710183202f2c3195bf500457dfc401a1a522f0c9
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

1) ## translation metadata
Roger Dingledine looks like we never set the...

Roger Dingledine authored 13 years ago

2) # Revision: $Revision$
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

3) # Translation-Priority: 4-optional
4) 
5) #include "head.wmi" TITLE="Tor: Volunteer" CHARSET="UTF-8"
6) <div id="content" class="clearfix">
7)   <div id="breadcrumbs">
Andrew Lewman change all of the breadcrum...

Andrew Lewman authored 13 years ago

8)     <a href="<page index>">Home &raquo; </a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

9)     <a href="<page getinvolved/volunteer>">Volunteer</a>
10)   </div>
11)   <div id="maincol"> 
12)     <!-- PUT CONTENT AFTER THIS TAG -->
13)     <h1>A few things everyone can do now:</h1>
14)     <ol>
15)     <li>Please consider <a href="<page docs/tor-doc-relay>">running
16)     a relay</a> to help the Tor network grow.</li>
17)     <li>Tell your friends! Get them to run relays. Get them to run hidden
18)     services. Get them to tell their friends.</li>
19)     <li>If you like Tor's goals, please <a href="<page donate/donate>">take a moment
20)     to donate to support further Tor development</a>. We're also looking
21)     for more sponsors &mdash; if you know any companies, NGOs, agencies,
22)     or other organizations that want anonymity / privacy / communications
23)     security, let them know about us.</li>
24)     <li>We're looking for more <a href="<page about/torusers>">good examples of Tor
25)     users and Tor use cases</a>. If you use Tor for a scenario or purpose not
26)     yet described on that page, and you're comfortable sharing it with us,
27)     we'd love to hear from you.</li>
28)     </ol>
29)     
30)     <p>Tor has <a href="<page getinvolved/open-positions>">two open positions</a>.
31)     Please <a href="<page about/contact>">contact us</a> if you are qualified!</p>
32)     
33)     <a id="Documentation"></a>
34)     <h2><a class="anchor" href="#Documentation">Documentation</a></h2>
35)     <ol>
36)     <li>Help translate the web page and documentation into other
37)     languages. See the <a href="<page getinvolved/translation>">translation
38)     guidelines</a> if you want to help out. We especially need Arabic or
39)     Farsi translations, for the many Tor users in censored areas.</li>
40)     <li>Evaluate and document
41)     <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorifyHOWTO">our
42)     list of programs</a> that can be configured to use Tor.</li>
43)     <li>We have a huge list of <a
44)     href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/SupportPrograms">potentially useful
45)     programs that interface to Tor</a>. Which ones are useful in which
46)     situations? Please help us test them out and document your results.</li>
47)     </ol>
48)     
49)     <a id="Advocacy"></a>
50)     <h2><a class="anchor" href="#Advocacy">Advocacy</a></h2>
51)     <ol>
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

52)     <li>Create a <a
53) href="https://trac.torproject.org/projects/tor/wiki/CommunityLogos">community
54) logo</a> under a Creative Commons license that all can use and modify.</li>
55)     <li>Create a presentation that can be used for various user group
56) meetings around the world.</li>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

57)     <li>Create a video about the positive uses of Tor, what Tor is,
58)     or how to use it.  Some have already started on <a
59)     href="http://media.torproject.org/video/">Tor's Media server</a>,
60)     <a
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

61)     href="http://www.howcast.com/videos/90601-How-To-Circumvent-an-Internet-Proxy">Howcast</a>,
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

62)     and <a href="http://www.youtube.com/thetorproject">YouTube</a>.</li> 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

63)     <li>Create a poster, or a set of posters, around a theme,
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

64)     such as "Tor for Freedom!".</li>
Andrew Lewman add another advocacy thing.

Andrew Lewman authored 13 years ago

65)     <li>Create a t-shirt design that incorporates "Congratulations!
66)     You are using Tor!" in any language.</li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

67)     </ol>
68)     
69)     <a id="Coding"></a>
70)     <a id="Summer"></a>
71)     <a id="Projects"></a>
72)     <h2><a class="anchor" href="#Projects">Good Coding Projects</a></h2>
73)     
74)     <p>
75)     You may find some of these projects to be good <a href="<page
76)     about/gsoc>">Google Summer of Code 2010</a> ideas. We have labelled each idea
77)     with how useful it would be to the overall Tor project (priority), how
78)     much work we expect it would be (effort level), how much clue you should
79)     start with (skill level), and which of our <a href="<page
Andrew Lewman remove more dead links.

