first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1) ## translation metadata
|
looks like we never set the...
Roger Dingledine authored 13 years ago
|
2) # Revision: $Revision$
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
3) # Translation-Priority: 4-optional
4)
5) #include "head.wmi" TITLE="Tor: Volunteer" CHARSET="UTF-8"
6) <div id="content" class="clearfix">
7) <div id="breadcrumbs">
|
change all of the breadcrum...
Andrew Lewman authored 13 years ago
|
8) <a href="<page index>">Home » </a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
9) <a href="<page getinvolved/volunteer>">Volunteer</a>
10) </div>
11) <div id="maincol">
12) <!-- PUT CONTENT AFTER THIS TAG -->
13) <h1>A few things everyone can do now:</h1>
14) <ol>
15) <li>Please consider <a href="<page docs/tor-doc-relay>">running
16) a relay</a> to help the Tor network grow.</li>
17) <li>Tell your friends! Get them to run relays. Get them to run hidden
18) services. Get them to tell their friends.</li>
19) <li>If you like Tor's goals, please <a href="<page donate/donate>">take a moment
20) to donate to support further Tor development</a>. We're also looking
21) for more sponsors — if you know any companies, NGOs, agencies,
22) or other organizations that want anonymity / privacy / communications
23) security, let them know about us.</li>
24) <li>We're looking for more <a href="<page about/torusers>">good examples of Tor
25) users and Tor use cases</a>. If you use Tor for a scenario or purpose not
26) yet described on that page, and you're comfortable sharing it with us,
27) we'd love to hear from you.</li>
28) </ol>
29)
30) <p>Tor has <a href="<page getinvolved/open-positions>">two open positions</a>.
31) Please <a href="<page about/contact>">contact us</a> if you are qualified!</p>
32)
33) <a id="Documentation"></a>
34) <h2><a class="anchor" href="#Documentation">Documentation</a></h2>
35) <ol>
36) <li>Help translate the web page and documentation into other
37) languages. See the <a href="<page getinvolved/translation>">translation
38) guidelines</a> if you want to help out. We especially need Arabic or
39) Farsi translations, for the many Tor users in censored areas.</li>
40) <li>Evaluate and document
41) <a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorifyHOWTO">our
42) list of programs</a> that can be configured to use Tor.</li>
43) <li>We have a huge list of <a
44) href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/SupportPrograms">potentially useful
45) programs that interface to Tor</a>. Which ones are useful in which
46) situations? Please help us test them out and document your results.</li>
47) </ol>
48)
49) <a id="Advocacy"></a>
50) <h2><a class="anchor" href="#Advocacy">Advocacy</a></h2>
51) <ol>
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
52) <li>Create a <a
53) href="https://trac.torproject.org/projects/tor/wiki/CommunityLogos">community
54) logo</a> under a Creative Commons license that all can use and modify.</li>
55) <li>Create a presentation that can be used for various user group
56) meetings around the world.</li>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
57) <li>Create a video about the positive uses of Tor, what Tor is,
58) or how to use it. Some have already started on <a
59) href="http://media.torproject.org/video/">Tor's Media server</a>,
60) <a
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
61) href="http://www.howcast.com/videos/90601-How-To-Circumvent-an-Internet-Proxy">Howcast</a>,
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
62) and <a href="http://www.youtube.com/thetorproject">YouTube</a>.</li>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
63) <li>Create a poster, or a set of posters, around a theme,
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
64) such as "Tor for Freedom!".</li>
|
add another advocacy thing.
Andrew Lewman authored 13 years ago
|
65) <li>Create a t-shirt design that incorporates "Congratulations!
66) You are using Tor!" in any language.</li>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
67) </ol>
68)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
69) <a id="Projects"></a>
70) <h2><a class="anchor" href="#Projects">Projects</a></h2>
71)
72) <p>
73) Below are a list of Tor related projects we're developing and/or
74) maintaining. Most discussions happen on IRC so if you're interested in any
75) of these (or you have a project idea of your own), then please <a
|
Project members aren't list...
Sebastian Hahn authored 13 years ago
|
76) href="<page about/contact>#irc">join us in #tor-dev</a>. Don't be shy
77) to ask questions, and don't hesitate to ask even if the main contributors
78) aren't active at that moment.
