diff options
author | Roger Dingledine <arma@torproject.org> | 2008-05-04 10:46:31 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2008-05-04 10:46:31 +0000 |
commit | 0c46f1eaea9196b076032e2eb2b42785698caf20 (patch) | |
tree | 76bd116279b38f86231dfe903bb06ed00e5467ee /doc/TODO | |
parent | 755cbe5d4441c190c0ac153522b1cc282cfe07d7 (diff) | |
download | tor-0c46f1eaea9196b076032e2eb2b42785698caf20.tar.gz tor-0c46f1eaea9196b076032e2eb2b42785698caf20.zip |
some deliverables and timeline for the directory overhead project
svn:r14556
Diffstat (limited to 'doc/TODO')
-rw-r--r-- | doc/TODO | 25 |
1 files changed, 19 insertions, 6 deletions
@@ -94,12 +94,14 @@ N - Additional TLS-camouflage work (spoofing FF cipher suite, etc.) - investigate the feasibility of handing connections off to a local apache if they don't look like Tor or if they don't portknock or whatever. -W - Get closer to downloading far fewer descriptors - - Instrument the code to track how many descriptors we download vs how - many times we extend a circuit. - - Write a proposal for how to fetch far fewer descriptors; assess - anonymity attacks, like from looking at the size of the - descriptor you fetch. + - Get closer to downloading far fewer descriptors +W - Instrument the code to track how many descriptors we download vs how + many times we extend a circuit. Guess a few other things to + instrument, like cache activity, and do those too. +W - Start a proposal for how to fetch far fewer descriptors; + identify and start assessing anonymity attacks, like from looking + at the size of the descriptor you fetch. See xxx-grand-plan.txt + for some early thoughts. I - Translation portal - Vidalia installer translations - Find/make a script to convert NSI strings into PO files @@ -118,6 +120,13 @@ KS - Investigate where the slowdown occurs for making hidden service areas that can be improved, and make some guesses about which we should focus on. + - mid July +W - Take the results from instrumenting directory downloads on Tor + clients, and analyze/simulate some alternate approaches. Finish + proposal for how to improve things, iterate based on feedback, + convince us that the anonymity tradeoffs and/or scalability + tradeoffs are acceptable. + - mid August KS - Design hidden service improvements, evaluate them and consider security properties: write some proposals, get feedback, revise @@ -139,10 +148,14 @@ I - Figure out a good PKI, document the design, assess security issues: - mid October KS - Finish implementation of hidden service improvements: have a set of patches that you think work. +W - Finish implementation of directory overhead changes: have a set + of patches that you think work. - mid January KS - Finish testing, debugging, unit testing, etc the hidden service changes. Have it in the development version and in use. +W - Finish testing, debugging, unit testing, etc the directory overhead + changes. Have it in the development version and in use. ======================================================================= |