b687a4620dadb75dbd385b445cb7ceebd0fcaf94
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

1) <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
2) "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
3) 
4) <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
5) <head>
6)   <title>Tor: Contribute</title>
7)   <meta name="Author" content="Roger Dingledine" />
8)   <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
9)   <link rel="stylesheet" type="text/css" href="stylesheet.css" />
10)   <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" />
11) </head>
12) <body>
13) 
14) <!-- TITLE BAR & NAVIGATION -->
15) 
16) <table class="banner" border="0" cellpadding="0" cellspacing="0">
17)     <tr>
18)         <td class="banner-left"></td>
19)         <td class="banner-middle">
20)             <a href="index.html">Home</a>
21)           | <a href="howitworks.html">How It Works</a>
22)           | <a href="download.html">Download</a>
23)           | <a href="documentation.html">Docs</a>
24)           | <a href="users.html">Users</a>
25)           | <a href="faq.html">FAQs</a>
26)           | <a class="current">Contribute</a>
27)           | <a href="developers.html">Developers</a>
28)           | <a href="research.html">Research</a>
29)           | <a href="people.html">People</a>
30)         </td>
31)         <td class="banner-right"></td>
32)     </tr>
33) </table>
34) 
35) <!-- END TITLE BAR & NAVIGATION -->
36) 
37) <div class="center">
38) 
39) <div class="main-column">
40) 
41) <!-- PUT CONTENT AFTER THIS TAG -->
42) <pre>
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

43)     Six things everyone can do now:
44)     <ol>
45)     <li> We need users like you to try Tor out, and let the Tor
46)     developers know about bugs you find or features you don't find.</li>
47)     <li> Please consider running a server to help the Tor network
48)     grow.</li>
49)     <li> We especially need people with Windows programming skills to run
50)     an exit server on Windows, to help us debug.</li>
51)     <li> Run a Tor hidden service and put interesting content on it.</li>
52)     <li> Tell your friends! Get them to run servers. Get them to run hidden
53)     services. Get them to tell their friends.</li>
54)     <li> Consider joining the Electronic Frontier Foundation. More EFF
55)     donations means more freedom in the world, including more Tor
56)     development.</li>
57)     </ol>
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

58) 
59) ****coding challenges****
60) 	**easy**
61) 	**medium**
62) 	**hard**
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

63)   - Update crypto usage to use openssl aes when available.
64)   - Implement a buffer design modelled after the linux kernel buffer design.
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

65)   - how do ulimits work on win32, anyway?  (We should handle WSAENOBUFS as needed, look at the MaxConnections registry entry, look at the MaxUserPort entry, and look at the TcpTimedWaitDelay entry. We may also want to provide a way to set them as needed. See bug 98.)
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

66)   - Implement reverse DNS (already specified)
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

67)   - Implement a FirewalledIPs config option that works like FirewallPorts.
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

68)   - Make configure.in handle cross-compilation
69)     - Have NULL_REP_IS_ZERO_BYTES default to 1.
70)     - Make with-ssl-dir disable search for ssl.
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

71)   - Implement preservation of reputation through reboots for clients and dirservers. 
72)   - Add in support egd or other non-OS-integrated strong entropy sources.
73)   - Implement password protection for on-disk identity key
74)   - Implement a way to get autoconf to install things into ~/.tor.
75)   - Change server descriptors to declare log level.
76)   - Add in support for clients to avoid servers that are too loggy based upon user configuration of acceptable log level.
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

77)   - Separate node discovery from routing to allow neat extensions. [Goodell?]
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

78)     - Add SetServerStatus control event to adjust verified/running status of nodes.
79)     - Add NoDownload config option to prevent regular directory downloads from happening.
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

80)   - Choosing exit node by meta-data, e.g. country.
81)   - Use cpuworker for more heavy lifting.
82)     - Signing (and verifying) hidserv descriptors
83)     - Signing (and verifying) intro/rend requests
84)     - Signing (and verifying) router descriptors
85)     - Signing (and verifying) directories
86)     - Doing TLS handshake (this is very hard to separate out, though)
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