Andrew Lewman authored 13 years ago

80)     about/corepeople>">core developers</a> would be good mentors.
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

81)     If one or more of these ideas looks promising to you, please <a
82)     href="<page about/contact>">contact us</a> to discuss your plans rather than
83)     sending blind applications. You may also want to propose your own project
84)     idea &mdash; which often results in the best applications.
85)     </p>
86)     
87)     <ol>
88)     
89)     <li>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

90)     <b>Audit Tor Browser Bundles for data leaks</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

91)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

92)     Priority: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

93)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

94)     Effort Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

95)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

96)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

97)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

98)     Likely Mentors: <i>Steven, Erinn, Jacob, Andrew</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

99)     <p>The Tor Browser Bundle incorporates Tor, Firefox, Polipo, and the Vidalia
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

100)     user interface (and optionally the <a href="http://pidgin.im/">Pidgin</a>
101)     Instant Messaging client). Components are pre-configured to operate in a
102)     secure way, and it has very few dependencies on the installed operating
103)     system. It has therefore become one of the most easy to use, and popular,
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

104)     ways to use Tor on Windows.</p>
105)     <p>This project is to identify all of the traces left behind by
106)     using a Tor Browser Bundle on Windows, Mac OS X, or Linux.  Developing
107)     ways to stop, counter, or remove these traces is a final step.</p>
108)     <p>Students should be familiar with operating system analysis,
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

109)     application development on one or preferably all of Windows, Linux,
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

110)     and Mac OS X, and be comfortable with C/C++ and shell scripting.</p>
111)     <p>If you would like to help extend or do security auditing for
112)     TBB, please contact Erinn.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

113)     </li>
114)     
115)     <li>
116)     <b>Help track the overall Tor Network status</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

117)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

118)     Priority: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

119)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

120)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

121)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

122)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

123)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

124)     Likely Mentors: <i>Karsten, Roger</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

125)     <p>It would be great to set up an automated system for tracking network
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

126)     health over time, graphing it, etc. Part of this project would involve
127)     inventing better metrics for assessing network health and growth. Is the
128)     average uptime of the network increasing? How many relays are qualifying
129)     for Guard status this month compared to last month? What's the turnover
130)     in terms of new relays showing up and relays shutting off? Periodically
131)     people collect brief snapshots, but where it gets really interesting is
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

132)     when we start tracking data points over time.</p>
133)     <p>Data could be collected from the Tor Network Scanners in <a
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

134)     href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from
135)     the server descriptors that each relay publishes, and from other
136)     sources. Results over time could be integrated into one of the <a
137)     href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
138)     kept separate. Speaking of the Tor Status pages, take a look at Roger's
139)     <a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

140)     Status wish list</a>.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

141)     </li>
142)     
143)     <li>
144)     <b>Improving Tor's ability to resist censorship</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

145)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

146)     Priority: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

147)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

148)     Effort Level: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

149)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

150)     Skill Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

151)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

152)     Likely Mentors: <i>Roger, Nick, Steven</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

153)     <p>The Tor 0.2.1.x series makes <a
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

154)     href="<svnprojects>design-paper/blocking.html">significant
155)     improvements</a> in resisting national and organizational censorship.
156)     But Tor still needs better mechanisms for some parts of its
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

157)     anti-censorship design.</p>
158)     <p>One huge category of work is adding features to our <a
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

159)     href="http://gitweb.torproject.org/bridgedb.git?a=tree">BridgeDB</a>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

160)     service (Python). Tor aims to give out <a href="<page docs/bridges>">bridge
161)     relay addresses</a> to users that can't reach the Tor network
162)     directly, but there's an arms race between algorithms for distributing
163)     addresses and algorithms for gathering and blocking them. See <a
Roger Dingledine fix another 404 from the fr...

Roger Dingledine authored 13 years ago

164)     href="<blog>bridge-distribution-strategies">our
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

165)     blog post on the topic</a> as an overview, and then look at <a
166)     href="http://archives.seul.org/or/dev/Dec-2009/msg00000.html">Roger's
167)     or-dev post</a> from December for more recent thoughts &mdash; lots of
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

168)     design work remains.</p>
169)     <p>If you want to get more into the guts of Tor itself (C), a more minor problem
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

170)     we should address is that current Tors can only listen on a single
171)     address/port combination at a time. There's
172)     <a href="<gitblob>doc/spec/proposals/118-multiple-orports.txt">a
173)     proposal to address this limitation</a> and allow clients to connect
174)     to any given Tor on multiple addresses and ports, but it needs more
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

175)     work.</p>
176)     <p>This project could involve a lot of research and design. One of the big
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

177)     challenges will be identifying and crafting approaches that can still
178)     resist an adversary even after the adversary knows the design, and
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

