summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2007-12-05 05:46:52 +0000
committerRoger Dingledine <arma@torproject.org>2007-12-05 05:46:52 +0000
commit9cb8a4940c2497ce0ab3cd323dceddf70e89e9c0 (patch)
tree89a67e35bddcfb32c96062609af855c23725c193
parent569ade5143744cf4030b7aa2411610a325d4ec94 (diff)
downloadtor-9cb8a4940c2497ce0ab3cd323dceddf70e89e9c0.tar.gz
tor-9cb8a4940c2497ce0ab3cd323dceddf70e89e9c0.zip
move the december feature list up into the 0.2.0 section of
the todo list. the feature freeze is off. better luck in 2008! svn:r12675
-rw-r--r--doc/TODO65
1 files changed, 34 insertions, 31 deletions
diff --git a/doc/TODO b/doc/TODO
index 67150d0b69..365c251ed0 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -20,6 +20,37 @@ For Tor 0.2.0.13-alpha:
- Put a consensus in place of the empty fallback-consensus file in
src/config and see what breaks.
- let bridges set relaybandwidthrate as low as 5kb
+ - config option FetchDirInfoEagerly so the dnsel can fetch dir
+ info like a mirror without needing to be a tor server.
+ - nick has to pick a name for it
+
+Features blocking 0.2.0.x:
+ - mirror tor downloads on (via) tor dir caches
+R . spec
+ d deploy
+ - geoip caching and publishing for bridges
+R . spec
+ - deploy
+ d let Vidalia use the geoip data too rather than doing its own
+ anonymized queries
+ - bridge address disbursal strategies
+ o get the cached-descriptors* to bridges@moria
+ - parse out bridge addresses from cached-descriptors*
+ (or parse them out before Tonga sends them)
+ (or get Tonga's Tor to write them out better in the first place)
+N * answer by IP/timestamp
+ - run a little web server on moria?
+N d answer by answering email to bridges@torproject
+ - keep track of which addresses have been answered already
+R d some sort of reachability testing on bridges
+R - families of bridges
+ - interface for letting soat modify flags that authorities assign
+R . spec
+ - deploy
+S * tor usb windows image (vidalia, polipo, tor, firefox)
+S/M - vidalia can launch firefox
+ - build a community version of firefox
+ - pick our favorite extensions
Things we'd like to do in 0.2.0.x:
- See also Flyspray tasks.
@@ -146,7 +177,7 @@ R - drop 'authority' queries if they're to our own identity key; accept
o be more robust to bridges being marked as down and leaving us
stranded without any known "running" bridges.
- Bridges operators (rudimentary version)
- * Ability to act as dir cache without a dir port.
+ o Ability to act as dir cache without a dir port.
o Bridges publish to bridge authorities
o Fix BEGIN_DIR so that you connect to bridge of which you only
know IP (and optionally fingerprint), and then use BEGIN_DIR to learn
@@ -211,34 +242,6 @@ Nice-to-have items for 0.2.0.x, time permitting:
servers. but sometimes our entry node is the same for multiple
test circuits. this defeats the point.
-Planned for 0.2.1.x, December:
- - mirror tor downloads on (via) tor dir caches
-R - spec
- d deploy
- - geoip caching and publishing for bridges
-R - spec
- - deploy
- d let Vidalia use the geoip data too rather than doing its own
- anonymized queries
- - bridge address disbursal strategies
- o get the cached-descriptors* to bridges@moria
- - parse out bridge addresses from cached-descriptors*
- (or parse them out before Tonga sends them)
- (or get Tonga's Tor to write them out better in the first place)
- * answer by IP/timestamp
- - run a little web server on moria?
- d answer by answering email to bridges@torproject
- - keep track of which addresses have been answered already
- d some sort of reachability testing on bridges
- - families of bridges
- - interface for letting soat modify flags that authorities assign
-R - spec
- - deploy
-S * tor usb windows image (vidalia, polipo, tor, firefox)
-S/M - vidalia can launch firefox
- - build a community version of firefox
- - pick our favorite extensions
-
Planned for 0.2.1.x:
- enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
- configurable timestamp granularity. defaults to 'seconds'.
@@ -313,8 +316,8 @@ Deferred from 0.2.0.x:
local_routerstatus (or equivalent) subsume all places to go for "what
router is this?"
- Blocking/scanning-resistance
- - It would be potentially helpful to https requests on the OR port by
- acting like an HTTPS server.
+ - It would be potentially helpful to respond to https requests on
+ the OR port by acting like an HTTPS server.
- Do we want to maintain our own set of entryguards that we use as
next hop after the bridge? Open research question; let's say no
for 0.2.0 unless we learn otherwise.