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
79) </p>
80)
81) <table id="projects">
82) <tr>
83) <th>Name</th>
84) <th>Category</th>
85) <th>Language</th>
86) <th>Activity</th>
87) <th>Contributors</th>
88) </tr>
89)
90) <tr>
91) <td><a href="#project-tor">Tor</a></td>
92) <td>Core</td>
93) <td>C</td>
94) <td>Heavy</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
95) <td>nickm, arma, Sebastian</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
96) </tr>
97)
98) <tr class="alt">
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
99) <td>*<a href="#project-jtor">JTor</a></td>
100) <td>Core</td>
101) <td>Java</td>
102) <td>None</td>
103) <td></td>
104) </tr>
105)
106) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
107) <td><a href="#project-tbb">TBB</a></td>
108) <td>Usability</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
109) <td>Sys Admin</td>
110) <td>Moderate</td>
|
Replacing Erinn's nick with...
Damian Johnson authored 13 years ago
|
111) <td>Erinn</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
112) </tr>
113)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
114) <tr class="alt">
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
115) <td><a href="#project-tails">TAILS</a></td>
116) <td>Usability</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
117) <td>Sys Admin</td>
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
118) <td>Heavy</td>
119) <td><a href="https://amnesia.boum.org/chat/">#tails</a></td>
120) </tr>
121)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
122) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
123) <td><a href="#project-torsocks">Torsocks</a></td>
124) <td>Usability</td>
125) <td>C</td>
126) <td>Light</td>
127) <td>mwenge</td>
128) </tr>
129)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
130) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
131) <td>*<a href="#project-torouter">Torouter</a></td>
132) <td>Usability</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
133) <td>Sys Admin</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
134) <td>Light</td>
135) <td>ioerror, Runa</td>
136) </tr>
137)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
138) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
139) <td><a href="#project-vidalia">Vidalia</a></td>
140) <td>User Interface</td>
141) <td>C++, Qt</td>
142) <td>Light</td>
143) <td>chiiph</td>
144) </tr>
145)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
146) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
147) <td><a href="#project-arm">Arm</a></td>
148) <td>User Interface</td>
149) <td>Python, Curses</td>
150) <td>Heavy</td>
151) <td>atagar</td>
152) </tr>
153)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
154) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
155) <td><a href="#project-orbot">Orbot</a></td>
156) <td>User Interface</td>
157) <td>Java</td>
|
Changing Orbot to light act...
Damian Johnson authored 13 years ago
|
158) <td>Light</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
159) <td>n8fr8</td>
160) </tr>
161)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
162) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
163) <td><a href="#project-torbutton">Torbutton</a></td>
164) <td>Browser Add-on</td>
165) <td>Javascript</td>
166) <td>Moderate</td>
167) <td>mikeperry</td>
168) </tr>
169)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
170) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
171) <td>*<a href="#project-thandy">Thandy</a></td>
172) <td>Updater</td>
173) <td>Python</td>
174) <td>Light</td>
|
Project members aren't list...
Sebastian Hahn authored 13 years ago
|
175) <td>Sebastian, Erinn, nickm</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
176) </tr>
177)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
178) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
179) <td><a href="#project-torctl">TorCtl</a></td>
180) <td>Library</td>
181) <td>Python</td>
182) <td>Light</td>
183) <td>mikeperry</td>
184) </tr>
185)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
186) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
187) <td><a href="#project-metrics">Metrics</a></td>
188) <td>Client Service</td>
189) <td>Java</td>
190) <td>Heavy</td>
191) <td>karsten</td>
192) </tr>
193)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
194) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
195) <td><a href="#project-torstatus">TorStatus</a></td>
196) <td>Client Service</td>
197) <td>PHP</td>
198) <td>None</td>
199) <td></td>
200) </tr>
201)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
202) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
203) <td><a href="#project-weather">Weather</a></td>
204) <td>Client Service</td>
205) <td>Python</td>
206) <td>Light</td>
207) <td>kaner</td>
208) </tr>
209)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
210) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
211) <td><a href="#project-gettor">GetTor</a></td>
212) <td>Client Service</td>
213) <td>Python</td>
214) <td>None</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
215) <td>kaner</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
216) </tr>
217)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
218) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
219) <td><a href="#project-torcheck">TorCheck</a></td>
220) <td>Client Service</td>
221) <td>Python, Perl</td>
222) <td>None</td>
223) <td></td>
224) </tr>
225)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
226) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
227) <td><a href="#project-bridgedb">BridgeDB</a></td>
228) <td>Backend Service</td>
229) <td>Python</td>
230) <td>None</td>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
231) <td>kaner, nickm</td>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
232) </tr>
233)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
234) <tr>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
235) <td><a href="#project-torflow">TorFlow</a></td>
236) <td>Backend Service</td>
237) <td>Python</td>
238) <td>None</td>
239) <td>mikeperry</td>
240) </tr>
241)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
242) <tr class="alt">
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
243) <td>*<a href="#project-torbel">TorBEL</a></td>
244) <td>Backend Service</td>
245) <td>Python</td>
246) <td>None</td>
247) <td>Sebastian</td>
248) </tr>
249) </table>
250)
251) <sub>
252) * Project is still in an alpha state.
