diff options
author | Nick Mathewson <nickm@torproject.org> | 2005-06-20 00:10:31 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2005-06-20 00:10:31 +0000 |
commit | e1e246fa78c890f1c963380b5240d7c2883134d4 (patch) | |
tree | 3dbcb3179ce43f72721f6be44d84a93e28d8a0e0 /doc | |
parent | 8a6f22b25dd29630a238061265da2747f8020eb1 (diff) | |
download | tor-e1e246fa78c890f1c963380b5240d7c2883134d4.tar.gz tor-e1e246fa78c890f1c963380b5240d7c2883134d4.zip |
Be more clear about fixing unknown rendezvous points. (ow)
svn:r4465
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 14 |
1 files changed, 8 insertions, 6 deletions
@@ -66,6 +66,7 @@ N . Controller improvements immediately, since tor will exit right after. o Implement - Test, debug + - Allow EXTENDCIRCUIT to unknown server. . Switch example controllers to use new protocol . Python o Implement main controller interface @@ -81,12 +82,13 @@ N . Controller improvements first place.) Also, we should audit all users of get_pending_bytes().) - Make it harder to circumvent bandwidth caps: look at number of bytes sent across sockets, not number sent inside TLS stream. - - Handle rendezvousing with unverified nodes. - - Specify: Stick rendezvous point's key in INTRODUCE cell. - Bob should _always_ use key from INTRODUCE cell. - - Change to new rendezvous introduction cell format. (It's currently #if - 0'd out). Unless we already did that. - - Implement. +N - Handle rendezvousing with unverified nodes. + o Specify: Stick rendezvous point's address and port in INTRODUCE cell. + - Handle new format. + - Parse and generate new format (#if0 out the logic to generate it.) + - Support to extend circuit/target circuit to a chosen combination of + addr/port/ID/onionkey + - Verify that new code works. - it looks like tor_assert writes to stderr. what happens if stderr was closed and is now something else? uh. - christian grothoff's attack of infinite-length circuit. |