179)     then trading off censorship resistance with usability and
180)     robustness.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

181)     </li>
182)     
183)     <li>
184)     <b>Tor Controller Status Event Interface for Vidalia</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

185)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

186)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

187)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

188)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

189)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

190)     Skill Level: <i>Low to Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

191)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

192)     Likely Mentors: <i>Matt</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

193)     <p>There are a number of status changes inside Tor of which the user may need
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

194)     to be informed. For example, if the user is trying to set up his Tor as a
195)     relay and Tor decides that its ports are not reachable from outside
196)     the user's network, we should alert the user. Currently, all the user
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

197)     gets is a couple of log messages in Vidalia's 'message log' window, which they
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

198)     likely never see since they don't receive a notification that something
199)     has gone wrong. Even if the user does actually look at the message log,
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

200)     most of the messages make little sense to the novice user.</p>
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

201)     <p>Tor has the ability to inform Vidalia of many such status
202)     changes, and we recently implemented support for a couple of these
203)     events. Still, there are many more status events which the user should
204)     be informed of, and we need a better UI for actually displaying them
205)     to the user.</p>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

206)     <p>The goal of this project then is to design and implement a UI for
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

207)     displaying Tor status events to the user. For example, we might put a
208)     little badge on Vidalia's tray icon that alerts the user to new status
209)     events they should look at. Double-clicking the icon could bring up a
210)     dialog that summarizes recent status events in simple terms and maybe
211)     suggests a remedy for any negative events if they can be corrected by
212)     the user. Of course, this is just an example and one is free to
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

213)     suggest another approach.</p>
214)     <p>A person undertaking this project should have good UI design and layout
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

215)     skills and some C++ development experience. Previous experience with Qt and
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

216)     Qt's Designer will be very helpful, but are not required. Some
217)     English writing ability will also be useful, since this project will
218)     likely involve writing small amounts of help documentation that should
219)     be understandable by non-technical users. Bonus points for some graphic
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

220)     design/Photoshop fu, since we might want/need some shiny new icons too.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

221)     </li>
222)     
223)     <li>
224)     <b>Improve our unit testing process</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

225)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

226)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

227)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

228)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

229)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

230)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

231)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

232)     Likely Mentors: <i>Nick, Erinn</i>
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

233)     <p>Tor needs to be tested far more thoroughly. This is a
234)     multi-part effort. To start with, our unit test coverage should
235)     rise substantially, especially in the areas outside the utility
236)     functions. This will require significant refactoring of some parts
237)     of Tor, in order to dissociate as much logic as possible from
238)     globals.</p>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

239)     <p>Additionally, we need to automate our performance testing. We've got
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

240)     buildbot to automate our regular integration and compile testing already
241)     (though we need somebody to set it up on Windows),
242)     but we need to get our network simulation tests (as built in <a
243)     href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>)
244)     updated for more recent versions of Tor, and designed to launch a test
245)     network either on a single machine, or across several, so we can test
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

246)     changes in performance on machines in different roles automatically.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

247)     </li>
248)     
249)     <li>
250)     <b>Help with independent Tor client implementations</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

251)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

252)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

253)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

254)     Effort Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

255)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

256)     Skill Level: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

257)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

258)     Likely Mentors: <i>Bruce, Nathan</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

259)     <p>Others are currently working on Tor clients for Java, Android, and Maemo
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

260)     environments.  The first step is to get a handle on the current state of
261)     the project in which you are interested in helping; <a
262)     href="http://github.com/brl/JTor">Tor for Java</a>,
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

263)     <a href="https://svn.torproject.org/svn/projects/android/trunk/">Android/Orbot</a>,
264)      or <a href="<page docs/N900>">Tor for Maemo</a>. Check out the
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

265)     repository and familiarize yourself
266)     with the source code.  Further, support for requesting or even providing
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

267)     Tor hidden services would be neat, but not required.</p>
268)     <p>A prospective developer should be able to understand and write new Java
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

269)     code, including a Java cryptography API. Being able to read C code would be helpful,
270)     too. One should be willing to read the existing documentation,
271)     implement code based on it, and refine the documentation
272)     when things are underdocumented. This project is mostly about coding and
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

273)     to a small degree about design.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

274)     </li>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

275) 
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

276)     <li>
277)     <b>More on Orbot &amp; Android OS-specific development</b>
278)     <br/>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

279)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

280)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

281)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

282)     Effort Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

283)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

284)     Skill Level: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

285)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

286)     Likely Mentors: <i>Nathan</i>
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