87)   - Buffer size pool: allocate a maximum size for all buffers, not a maximum size for each buffer. So we don't have to give up as quickly (and kill the thickpipe!) when there's congestion.
88)   - Add alternative versions of crypto.c and tortls.c to use libnss or libgcrypt+gnutls.
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

89)   - Implement a way to stop falling back to forbidden ports when FascistFirewall blocks all good dirservers, if there is already a good, cached directory locally.
90)   - Extend our NSIS-based windows installer to include FreeCap and/or Privoxy.
91)   - Develop a way to handle OS X installation and uninstallation.
92)   - Develop a GUI or other controller program, to do configuration, etc. See our control specification for details, and the rudimentary demonstration Python control script. 
93)   	-Design an interface for the control program. You can use any license you want, but we'd recommend 3-clause BSD or maybe GPL; and we can only help out if your license conforms to the DFSG.
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

94)     - Periodically people running servers tells us they want to have one BandwidthRate during some part of the day, and a different BandwidthRate at other parts of the day. Rather than coding this inside Tor, we should have a little script that speaks via the Tor Controller Interface, and does a setconf to change the bandwidth rate. Perhaps it would run out of cron, or perhaps it would sleep until appropriate times and then do its tweak (that's probably more portable). Can somebody write one for us and we'll put it inside tor/contrib/?
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

95)     - Develop a way to become a Windows NT service.  
96)     - Develop a systray app for Tor under MS Windows (all versions). 
97)     - Integrate a good (portable, fast, clean, BSD-free) asynchronous DNS library so we don't have to keep forking DNS worker threads to do gethostbyname.
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

98) 
99) ****documentation challenges****
100) 	**easy**
101) 	**medium**
102) 	**hard**
103) 
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

104)   - Write server instructions for OSX and Windows operators.
105)   - Improve and clarify the wiki entry on port forwarding. url?
106)   - Document how to do exit node caching: tie into squid or other caching web proxy.
107)   - Help maintain this website; code, content, css, overall layout,
108)   - Help with documentation 
109)   - Help consolidate documentation.  We may have too much documentation. It's spread out too far and duplicates itself in places. 
110)   - Help translate the web page and documentation into other languages. See the translation guidelines if you want to help out. (Examples: French , Persian and Vietnamese.)
111)   - If you know the answer to a Wiki question in the "unanswered FAQs" list, please answer it. url?
112)   - Take a look at Martin's Squid and Tor page, and update it to reflect Tor's RedirectExit config option. url?
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

113) 
114) ****testing challenges****
115) 	**easy**
116) 	**medium**
117) 	**hard**
118) 
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

119)   - Test out why some of our tor servers have dns resolvers that resolve unknown addresses to 127.0.0.1.  
120)   	- Identify the servers that experience this issue. 
121) 	- Identify how to cause and repair the issue in BIND, DJBDNS, or whatever daemon the misconfigured servers use.
122)   - Figure out how to setup web proxy gateways to let normal people browse hidden services.  (This has been done a few times, but nobody has sent us code.)
123)   - Investigate privoxy vs. freecap for win32 clients
124)   - Evaluate, create, and document a list of programs that work with Tor.  
125)   - Perform a security analysis of Tor with "fuzz". Determine if there good libraries out there for what we want. Win fame by getting credit when we put out a new release because of you!
126)   - Website volume fingerprinting attacks (Back et al, Hintz). Defenses include a large cell size, defensive dropping, etc. How well does each approach work?
127)   - The end-to-end traffic confirmation attack. We need to study long-range dummies more, along with traffic shaping. How much traffic of what sort of distribution is needed before the adversary is confident he has won?
128)   - Determine what sensitive info squeaks by privoxy. 
129)   - Deteremine if there are other html scrubbers that are better than privoxy.
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

130) 
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

131) ****research challenges****
132) 	**easy**
133) 	**medium**
134) 	**hard**
Andrew Lewman new-contribute.html: This...

