i want to
talk about hidden services.
* clean up the places where our docs are redundant (or worse, obsolete in
one file and correct elsewhere). agl has a start on a global
@@ -35,17 +35,13 @@ NR- write a spec appendix for 'being nice with tor'
tor-0.1.0.7.rc
- Remove need for HACKING file.
-
-
-for 0.1.1.x:
+for 0.1.1.9-alpha:
N - if they're trying to be a tor server and they're running
win 98 or win me, don't let them be a server.
-R - are dirservers auto-verifying duplicate nicknames?
- o tor should auto-sort the recommended-versions strings
- (with the new smartlist sort stuff maybe)
- o setconf SocksBindAddress kills tor if it fails to bind
+R - ReachableAddresses doesn't do what we want wrt dir fetches.
+
- o controller libs should support resetconf command.
+for 0.1.1.x:
N . Additional controller features
o Find a way to make event info more extensible
- change circuit status events to give more details, like purpose,
@@ -83,25 +79,7 @@ R - If you think an OR conn is open but you can never establish a circuit
- Miscellaneous cleanups
- switch accountingmax to count total in+out, not either in or
out. it's easy to move in this direction (not risky), but hard to
- back, out if we decide we prefer it the way it already is. hm.
- . Come up with a coherent strategy for bandwidth buckets and TLS. (The
- logic for reading from TLS sockets is likely to overrun the bandwidth
- buckets under heavy load. (Really, the logic was never right in the
- first place.) Also, we should audit all users of get_pending_bytes().)
- - Make it harder to circumvent bandwidth caps: look at number of bytes
- sent across sockets, not number sent inside TLS stream.
-R o remove the warnings from rendezvous stuff that shouldn't be warnings.
-
- . Update the hidden service stuff for the new dir approach.
- - switch to an ascii format.
- - authdirservers publish blobs of them.
- - other authdirservers fetch these blobs.
- - hidserv people have the option of not uploading their blobs.
- - you can insert a blob via the controller.
- - and there's some amount of backwards compatibility.
- - teach clients, intro points, and hidservs about auth mechanisms.
- - come up with a few more auth mechanisms.
-
+ back out if we decide we prefer it the way it already is. hm.
- Christian Grothoff's attack of infinite-length circuit.
the solution is to have a separate 'extend-data' cell type
@@ -110,6 +88,11 @@ R o remove the warnings from rendezvous stuff that shouldn't be warnings.
- Specify, including thought about
- Implement
+ - Bind to random port when making outgoing connections to Tor servers,
+ to reduce remote sniping attacks.
+ - When we connect to a Tor server, it sends back a signed cell listing
+ the IP it believes it is using. Use this to block dvorak's attack.
+
N - Destroy and truncated cells should have reasons.
N - Add private:* alias in exit policies to make it easier to ban all the
fiddly little 192.168.foo addresses.
@@ -133,7 +116,6 @@ R - kill dns workers more slowly
- a way of rolling back approvals to before a timestamp
- have new people be in limbo and need to demonstrate usefulness
before we approve them
- - other?
R . Dirservers verify reachability claims
o basic reachability testing, influencing network-status list.
@@ -217,7 +199,7 @@ N . Routerdesc download changes
- Make authorities rate-limit logging their complaints about given
servers?
-N . Naming and validation:
+ o Naming and validation:
o Separate naming from validation in authdirs.
o Authdirs need to be able to decline to validate based on
IP range and key
@@ -228,14 +210,13 @@ N . Naming and validation:
and none says N->K' or N'->K.
o Clients choose names based on network-status options.
o Names are remembered in client state (?)
- - Okay to have two valid servers with same nickname, but not
+ o Okay to have two valid servers with same nickname, but not
two named servers with same nickname. Update logic.
- packaging and ui stuff:
. multiple sample torrc files
- uninstallers
. for os x
- . something, anything, for sys tray on Windows.
. figure out how to make nt service stuff work?
. Document it.
. Add version number to directory.
@@ -243,6 +224,12 @@ N - Vet all pending installer patches
- Win32 installer plus privoxy, sockscap/freecap, etc.
- Vet win32 systray helper code
+ - document:
+ - torcp needs more attention in the tor-doc-win32.
+ - recommend gaim.
+ - unrecommend IE because of ftp:// bug.
+ - torrc.complete.in needs attention?
+
o openssl patch to check for degenerate keys in DH handshake
o accepted and put into openssl
@@ -253,6 +240,23 @@ Reach (deferrable) items for 0.1.1.x:
o Add TTLs to DNS-related replies, and use them (when present) to adjust
addressmap values.
+ . Update the hidden service stuff for the new dir approach.
+ - switch to an ascii format.
+ - authdirservers publish blobs of them.
+ - other authdirservers fetch these blobs.
+ - hidserv people have the option of not uploading their blobs.
+ - you can insert a blob via the controller.
+ - and there's some amount of backwards compatibility.
+ - teach clients, intro points, and hidservs about auth mechanisms.
+ - come up with a few more auth mechanisms.
+
+ . Come up with a coherent strategy for bandwidth buckets and TLS. (The
+ logic for reading from TLS sockets is likely to overrun the bandwidth
+ buckets under heavy load. (Really, the logic was never right in the
+ first place.) Also, we should audit all users of get_pending_bytes().)
+ - Make it harder to circumvent bandwidth caps: look at number of bytes
+ sent across sockets, not number sent inside TLS stream.
+
. Research memory use on Linux: what's happening?
- Is it threading? (Maybe, maybe not)
- Is it the buf_shrink bug? (Quite possibly)
@@ -310,3 +314,4 @@ Blue-sky:
streams, at least according to the protocol. But we handle all that
we've seen in the wild.
(Pending a user who needs this)
+