253) </sub>
254)
255) <br /><br />
256)
257) <a id="project-tor"></a>
258) <h3>Tor (<a href="https://gitweb.torproject.org/tor.git">code</a>, <a
259) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Client&component=Tor+Relay&component=vidalia&order=priority">bug
260) tracker</a>)</h3>
261)
262) <p>
263) Central project, providing the core software for using and participating in
264) the Tor network. Numerous people contribute to the project to varying
265) extents, but the chief architects are Nick Mathewson and Roger Dingledine.
266) </p>
267)
268) <p>
269) <b>Project Ideas:</b><br />
270) <i><a href="#resistCensorship">Improving Tor's ability to resist
271) censorship</a></i><br />
272) <i><a href="#unitTesting">Improve our unit testing process</a></i><br />
273) <i><a href="#simulateSlowConnections">Simulator for slow Internet connections</a></i>
274) </p>
275)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
276) <a id="project-jtor"></a>
277) <h3><a href="https://github.com/brl/JTor/wiki">JTor</a> (<a
278) href="https://github.com/brl/JTor">code</a>, <a
279) href="https://github.com/brl/JTor/issues">bug
280) tracker</a>)</h3>
281)
282) <p>
283) Java implementation of Tor and successor to <a
284) href="http://onioncoffee.sourceforge.net/">OnionCoffee</a>. This project
285) isn't yet complete, and has been inactive since Fall 2010.
286) </p>
287)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
288) <a id="project-tbb"></a>
289) <h3><a href="<page projects/torbrowser>">Tor Browser Bundle</a> (<a
290) href="https://gitweb.torproject.org/torbrowser.git">code</a>, <a
291) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+bundles/installation&order=priority">bug
292) tracker</a>)</h3>
293)
294) <p>
295) The Tor Browser Bundle is an easy-to-use portable package of Tor, Vidalia,
296) and Firefox preconfigured to work together out of the box. This is actively
297) being worked on by Erinn Clark.
298) </p>
299)
300) <p>
301) <b>Project Ideas:</b><br />
302) <i><a href="#auditTBB">Audit Tor Browser Bundles for data leaks</a></i><br />
303) <i><a href="#usabilityTesting">Usability testing of Tor</a></i>
304) </p>
305)
|
Adding TAILS to the project...
Damian Johnson authored 13 years ago
|
306) <a id="project-tails"></a>
307) <h3><a href="https://amnesia.boum.org/">The (Amnesic) Incognito Live System</a> (<a
308) href="http://git.immerda.ch/?p=amnesia.git;a=summary">code</a>, <a
309) href="https://amnesia.boum.org/bugs/">bug
310) tracker</a>)</h3>
311)
312) <p>
313) The (Amnesic) Incognito Live System is a live CD/USB distribution
314) preconfigured so that everything is safely routed through Tor and leaves no
315) trace on the local system. This is a merger of the Amnesia and <a
316) href="http://www.anonymityanywhere.com/incognito/">Incognito</a> projects,
317) and still under very active development.
318) </p>
319)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
320) <a id="project-torsocks"></a>
321) <h3><a href="http://code.google.com/p/torsocks/">Torsocks</a> (<a
322) href="https://gitweb.torproject.org/torsocks.git">code</a>, <a
323) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torify&order=priority">bug
324) tracker</a>)</h3>
325)
326) <p>
327) Utility for adapting other applications to work with Tor. Development has
328) slowed and compatibility issues remain with some platforms, but it's
329) otherwise feature complete.
