diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-08-11 16:04:38 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-08-11 16:04:38 +0000 |
commit | 5f333b119697f0121346cb16ca7bffd6be01298d (patch) | |
tree | 6afbcc577bea5c97e57e86db383cea657e1f9afe /doc/TODO.021 | |
parent | e65f773952865641ff6ca2f989fc79d699f8c4aa (diff) | |
download | tor-5f333b119697f0121346cb16ca7bffd6be01298d.tar.gz tor-5f333b119697f0121346cb16ca7bffd6be01298d.zip |
List more proposals in TODO.021
svn:r16498
Diffstat (limited to 'doc/TODO.021')
-rw-r--r-- | doc/TODO.021 | 32 |
1 files changed, 21 insertions, 11 deletions
diff --git a/doc/TODO.021 b/doc/TODO.021 index a4efa9bdf1..7a7141d041 100644 --- a/doc/TODO.021 +++ b/doc/TODO.021 @@ -168,16 +168,7 @@ R d Setting DirPort when acting as bridge will give false Warnings For 0.2.1.x: - Proposals to do: o 110: avoid infinite-length circuits -R d 128: families of private bridges - - 134: handle authority fragmentation. - - - Proposals to write: -R d Do we want to maintain our own set of entryguards that we use as - next hop after the bridge? - X Add an 'exit-address' line in the descriptor for servers that exit - from something that isn't their published address. - [I think tordnsel solved this. -RD] - - Proposal to supersede 117 by adding IPv6 support for exits and entries. + - 117: IPv6 Exits - Internal code support for ipv6: o Clone ipv6 functions (inet_ntop, inet_pton) where they don't exist. o Many address variables need to become tor_addr_t @@ -200,8 +191,27 @@ R d Do we want to maintain our own set of entryguards that we use as - config option to publish what ports you listen on, beyond ORPort/DirPort. It should support ranges and bit prefixes (?) too. - Need to figure out the right format for routerinfo_t on this. + - 121: Hidden service authentication +R d 128: families of private bridges + - 134: handle authority fragmentation. + o 135: simplify configuration of private tor networks. Th + - 140: Provide diffs betweeen consensuses + - 147: Eliminate the need for v2 directories in generating v3 directories + - 148: Stream end reasons from the client side should be uniform. + + - Maybe: + - 145: Separate "suitable from a guard" from "suitable as a new guard" + - 146: Adding new flag to reflect long-term stability + - 149: Using data from NETINFO cells + + - Proposals to write: - Fix voting to handle bug 608 case when multiple servers get Named. +R d Do we want to maintain our own set of entryguards that we use as + next hop after the bridge? + X Add an 'exit-address' line in the descriptor for servers that exit + from something that isn't their published address. + [I think tordnsel solved this. -RD] d Possibly: revise link protocol to allow big circuit IDs, variable-length cells, proposal-110 stuff, and versioned CREATES? o Eliminate use of v2 networkstatus documents in v3 authority @@ -308,7 +318,7 @@ P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle - Refactor the HTTP logic so the functions aren't so large. - Refactor buf_read and buf_write to have sensible ways to return error codes after partial writes - - Router_choose_random_node() has a big pile of args. make it "flags". + o Router_choose_random_node() has a big pile of args. make it "flags". - Streamline how we pick entry nodes: Make choose_random_entry() have less magic and less control logic. - Don't call time(NULL) so much; instead have a static time_t field |