Andrew Lewman authored 19 years ago

135) 
136)   - Arranging membership management for independence.
137)     Sybil defenses without having a human bottleneck.
138)     How to gather random sample of nodes.
139)     How to handle nodelist recommendations.
140)     Consider incremental switches: a p2p tor with only 50 users has
141)       different anonymity properties than one with 10k users, and should
142)       be treated differently.
143)   - Incentives to relay; incentives to exit.
144)   - Allowing dissidents to relay through Tor clients.
145)   - Experiment with mid-latency systems. How do they impact usability,
146)     how do they impact safety?
147)   - Understand how powerful fingerprinting attacks are, and experiment
148)     with ways to foil them (long-range padding?).
149)   - Come up with practical approximations to picking entry and exit in
150)     different routing zones.
151)   - Find ideal churn rate for helper nodes; how safe is it?
152)   - Attacking freenet-gnunet/timing-delay-randomness-arguments.
153)   - Is exiting from the middle of the circuit always a bad idea?
154)   - IPv6 support (For exit addresses)
155)     - Spec issue: if a resolve returns an IP4 and an IP6 address,
156)       which to use?
157)     - Add to exit policy code
158)     - Make tor_gethostbyname into tor_getaddrinfo
159)     - Make everything that uses uint32_t as an IP address change to use
160)       a generalize address struct.
161)     - Change relay cell types to accept new addresses.
162)     - Add flag to serverdescs to tell whether IPv6 is supported.
163)   - patch tsocks with our current patches + gethostbyname, getpeername, etc.
164)   - make freecap (or whichever) do what we want.
165)   - scrubbing proxies for protocols other than http.
166)   - We need better default privoxy configs to ship.
167)   - We need a good scrubbing HTTP proxy; privoxy is unmaintained and sucky.
168)   - A DNS proxy would let unmodified socks4/socks5 apps to work well.
169)   - Add SOCKS support to more applications
170)   - store hidden service information to disk: dirservers forget service
171)     descriptors when they restart; nodes offering hidden services forget
172)     their chosen intro points when they restart.
Andrew Lewman re-arranged to new categori...

Andrew Lewman authored 19 years ago

173)   - It's not that hard to DoS Tor servers or dirservers. Are puzzles the right answer? What other practical approaches are there?
174)     - Server CPU load is high because clients keep asking to make new circuits, which uses public key crypto. Possible defenses include: using helper nodes (fixed entry nodes); rate limiting the number of create cells handled per second; having clients retry failed extensions a few times; implementing ssl sessions; and using hardware crypto when available.
175)     - We fear we might not work very well when servers have asymmetric bandwidth. Because Tor has separate TCP connections between each hop, if the incoming bytes are arriving just fine and the outgoing bytes are all getting dropped on the floor, the TCP push-back mechanisms don't really transmit this information back to the incoming streams. Perhaps Tor should detect when it's dropping a lot of outgoing packets, and rate-limit incoming streams to regulate this itself? We need somebody who's good with networks to simulate this and help design solutions.
176)     - Right now the hidden service descriptors are being stored on the dirservers, but any reliable distributed storage system would do (for example, a DHT that allows authenticated updates). Can somebody figure out our best options and decide if they're good enough?
177)     - How hard is it to patch bind or a DNS proxy to redirect requests to Tor via our tor-resolve socks extension? What about to convert UDP DNS requests to TCP requests and send them through Tor?
178)     - Tor provides anonymous connections, but if you want to keep multiple pseudonyms in practice (say, in case you frequently go to two websites and if anybody knew about both of them they would conclude it's you), we don't support that well yet. We should find a good approach and interface for handling pseudonymous profiles in Tor. See this post and followup for details.
Andrew Lewman Rewrote most of the to do i...

Andrew Lewman authored 19 years ago

179)   - Congestion control. Is our current design sufficient once we have heavy use? Need to measure and tweak, or maybe overhaul.