summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-05-30 05:05:50 +0000
committerRoger Dingledine <arma@torproject.org>2006-05-30 05:05:50 +0000
commitcf58781de13f1fc90d386aa967b72d6f5c801ced (patch)
tree48948b962c7dfe1db0bfbc2e6fd5f241508cfec2 /doc
parent64d487a2d6d916fd12943db5585364e13f1aa43c (diff)
downloadtor-cf58781de13f1fc90d386aa967b72d6f5c801ced.tar.gz
tor-cf58781de13f1fc90d386aa967b72d6f5c801ced.zip
remove a few things from the 0.1.2 todo, and add one
svn:r6511
Diffstat (limited to 'doc')
-rw-r--r--doc/TODO21
1 files changed, 10 insertions, 11 deletions
diff --git a/doc/TODO b/doc/TODO
index 24fde70681..8a39d9cccd 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -31,6 +31,7 @@ R - Server usability
- Write limiting; separate token bucket for write
- dir answers include a your-ip-address-is header, so we can
break our dependency on dyndns.
+ - "bandwidth classes", for incoming vs initiated-here conns.
N - Better hidden service performance, with possible redesign.
- Asynchronous DNS
- What to use? C-ares? Libdns? AGL's patch?
@@ -153,7 +154,6 @@ Minor items for 0.1.2.x as time permits.
R - Streamline how we define a guard node as 'up'. document it somewhere.
- Better installers and build processes.
- Commit edmanm's win32 makefile to tor cvs contrib, or write a new one.
- o Can we cross-compile?
R - Christian Grothoff's attack of infinite-length circuit.
the solution is to have a separate 'extend-data' cell type
which is used for the first N data cells, and only
@@ -202,12 +202,6 @@ N - Vet all pending installer patches
- unrecommend IE because of ftp:// bug.
- torrc.complete.in needs attention?
- - Bind to random port when making outgoing connections to Tor servers,
- to reduce remote sniping attacks.
- - Have new people be in limbo and need to demonstrate usefulness
- before we approve them.
- - Clients should estimate their skew as median of skew from servers
- over last N seconds.
- Security
- Alices avoid duplicate /24 servers.
- Analyze how bad the partitioning is or isn't.
@@ -231,15 +225,20 @@ N - Vet all pending installer patches
- Make it harder to circumvent bandwidth caps: look at number of bytes
sent across sockets, not number sent inside TLS stream.
- - Make router_is_general_exit() a bit smarter once we're sure what it's for.
+M - rewrite how libevent does select() on win32 so it's not so very slow.
- - rewrite how libevent does select() on win32 so it's not so very slow.
+Future version:
+ - Bind to random port when making outgoing connections to Tor servers,
+ to reduce remote sniping attacks.
+ - Have new people be in limbo and need to demonstrate usefulness
+ before we approve them.
+ - Clients should estimate their skew as median of skew from servers
+ over last N seconds.
+R - Make router_is_general_exit() a bit smarter once we're sure what it's for.
- Audit everything to make sure rend and intro points are just as likely to
be us as not.
- Do something to prevent spurious EXTEND cells from making middleman
nodes connect all over. Rate-limit failed connections, perhaps?
-
-Future version:
R - Automatically determine what ports are reachable and start using
those, if circuits aren't working and it's a pattern we recognize
("port 443 worked once and port 9001 keeps not working").