diff options
author | Roger Dingledine <arma@torproject.org> | 2005-11-12 21:41:24 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2005-11-12 21:41:24 +0000 |
commit | b72323fab871382204531b25f411269d9f52bad1 (patch) | |
tree | db92c2d65ba328f96b686707b7e4c872c1f306bd /doc | |
parent | 014c6bfe00d4f07144fb0a02915df7e0aa85630f (diff) | |
download | tor-b72323fab871382204531b25f411269d9f52bad1.tar.gz tor-b72323fab871382204531b25f411269d9f52bad1.zip |
start to clean up and add to and rearrange the todo
svn:r5362
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 69 |
1 files changed, 37 insertions, 32 deletions
@@ -22,7 +22,7 @@ P - flesh out the rest of the section 6 of the faq P - gather pointers to livecd distros that include tor - put the logo on the website, in source form, so people can put it on stickers directly, etc. - - more pictures from ren. he wants to describe the tor handshake, i want to +R . more pictures from ren. he wants to describe the tor handshake, i want to talk about hidden services. * clean up the places where our docs are redundant (or worse, obsolete in one file and correct elsewhere). agl has a start on a global @@ -35,17 +35,13 @@ NR- write a spec appendix for 'being nice with tor' tor-0.1.0.7.rc - Remove need for HACKING file. - - -for 0.1.1.x: +for 0.1.1.9-alpha: N - if they're trying to be a tor server and they're running win 98 or win me, don't let them be a server. -R - are dirservers auto-verifying duplicate nicknames? - o tor should auto-sort the recommended-versions strings - (with the new smartlist sort stuff maybe) - o setconf SocksBindAddress kills tor if it fails to bind +R - ReachableAddresses doesn't do what we want wrt dir fetches. + - o controller libs should support resetconf command. +for 0.1.1.x: N . Additional controller features o Find a way to make event info more extensible - change circuit status events to give more details, like purpose, @@ -83,25 +79,7 @@ R - If you think an OR conn is open but you can never establish a circuit - Miscellaneous cleanups - switch accountingmax to count total in+out, not either in or out. it's easy to move in this direction (not risky), but hard to - back, out if we decide we prefer it the way it already is. hm. - . Come up with a coherent strategy for bandwidth buckets and TLS. (The - logic for reading from TLS sockets is likely to overrun the bandwidth - buckets under heavy load. (Really, the logic was never right in the - first place.) Also, we should audit all users of get_pending_bytes().) - - Make it harder to circumvent bandwidth caps: look at number of bytes - sent across sockets, not number sent inside TLS stream. -R o remove the warnings from rendezvous stuff that shouldn't be warnings. - - . Update the hidden service stuff for the new dir approach. - - switch to an ascii format. - - authdirservers publish blobs of them. - - other authdirservers fetch these blobs. - - hidserv people have the option of not uploading their blobs. - - you can insert a blob via the controller. - - and there's some amount of backwards compatibility. - - teach clients, intro points, and hidservs about auth mechanisms. - - come up with a few more auth mechanisms. - + back out if we decide we prefer it the way it already is. hm. - Christian Grothoff's attack of infinite-length circuit. the solution is to have a separate 'extend-data' cell type @@ -110,6 +88,11 @@ R o remove the warnings from rendezvous stuff that shouldn't be warnings. - Specify, including thought about - Implement + - Bind to random port when making outgoing connections to Tor servers, + to reduce remote sniping attacks. + - When we connect to a Tor server, it sends back a signed cell listing + the IP it believes it is using. Use this to block dvorak's attack. + N - Destroy and truncated cells should have reasons. N - Add private:* alias in exit policies to make it easier to ban all the fiddly little 192.168.foo addresses. @@ -133,7 +116,6 @@ R - kill dns workers more slowly - a way of rolling back approvals to before a timestamp - have new people be in limbo and need to demonstrate usefulness before we approve them - - other? R . Dirservers verify reachability claims o basic reachability testing, influencing network-status list. @@ -217,7 +199,7 @@ N . Routerdesc download changes - Make authorities rate-limit logging their complaints about given servers? -N . Naming and validation: + o Naming and validation: o Separate naming from validation in authdirs. o Authdirs need to be able to decline to validate based on IP range and key @@ -228,14 +210,13 @@ N . Naming and validation: and none says N->K' or N'->K. o Clients choose names based on network-status options. o Names are remembered in client state (?) - - Okay to have two valid servers with same nickname, but not + o Okay to have two valid servers with same nickname, but not two named servers with same nickname. Update logic. - packaging and ui stuff: . multiple sample torrc files - uninstallers . for os x - . something, anything, for sys tray on Windows. . figure out how to make nt service stuff work? . Document it. . Add version number to directory. @@ -243,6 +224,12 @@ N - Vet all pending installer patches - Win32 installer plus privoxy, sockscap/freecap, etc. - Vet win32 systray helper code + - document: + - torcp needs more attention in the tor-doc-win32. + - recommend gaim. + - unrecommend IE because of ftp:// bug. + - torrc.complete.in needs attention? + o openssl patch to check for degenerate keys in DH handshake o accepted and put into openssl @@ -253,6 +240,23 @@ Reach (deferrable) items for 0.1.1.x: o Add TTLs to DNS-related replies, and use them (when present) to adjust addressmap values. + . Update the hidden service stuff for the new dir approach. + - switch to an ascii format. + - authdirservers publish blobs of them. + - other authdirservers fetch these blobs. + - hidserv people have the option of not uploading their blobs. + - you can insert a blob via the controller. + - and there's some amount of backwards compatibility. + - teach clients, intro points, and hidservs about auth mechanisms. + - come up with a few more auth mechanisms. + + . Come up with a coherent strategy for bandwidth buckets and TLS. (The + logic for reading from TLS sockets is likely to overrun the bandwidth + buckets under heavy load. (Really, the logic was never right in the + first place.) Also, we should audit all users of get_pending_bytes().) + - Make it harder to circumvent bandwidth caps: look at number of bytes + sent across sockets, not number sent inside TLS stream. + . Research memory use on Linux: what's happening? - Is it threading? (Maybe, maybe not) - Is it the buf_shrink bug? (Quite possibly) @@ -310,3 +314,4 @@ Blue-sky: streams, at least according to the protocol. But we handle all that we've seen in the wild. (Pending a user who needs this) + |