287)     <p><b>Android Java UI work:</b> Improved home screen to show better
288)     statistics about data transferred (up/down), number of circuits
289)     connected, quality of connection and so on. The "Tether Wifi"
290)     Android application is a good model to follow in how it shows
291)     a realtime count of bytes transferred as well as notifications
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

292)     when wifi clients connect. In addition, better display/handling
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

293)     of Tor system/error messages would also be very helpful. Finally,
294)     the addition of a wizard or tutorial walkthrough for novice
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

295)     users to explain to them exactly what is and what is not anonymized
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

296)     or protected would greatly improve the likelihood they will use
297)     Orbot correctly.</p>
298)     
299)     <p><b>Android Java OS/Core app work:</b> Better system-wide
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

300)     indication, either via the notification bar, "Toast" pop-up dialogs
301)     or some other indicator, that an application's traffic is indeed
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

302)     moving through Orbot/Tor. For instance, right now you need to
303)     first go to a torcheck web service to ensure your browser is
304)     routing via Tor. Orbot should be able to notify you that circuits
305)     are being opened, used, etc. The aforementioned data transfer
306)     tracker might provide this type of awareness as well.</p>
307)     
308)     <p><b>Android Java Library/Community Outreach work:</b> We need
309)     to package a simple library for use with third-party application
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

310)     to easily enable them to support "Torification" on non-rooted
311)     devices (i.e. w/o transparent proxying). This library should
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

312)     include a wrapper for the Apache HTTPClient library, a utility
313)     class for detecting the state of Orbot connectivity, and other
314)     relevant/useful things an Android app might need to anonymize
315)     itself. This work would include the creation of the library,
316)     documentation, and sample code. Outreach or effort to implement
317)     the library within other open-source apps would follow.</p>
318)     
319)     <p><b>Android OS/C/Linux work:</b> The port of Tor to Android
320)     is basically a straight cross-compile to Linux ARM. There has
321)     been no work done in looking the optimization of Tor within a
322)     mobile hardware environment, on the ARM processor or other
323)     Android hardware, or on mobile networks. It should be noted,
324)     that even without optimization, Tor is handling the mobile
325)     network environment very well, automatically detecting change
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

326)     in IP addresses, reconnecting circuits, etc. across switching
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

327)     from 2G to 3G to Wifi, and so forth.</p>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

328)     </li>
329)     
330)     <li>
331)     <b>Simulator for slow Internet connections</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

332)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

333)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

334)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

335)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

336)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

337)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

338)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

339)     Likely Mentors: <i>Steven</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

340)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

341)     Many users of Tor have poor-quality Internet connections, giving low
342)     bandwidth, high latency, and high packet loss/re-ordering. User
343)     experience is that Tor reacts badly to these conditions, but it is
344)     difficult to improve the situation without being able to repeat the
345)     problems in the lab.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

346)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

347)     This project would be to build a simulation environment which
348)     replicates the poor connectivity so that the effect on Tor performance
349)     can be measured. Other components would be a testing utility to
350)     establish what are the properties of connections available, and to
351)     measure the effect of performance-improving modifications to Tor.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

352)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

353)     The tools used would be up to the student, but dummynet (for FreeBSD)
354)     and nistnet (for Linux) are two potential components on which this
355)     project could be built. Students should be experienced with network
356)     programming/debugging and TCP/IP, and preferably familiar with C and a
357)     scripting language.
358)     </li>
359)     
360)     <li>
361)     <b>An Improved and More Usable Network Map in Vidalia</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

362)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

363)     Priority: <i>Low to Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

364)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

365)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

366)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

367)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

368)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

369)     Likely Mentors: <i>Matt</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

370)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

371)     One of Vidalia's existing features is a network map that shows the user
372)     the approximate geographic location of relays in the Tor network and
373)     plots the paths the user's traffic takes as it is tunneled through the
374)     Tor network. The map is currently not very interactive and has rather
375)     poor graphics. Instead, we implemented KDE's Marble widget such
376)     that it gives us a better quality map and enables improved interactivity,
377)     such as allowing the user to click on individual relays or circuits to
378)     display additional information. We want to add the ability
379)     for users to click on a particular relay or a country containing one or
380)     more Tor exit relays and say, "I want my connections to exit
381)     from here."
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

382)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

383)     This project will first involve getting familiar with Vidalia
384)     and the Marble widget's API. One will then integrate the widget
385)     into Vidalia and customize Marble to be better suited for our application,
386)     such as making circuits clickable, storing cached map data in Vidalia's
387)     own data directory, and customizing some of the widget's dialogs.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

388)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

389)     A person undertaking this project should have good C++ development
390)     experience. Previous experience with Qt and CMake is helpful, but not
391)     required.
392)     </li>
393)     
394)     <li>
395)     <b>Torbutton equivalent for Thunderbird</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

