aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2008-12-07 23:43:55 +0000
committerRoger Dingledine <arma@torproject.org>2008-12-07 23:43:55 +0000
commitc15b07bb30ca676bdec987ee31ce68f813e684df (patch)
treeccab1e580b03dc4606df928194797f9ed7d9802e /doc
parentd0c919aa1d38a3189370e95430b0063304c338c1 (diff)
downloadtor-c15b07bb30ca676bdec987ee31ce68f813e684df.tar
tor-c15b07bb30ca676bdec987ee31ce68f813e684df.tar.gz
more updates on our todo files
svn:r17512
Diffstat (limited to 'doc')
-rw-r--r--doc/TODO.02152
-rw-r--r--doc/TODO.external18
2 files changed, 33 insertions, 37 deletions
diff --git a/doc/TODO.021 b/doc/TODO.021
index 7166486fb..a40c90019 100644
--- a/doc/TODO.021
+++ b/doc/TODO.021
@@ -25,32 +25,23 @@ K - Karsten claims
Things Roger would be excited to see:
Nick
- - Finish buffer stuff in libevent; start using it in Tor.
+ * Look at Roger's proposal 141 discussions on or-dev, and help us
+ decide how to proceed.
- Tors start believing the contents of NETINFO cells.
- . Work with Steven and Roger to decide which parts of Paul's project
- he wants to work on.
- respond to Steven's red-team TLS testing (a.k.a, look at a packet
dump and compare)
Matt
- Fit Vidalia in 640x480 again.
- - Vidalia should display/edit PlaintextPorts events/config.
- Vidalia should avoid stomping on your custom exit policy lines
just because you click on 'save' for a totally different config thing.
- How much space do we save in TBB by stripping symbols from Vidalia
first? Good idea or crazy idea?
ioerror
- - gmail auto responder so you send us an email and we send you a Tor
- binary. Probably needs a proposal first.
- - document how it works / what its interface is
- - set it up so people can 'get tor' in many languages, and so the
- docs we send back are in many languages.
- - weather.torproject.org should go live.
+ * weather.torproject.org should go live.
- Keep advocating new Tor servers and working with orgs like Mozilla
to let them like Tor.
- - Start converting critical wiki pages into real Tor wml pages. E.g.,
- https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures
- Find out what happened to the buildbot and get it back up:
http://tor-buildbot.freehaven.net:8010/
- Learn about locking memory pages that have sensitive content. Get
@@ -58,24 +49,18 @@ ioerror
- Translation portal
- Vidalia html help files
- should we i18nize polipo's error messages too?
+ - how to get our diagrams translated, and how to get our screenshots
+ from the right language?
- Some of our translated wml files are very old -- so old that they
are harmful to leave in place. We need some sort of way to notice
this and disable them.
Steven
- - Figure out (or give up on) how to run Tor Browser and ordinary
- Firefox side-by-side.
- - Write a list of research items Tor would like to see done, for the
- volunteer page. Pick a few you'd like to work on yourself.
- Move proposal 131 or equivalent forward.
- Keep bugging us about exploits on the .exit notation.
- - If relays have 100KB/s but set relaybandwidthrate to 10KB/s, do your
- interference attacks still work?
- Mike's question #3 on https://www.torproject.org/volunteer#Research
- Worthwhile shipping TBB with some local html help files that come
as bookmarks?
- - Decide whether TBB should use Torbutton's "lock" feature.
- http://archives.seul.org/or/cvs/Jun-2008/msg00186.html
Andrew
- Which bundles include Torbutton? Change the docs/tor-doc-foo pages
@@ -180,7 +165,7 @@ K . 121: Hidden service authentication:
missing: delayed descriptor publication for 'stealth' mode.
R d 128: families of private bridges
- 134: handle authority fragmentation.
- o 135: simplify configuration of private tor networks. Th
+ o 135: simplify configuration of private tor networks.
- 140: Provide diffs betweeen consensuses
K - 143: Improvements of Distributed Hidden Service Descriptor Storage:
only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
@@ -194,6 +179,10 @@ K - 155: Four Improvements of Hidden Service Performance
- 145: Separate "suitable from a guard" from "suitable as a new guard"
- 146: Adding new flag to reflect long-term stability
- 149: Using data from NETINFO cells
+ - Don't extend a circuit over a noncanonical connection with
+ mismatched address.
+ - Learn our outgoing IP address from netinfo cells?
+ - Learn skew from netinfo cells?
- Proposals to write:
- Fix voting to handle bug 608 case when multiple servers get
@@ -244,11 +233,6 @@ N . Draft proposal for GeoIP aggregation (see external constraints *)
- Handle multi-core cpus better
- Split circuit AES across cores?
- Split TLS across cores? This will be harder.
- - Use information from NETINFO cells
- - Don't extend a circuit over a noncanonical connection with
- mismatched address.
- - Learn our outgoing IP address from netinfo cells?
