diff options
author | Nick Mathewson <nickm@torproject.org> | 2006-10-23 20:34:51 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2006-10-23 20:34:51 +0000 |
commit | 8769909a85a15afac01b7a3be2cc7a822e87ca9f (patch) | |
tree | 3d76db5e889f141d6927e86b141f87e950f38e35 /doc | |
parent | fbe3c803f263b8b5ada5dba4f7e989dbe82b7c66 (diff) | |
download | tor-8769909a85a15afac01b7a3be2cc7a822e87ca9f.tar.gz tor-8769909a85a15afac01b7a3be2cc7a822e87ca9f.zip |
r9360@Kushana: nickm | 2006-10-23 16:34:25 -0400
FIll in some more roadmap items.
svn:r8809
Diffstat (limited to 'doc')
-rw-r--r-- | doc/design-paper/roadmap-2007.tex | 71 |
1 files changed, 54 insertions, 17 deletions
diff --git a/doc/design-paper/roadmap-2007.tex b/doc/design-paper/roadmap-2007.tex index edcd9ef09a..7eef057006 100644 --- a/doc/design-paper/roadmap-2007.tex +++ b/doc/design-paper/roadmap-2007.tex @@ -70,6 +70,8 @@ secure\cite{goldberg-tap}, relies more on particular aspects of RSA and our implementation thereof than we had initially believed. To future-proof against changes, we should replace it with a less delicate approach. +\tmp{Stream migration?} + \subsection{Scalability} \subsubsection{Improved directory performance} @@ -148,6 +150,13 @@ gets us more users happy to run servers. \subsection{Blue-sky: UDP} +\tmp{support udp} + +\tmp{Use udp as a transport} + + + + \section{Blocking resistance} \subsection{Design for blocking resistance} @@ -266,14 +275,27 @@ major packages within an hour or so of source release. \tmp{We'd like to know how much of the network is getting used.} \subsection{Controller library} -\tmp{release a general-purpose controller library} +We've done lots of design and development on our controller interface, which +allows UI applications and other tools to interact with Tor. We could +encorage the development of more such tools by releasing a {\bf + general-purpose controller library}, ideally with API support for several +popular programming languages. \section{User experience} \subsection{Get blocked less, get blocked less hard} -\tmp{Implement and publicize blind-signature based credential scheme} - -\tmp{Maybe make a minimal RBL thing} +Right now, some services block access to Tor because they don't have a better +way to keep vandals from abusing them than blocking IP addresses associated +with vandalism. Our approach so far has been to educate them about better +solutions that currently exist, but we should also {\bf create better +solutions for limiting vandalism by anonymous users} like credential and +blind-signature based implementations, and encourage their use. + +Those who do block Tor users also block overbroadly, sometimes blacklisting +operators of Tor servers that do not permit exit to their services. We could +obviate innocent reasons for doing so by designing a {\bf narrowly-targeted Tor + RBL service} so that those who wanted to overblock Tor clould no longer +plead incompetence. \subsection{All-in-one bundle} \tmp{a.k.a ``Torpedo'', but rename this.} @@ -284,13 +306,19 @@ major packages within an hour or so of source release. \subsection{Interface improvements} \tmp{Allow controllers to manipulate server status.} -\subsection{Firewall-level deployment} -\tmp{Make our new TransPort logic more portable and tested} - -\tmp{Write logic for Tor to act as a DNS server} -\tmp{Write necessary glue code, scripts, and docs so users who want to use - Tor as a firewall-like thing can. Consider a livecd.} +\subsection{Firewall-level deployment} +Another useful deployment mode for some users is using {\bf Tor in a firewall + configuration}, and directing all their traffic through Tor. This can be a +little tricky to set up currently, but it's an effective way to make sure no +traffic leaves the host un-anonymized. To achieve this, we need to {\bf + improve and port our new TransPort} feature which allows Tor to be used +without SOCKS support; to {\bf add an anonymizing DNS proxy} feature to Tor; +and to {\bf construct a recommended set of firewall configurations} to redirect +traffic to Tor. + +This is an area where {\bf deployment via a livecd}, or an installation +targetted at specialized home routing hardware, could be useful. \subsection{Localization} Right now, most of our user-facing code is internationalized. We need to @@ -307,19 +335,28 @@ translators only need to use a single tool to translate the whole Tor suite. \subsection{Unified documentation scheme} -\tmp{Keep track of all the docs we've got} +We need to {\bf inventory our documentation.} Our documentation so far has +been mostly produced on an {\it ad hoc} basis, in response to particular +needs and requests. We should figure out what documentation we have, whih of +it (if any) should get priotority, and whether we can't put it all into a +single format. -\tmp{Unify the docs into a single book-like thing} This will also help us -identify what sections of the ``book'' are missing. +We could {\bf unify the docs} into a single book-like thing. This will also +help us identify what sections of the ``book'' are missing. \subsection{Missing technical documentation} -\tmp{Revised design paper, or design paper plus errata} - -\tmp{``How to play nice with Tor''} - +We should {\bf revise our design paper} to reflect the new decisions and +research we've made since it was published in 2004. This will help other +researchers evaluate and suggest improvements to Tor's current design. +Other projects sometimes implement the client side of our prototocol. We +encourage this, but we should write {\bf a document about how to avoid +excessive resource use}, so we don't need to worry that they will do so +without regard to the effect of their choices on server resources. +\subsection{Missing user documentation} +\tmp{Discoursive and comprehensive docs} \end{document} |