396)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

397)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

398)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

399)     Effort Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

400)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

401)     Skill Level: <i>High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

402)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

403)     Likely Mentors: <i>Mike</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

404)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

405)     We're hearing from an increasing number of users that they want to use
406)     Thunderbird with Tor. However, there are plenty of application-level
407)     concerns, for example, by default Thunderbird will put your hostname in
408)     the outgoing mail that it sends. At some point we should start a new
409)     push to build a Thunderbird extension similar to Torbutton.
410)     </li>
411)     
412)     <li>
413)     <b>Improvements for Tor+Vidalia interaction on Linux/Unix platforms</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

414)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

415)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

416)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

417)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

418)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

419)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

420)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

421)     Likely Mentors: <i>Erinn, Peter</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

422)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

423)     Vidalia currently doesn't play nicely with Tor on Linux and Unix platforms.
424)     Currently, on Debian and Ubuntu, there is a configuration mechanism which
425)     allows Vidalia to override Tor's ability to start on boot (by sourcing
426)     <code>/etc/default/tor.vidalia</code> which sets <code>RUN_DAEMON=no</code> at the user's
427)     request), but full implementation of <a href="<gitblob>doc/spec/control-spec.txt">ControlPort</a> 
428)     communication is still required.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

429)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

430)     A better solution on Linux and Unix platforms would be to use Tor's
431)     ControlSocket, which allows Vidalia to talk to Tor via a Unix domain socket,
432)     and could possibly be enabled by default in Tor's distribution packages.
433)     Vidalia can then authenticate to Tor using filesystem-based (cookie)
434)     authentication if the user running Vidalia is also in the distribution-specific
435)     tor group.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

436)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

437)     This project will first involve adding support for Tor's ControlSocket to
438)     Vidalia. The student will then develop and test this support on various
439)     distributions to make sure it behaves in a predictable and consistent manner on
440)     all of them.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

441)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

442)     The next challenge would be to find an intuitive and usable way for Vidalia to be
443)     able to change Tor's configuration (torrc) even though it is located in
444)     <code>/etc/tor/torrc</code> and thus immutable. In Debian and Ubuntu we handle
445)     this with the aforementioned <code>/etc/default/tor.vidalia</code> but this
446)     functionality could (or should) be less distribution-specific. 
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

447)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

448)     The best idea we've come up with so far is to feed Tor a new configuration via
449)     the ControlSocket when Vidalia starts, but that's bad because if the user is not
450)     using the latest Debian/Ubuntu packages, they may not have disabled Tor's
451)     ability to run on boot and will end up with a configuration that is different
452)     from what they want. The second best idea we've come up with is for Vidalia to
453)     write out a temporary torrc file and ask the user to manually move it to
454)     <code>/etc/tor/torrc</code>, but that's bad because users shouldn't have to
455)     mess with files directly.
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

456)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

457)     A person undertaking this project should have prior knowledge of various Linux
458)     distributions and their packaging mechanisms as well as some C++ development
459)     experience. Previous experience with Qt is helpful, but not required.
460)     </li>
461)     
462)     
463)     <li>
464)     <b>Usability testing of Tor</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

465)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

466)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

467)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

468)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

469)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

470)     Skill Level: <i>Low to Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

471)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

472)     Likely Mentors: <i>Andrew</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

473)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

474)     Especially the browser bundle, ideally amongst our target demographic.
475)     That would help a lot in knowing what needs to be done in terms of bug
476)     fixes or new features. We get this informally at the moment, but a more
477)     structured process would be better.
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

478)     </li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

479)     
480)     <li>
481)     <b>An authenticating IRC proxy</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

482)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

483)     Priority: <i>Low</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

484)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

485)     Effort Level: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

486)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

487)     Skill Level: <i>Medium to High</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

488)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

489)     Likely Mentors: <i>Sebastian, Weasel, Roger</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