- - Learn skew from netinfo cells?
- Testing
- Better unit test coverage
- Refactor unit tests into multiple files
@@ -264,13 +248,15 @@ N . Draft proposal for GeoIP aggregation (see external constraints *)
- make is-consensus-fresh-enough check way tighter.
- If we haven't tried downloading a consensus for ages since we're tired,
try getting a new one before we use old descriptors for a circuit.
- Related to bug 401.
+ Related to bug 401. [What does "since we're tired" mean? -RD]
- Feature removals and deprecations:
- Get rid of the v1 directory stuff (making, serving, and caching)
- - First verify that the caches won't flip out?
- - If they will, just stop the caches from caching for now
- - perhaps replace it with a "this is a tor server" stock webpage.
+ . First verify that the caches won't flip out?
+ o If they will, just stop the caches from caching for now
+ . perhaps replace it with a "this is a tor server" stock webpage.
+ - Get the debs to set DirPortFrontPage in the default.
+ - Decide how to handle DirPortFrontPage files with image links.
- The v2dir flag isn't used for anything anymore, right? If so, dump it.
- Even clients run rep_hist_load_mtbf_data(). Does this waste memory?
Dump it?
@@ -302,7 +288,6 @@ P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle
- Refactor the HTTP logic so the functions aren't so large.
- Refactor buf_read and buf_write to have sensible ways to return
error codes after partial writes
- o Router_choose_random_node() has a big pile of args. make it "flags".
- Streamline how we pick entry nodes: Make choose_random_entry() have
less magic and less control logic.
- Don't call time(NULL) so much; instead have a static time_t field
@@ -326,8 +311,6 @@ P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle
- Tor logs the libevent version on startup, for debugging purposes.
This is great. But it does this before configuring the logs, so
it only goes to stdout and is then lost.
- o Make TrackHostExits expire TrackHostExitsExpire seconds after their
- *last* use, not their *first* use.
- enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
- Make 'safelogging' extend to info-level logs too.
- don't do dns hijacking tests if we're reject *:* exit policy?
@@ -335,7 +318,6 @@ P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle
- More consistent error checking in router_parse_entry_from_string().
I can say "banana" as my bandwidthcapacity, and it won't even squeak.
- - Interface for letting SOAT modify flags that authorities assign.
+ d Interface for letting SOAT modify flags that authorities assign.
(How to keep the authority from clobbering them afterwards?
-
diff --git a/doc/TODO.external b/doc/TODO.external
index 308696a3e..83afed174 100644
--- a/doc/TODO.external
+++ b/doc/TODO.external
@@ -32,9 +32,14 @@ W - Finish implementation of directory overhead changes: have a set
- end of October
- Auto update
C - Get the MSI working and stable for Windows Tor installer.
+N - Come up with an interface to export the package/bundle gloss
+ descriptions so Vidalia can display them.
E . Vidalia calls Thandy, learns when to upgrade, requests the upgrade.
? - Teach our OSX installer to register its version on install
+ - end of December
+I - Periodic summaries of localization progress: both pootle and wml.
+
- mid January
KS . Finish testing, debugging, unit testing, etc the hidden service
changes. Have it in the development version and in use.
@@ -43,6 +48,7 @@ W - Finish testing, debugging, unit testing, etc the directory overhead
- end of January
NSE - Write first draft of research study for Paul's research problem.
+I - Periodic summaries of localization progress: both pootle and wml.
- mid February
S - Examine current load balancing issues and evaluate trade-offs
@@ -58,7 +64,8 @@ N - Write a summary of progress toward Overlapped I/O on Windows.
S - Write a summary of progress toward understanding risks to relays
(and thus bridges) from letting attackers route traffic through
- them.
+ them. Eg, if relays have 100KB/s but set relaybandwidthrate to
+ 10KB/s, do your interference attacks still work?
R - Revise and publish incentive draft paper
- Write an explanation for its current flaws
@@ -94,6 +101,9 @@ K - Metrics.
- Start playing around with figuring out which one is more
accurate, or how to combine them to get better guesses,
or something.
+R - Roger should walk Karsten through applying (and maybe
+ updating) the patch for each method, and write a summary
+ of what we have tried/guessed so far.
- Automatically collect and document or publish other monthly
statistics
- Total data over time
@@ -150,8 +160,12 @@ S - Tor Browser bundle work
- Continue analyzing "traces" left on host machine by use of
Tor Browser. Write a summary of current progress, and what
remains.
+ - Decide whether TBB should use Torbutton's "lock" feature.
+ http://archives.seul.org/or/cvs/Jun-2008/msg00186.html
+I - Jake learns how to build the TBB and takes over doing new
+ releases.
-I - Periodic summaries of localization progress
+I - Periodic summaries of localization progress: both pootle and wml.
I - Collecting user stories
I - Revise the 'Tor mirror page' so it doesn't list obsolete-looking
timestamps. Just have two tables, "new enough" and "not new enough".