490)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

491)     The world needs an authenticating irc proxy. As we're periodically
492)     reminded from the Penny Arcade web comic, "Internet user + anonymity =
493)     jerk". With respect to websites we're actually doing ok, since websites
494)     can make their users log in and use other application-level authentication
495)     approaches. But IRC servers are much worse off, because most IRC server
496)     code is poorly written: hard to maintain, and harder to modify. Many
497)     IRC networks now block connections from Tor, and we're basically down to
498)     two holdouts (OFTC and Freenode). This state of affairs means that a lot
499)     of people around the world are thinking "I told you so" about anonymity
500)     online, when in fact the problem is simply lack of technology to make the
501)     problem manageable. We need some way to let the IRC networks distinguish
502)     which users have developed a reputation as not being jerks, so they can
503)     treat the two groups separately. There are some really cool research
504)     designs like <a href="http://www.cs.dartmouth.edu/~nymble/">Nymble</a>,
505)     which aim to let websites blacklist users without needing to learn who
506)     they are.  But Nymble is designed around web interactions. We need to
507)     build the glue around the IRC protocol that would let us plug in a project
508)     like Nymble (or a simpler one to start, as a proof-of-concept). One way
509)     to do that would be to build an IRC proxy that knows how to hear from
510)     IRC clients, knows how to talk to IRC servers, and has an additional
511)     layer that requires the users to authenticate.  Some work on this has
512)     begun by other volunteers, see their progress at <a
513)     href="http://github.com/anonirc/orc">http://github.com/anonirc/orc</a>.
514)     </li>
515)     
516)     <li>
517)     <b>Make torsocks/dsocks work on OS X</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

518)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

519)     Priority: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

520)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

521)     Effort Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

522)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

523)     Skill Level: <i>Medium</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

524)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

525)     Likely Mentors: <i>?</i>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

526)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

527)     <a href="http://code.google.com/p/torsocks/">Torsocks</a> and <a
528)     href="http://code.google.com/p/dsocks/">dsocks</a> are wrappers that will
529)     run applications, intercept their outgoing network connections, and push
530)     those connections through Tor. The goal is to handle applications that
531)     don't support proxies (or don't supporting them well). To get it right,
532)     they need to intercept many system calls. The syscalls you need to
533)     intercept on Linux differ dramatically from those on BSD. So Torsocks
534)     works fine on Linux, dsocks works ok on BSD (though it may be less
535)     maintained and thus might miss more syscalls), and nothing works well
536)     on both. First, we should patch dsocks to use Tor's <i>mapaddress</i>
537)     commands from the controller interface, so we don't waste a whole
538)     round-trip inside Tor doing the resolve before connecting. Second,
539)     we should make our <i>torify</i> script detect which of torsocks or
540)     dsocks is installed, and call them appropriately. This probably means
541)     unifying their interfaces, and might involve sharing code between them
542)     or discarding one entirely.
543)     </li>
544)     
545)     <li>
546)     <b>Bring up new ideas!</b>
Sebastian Hahn We decided to go with HTML...

Sebastian Hahn authored 13 years ago

547)     <br>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

548)     Don't like any of these? Look at the <a
549)     href="<gitblob>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
550)     roadmap</a> for more ideas, or just try out Tor, Vidalia, and Torbutton,
551)     and find out what you think needs fixing.
552)     Some of the <a href="<gittree>doc/spec/proposals">current proposals</a>
553)     might also be short on developers.
554)     </li>
555)     
556)     </ol>
557)     
558)     <a id="OtherCoding"></a>
559)     <h2><a class="anchor" href="#OtherCoding">Other Coding and Design related ideas</a></h2>
560)     <ol>
561)     <li>Tor relays don't work well on Windows XP. On
562)     Windows, Tor uses the standard <tt>select()</tt> system
563)     call, which uses space in the non-page pool. This means
564)     that a medium sized Tor relay will empty the non-page pool, <a
565)     href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/WindowsBufferProblems">causing
566)     havoc and system crashes</a>. We should probably be using overlapped IO
567)     instead. One solution would be to teach <a
568)     href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use
569)     overlapped IO rather than select() on Windows, and then adapt Tor to
570)     the new libevent interface. Christian King made a
571)     <a href="https://svn.torproject.org/svn/libevent-urz/trunk/">good
572)     start</a> on this in the summer of 2007.</li>
573)     
574)     <li>We need to actually start building our <a href="<page
575)     docs/documentation>#DesignDoc">blocking-resistance design</a>. This involves
576)     fleshing out the design, modifying many different pieces of Tor, adapting
577)     <a href="<page projects/vidalia>">Vidalia</a> so it supports the
578)     new features, and planning for deployment.</li>
579)     
580)     <li>We need a flexible simulator framework for studying end-to-end
581)     traffic confirmation attacks. Many researchers have whipped up ad hoc
582)     simulators to support their intuition either that the attacks work
583)     really well or that some defense works great. Can we build a simulator
584)     that's clearly documented and open enough that everybody knows it's
585)     giving a reasonable answer? This will spur a lot of new research.
586)     See the entry <a href="#Research">below</a> on confirmation attacks for
587)     details on the research side of this task &mdash; who knows, when it's
588)     done maybe you can help write a paper or three also.</li>
589)     
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

590)     <li>Tor 0.1.1.x and later include support for hardware crypto
591)     accelerators via OpenSSL. It has been lightly tested and is
592)     possibly very buggy.  We're looking for more rigorous testing,
Andrew Lewman apply fixes from rransom.

Andrew Lewman authored 13 years ago

593)     performance analysis, and optimally, code fixes to OpenSSL and
Andrew Lewman format the paragraphs corre...

Andrew Lewman authored 13 years ago

594)     Tor if needed.</li>
Andrew Lewman first cut of the new, shiny...

Andrew Lewman authored 13 years ago

595)     
596)     <li>Perform a security analysis of Tor with <a
597)     href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine
598)     if there are good fuzzing libraries out there for what we want. Win fame by
599)     getting credit when we put out a new release because of you!</li>
600)     
601)     <li>Tor uses TCP for transport and TLS for link
602)     encryption. This is nice and simple, but it means all cells
603)     on a link are delayed when a single packet gets dropped, and
604)     it means we can only reasonably support TCP streams. We have a <a
605)     href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldtransportallIPpacketsnotjustTCPpackets.">list
606)     of reasons why we haven't shifted to UDP transport</a>, but it would
607)     be great to see that list get shorter. We also have a proposed <a
608)     href="<gitblob>doc/spec/proposals/100-tor-spec-udp.txt">specification
609)     for Tor and
610)     UDP</a> &mdash; please let us know what's wrong with it.</li>
611)     
612)     <li>We're not that far from having IPv6 support for destination addresses
613)     (at exit nodes). If you care strongly about IPv6, that's probably the
614)     first place to start.</li>
615)     
616)     <li>We need a way to generate the website diagrams (for example, the "How
617)     Tor Works" pictures on the <a href="<page about/overview>">overview page</a>
618)     from source, so we can translate them as UTF-8 text rather than edit
619)     them by hand with Gimp. We might want to
620)     integrate this as an wml file so translations are easy and images are
621)     generated in multiple languages whenever we build the website.</li>
622)     
623)     <li>How can we make the various LiveCD/USB systems easier
624)     to maintain, improve, and document?  One example is <a
625)     href="https://amnesia.boum.org/">The (Amnesic) Incognito Live
626)     System</a>.
627)     </li>
628)     
629)     <li>
630)     Another anti-censorship project is to try to make Tor
631)     more scanning-resistant.  Right now, an adversary can identify <a
632)     href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
633)     just by trying to connect to them, following the Tor protocol,
634)     and seeing if they respond.  To solve this, bridges could <a
635)     href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
636)     webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
637)     and not act like bridges until the user provides a bridge-specific key.
638)     To start, check out Shane Pope's <a
639)     href="http://dl.dropbox.com/u/37735/index.html">thesis and prototype</a>.
640)     </li>
641)     
642)     </ol>
643)     
644)     <a id="Research"></a>
645)     <h2><a class="anchor" href="#Research">Research</a></h2>
646)     <ol>
647)     <li>The "end-to-end traffic confirmation attack":
648)     by watching traffic at Alice and at Bob, we can <a
649)     href="http://freehaven.net/anonbib/#danezis:pet2004">compare
650)     traffic signatures and become convinced that we're watching the same
651)     stream</a>. So far Tor accepts this as a fact of life and assumes this
652)     attack is trivial in all cases. First of all, is that actually true? How
653)     much traffic of what sort of distribution is needed before the adversary
654)     is confident he has won? Are there scenarios (e.g. not transmitting much)
655)     that slow down the attack? Do some traffic padding or traffic shaping
656)     schemes work better than others?</li>
657)     <li>A related question is: Does running a relay/bridge provide additional
658)     protection against these timing attacks? Can an external adversary that can't
659)     see inside TLS links still recognize individual streams reliably?
660)     Does the amount of traffic carried degrade this ability any? What if the
661)     client-relay deliberately delayed upstream relayed traffic to create a queue
662)     that could be used to mimic timings of client downstream traffic to make it
663)     look like it was also relayed? This same queue could also be used for masking
664)     timings in client upstream traffic with the techniques from <a
665)     href="http://www.freehaven.net/anonbib/#ShWa-Timing06">adaptive padding</a>,
666)     but without the need for additional traffic. Would such an interleaving of
667)     client upstream traffic obscure timings for external adversaries? Would the
668)     strategies need to be adjusted for asymmetric links? For example, on
669)     asymmetric links, is it actually possible to differentiate client traffic from
670)     natural bursts due to their asymmetric capacity? Or is it easier than
671)     symmetric links for some other reason?</li>
672)     <li>Repeat Murdoch and Danezis's <a
673)     href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta">attack from
674)     Oakland 05</a> on the current Tor network. See if you can learn why it
675)     works well on some nodes and not well on others. (My theory is that the
676)     fast nodes with spare capacity resist the attack better.) If that's true,
677)     then experiment with the RelayBandwidthRate and RelayBandwidthBurst
678)     options to run a relay that is used as a client while relaying the
679)     attacker's traffic: as we crank down the RelayBandwidthRate, does the
680)     attack get harder? What's the right ratio of RelayBandwidthRate to
681)     actually capacity? Or is it a ratio at all? While we're at it, does a
682)     much larger set of candidate relays increase the false positive rate
683)     or other complexity for the attack? (The Tor network is now almost two
684)     orders of magnitude larger than it was when they wrote their paper.) Be
685)     sure to read <a href="http://freehaven.net/anonbib/#clog-the-queue">Don't
686)     Clog the Queue</a> too.</li>
687)     <li>The "routing zones attack": most of the literature thinks of
688)     the network path between Alice and her entry node (and between the
689)     exit node and Bob) as a single link on some graph. In practice,
690)     though, the path traverses many autonomous systems (ASes), and <a
691)     href="http://freehaven.net/anonbib/#feamster:wpes2004">it's not uncommon
692)     that the same AS appears on both the entry path and the exit path</a>.
693)     Unfortunately, to accurately predict whether a given Alice, entry,
694)     exit, Bob quad will be dangerous, we need to download an entire Internet
695)     routing zone and perform expensive operations on it. Are there practical
696)     approximations, such as avoiding IP addresses in the same /8 network?</li>
697)     <li>Other research questions regarding geographic diversity consider
698)     the tradeoff between choosing an efficient circuit and choosing a random
699)     circuit. Look at Stephen Rollyson's <a
700)     href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position
701)     paper</a> on how to discard particularly slow choices without hurting
702)     anonymity "too much". This line of reasoning needs more work and more
703)     thinking, but it looks very promising.</li>
704)     <li>Tor doesn't work very well when relays have asymmetric bandwidth
705)     (e.g. cable or DSL). Because Tor has separate TCP connections between
706)     each hop, if the incoming bytes are arriving just fine and the outgoing
707)     bytes are all getting dropped on the floor, the TCP push-back mechanisms
708)     don't really transmit this information back to the incoming streams.
709)     Perhaps Tor should detect when it's dropping a lot of outgoing packets,
710)     and rate-limit incoming streams to regulate this itself? I can imagine
711)     a build-up and drop-off scheme where we pick a conservative rate-limit,
712)     slowly increase it until we get lost packets, back off, repeat. We
713)     need somebody who's good with networks to simulate this and help design
714)     solutions; and/or we need to understand the extent of the performance
715)     degradation, and use this as motivation to reconsider UDP transport.</li>
716)     <li>A related topic is congestion control. Is our
717)     current design sufficient once we have heavy use? Maybe
718)     we should experiment with variable-sized windows rather
719)     than fixed-size windows? That seemed to go well in an <a
720)     href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">ssh
721)     throughput experiment</a>. We'll need to measure and tweak, and maybe
722)     overhaul if the results are good.</li>
723)     <li>Our censorship-resistance goals include preventing
724)     an attacker who's looking at Tor traffic on the wire from <a
725)     href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing
726)     it from normal SSL traffic</a>. Obviously we can't achieve perfect
727)     steganography and still remain usable, but for a first step we'd like to
728)     block any attacks that can win by observing only a few packets. One of
729)     the remaining attacks we haven't examined much is that Tor cells are 512
730)     bytes, so the traffic on the wire may well be a multiple of 512 bytes.
731)     How much does the batching and overhead in TLS records blur this on the
732)     wire? Do different buffer flushing strategies in Tor affect this? Could
733)     a bit of padding help a lot, or is this an attack we must accept?</li>
734)     <li>Tor circuits are built one hop at a time, so in theory we have the
735)     ability to make some streams exit from the second hop, some from the
736)     third, and so on. This seems nice because it breaks up the set of exiting
737)     streams that a given relay can see. But if we want each stream to be safe,
738)     the "shortest" path should be at least 3 hops long by our current logic, so
739)     the rest will be even longer. We need to examine this performance / security
740)     tradeoff.</li>
741)     <li>It's not that hard to DoS Tor relays or directory authorities. Are client
742)     puzzles the right answer? What other practical approaches are there? Bonus
743)     if they're backward-compatible with the current Tor protocol.</li>
744)     <li>Programs like <a
Andrew Lewman get the website to build cl...

Andrew Lewman authored 13 years ago

745)     href="<page torbutton/index>">Torbutton</a> aim to hide