330) </p>
331)
332) <p>
333) <b>Project Ideas:</b><br />
334) <i><a href="#torsocksForOSX">Make torsocks/dsocks work on OS X</a></i>
335) </p>
336)
337) <a id="project-torouter"></a>
338) <h3><a
339) href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter">Torouter</a> (<a
340) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torouter&order=priority">bug
341) tracker</a>)</h3>
342)
343) <p>
344) Project to provide an easy-to-use, embedded Tor instance for routers. This
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
345) had high activity in late 2010, but has since been rather quiet.
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
346) </p>
347)
348) <a id="project-vidalia"></a>
349) <h3><a href="<page projects/vidalia>">Vidalia</a> (<a
350) href="https://svn.torproject.org/vidalia/vidalia/trunk/">code</a>, <a
351) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Vidalia&order=priority">bug
352) tracker</a>)</h3>
353)
354) <p>
355) The most commonly used user interface for Tor. Matt Edman started the
356) project in 2006 and brought it to its current stable state. Development
357) slowed for several years, though Tomás Touceda has since taken a lead with
358) pushing the project forward.
359) </p>
360)
361) <p>
362) <b>Project Ideas:</b><br />
363) <i><a href="#vidaliaStatusEventInterface">Tor Controller Status Event Interface for Vidalia</a></i><br />
364) <i><a href="#vidaliaNetworkMap">An Improved and More Usable Network Map in Vidalia</a></i>
365) </p>
366)
367) <a id="project-arm"></a>
368) <h3><a href="http://www.atagar.com/arm/">Arm</a> (<a
369) href="https://svn.torproject.org/svn/arm/trunk/">code</a>, <a
370) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=arm&order=priority">bug
371) tracker</a>)</h3>
372)
373) <p>
374) Command-line monitor for Tor. This has been under very active development
375) by its author, Damian Johnson, since early 2009 to make it a better
376) general-purpose controller for *nix environments.
377) </p>
378)
379) <p>
380) <b>Project Ideas:</b><br />
381) <i><a href="#armClientMode">Client Mode Use Cases for Arm</a></i>
382) </p>
383)
384) <a id="project-orbot"></a>
385) <h3><a href="https://guardianproject.info/apps/orbot/">Orbot</a> (<a
386) href="https://svn.torproject.org/svn/projects/android/trunk/Orbot/">code</a>, <a
387) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Orbot&order=priority">bug
388) tracker</a>)</h3>
389)
390) <p>
391) Provides Tor on the Android platform. This was under very active
392) development up through Fall 2010, after which things have been quiet.
393) </p>
394)
395) <p>
396) <b>Project Ideas:</b><br />
397) <i><a href="#orbotDevelopment">More on Orbot & Android OS-specific development</a></i>
398) </p>
399)
400) <a id="project-torbutton"></a>
401) <h3><a href="<page torbutton/index>">Torbutton</a> (<a
402) href="https://gitweb.torproject.org/torbutton.git">code</a>, <a
403) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torbutton&order=priority">bug
404) tracker</a>)</h3>
405)
406) <p>
407) Firefox addon that addresses many of the client-side threats to browsing
408) the Internet anonymously. Mike has since continued to adapt it to new
409) threats, updated versions of Firefox, and possibly <a
410) href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">Chrome
411) as well</a>.
412) </p>
413)
414) <p>
415) <b>Project Ideas:</b><br />
416) <i><a href="#torbuttonForThunderbird">Torbutton equivalent for Thunderbird</a></i>
417) </p>
418)
419) <a id="project-thandy"></a>
420) <h3>Thandy (<a
421) href="https://gitweb.torproject.org/thandy.git">code</a>)</h3>
422)
423) <p>
424) Updater for Tor. The project began in the Summer of 2008 but wasn't
425) completed. Recently interest in it has been rekindled and many aspects of
426) its design (including the language it'll be in) are currently in flux.
427) </p>
428)
429) <a id="project-torctl"></a>
430) <h3>TorCtl (<a
431) href="https://gitweb.torproject.org/pytorctl.git">code</a>, <a
432) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torctl&order=priority">bug
433) tracker</a>)</h3>
434)
435) <p>
436) Python bindings and utilities for using the Tor control port. It has been
437) stable for several years, with only minor revisions.
438) </p>
439)
440) <a id="project-metrics"></a>
441) <h3><a href="https://metrics.torproject.org/">Metrics</a> (code: <a
442) href="https://gitweb.torproject.org/metrics-db.git">db</a>, <a
443) href="https://gitweb.torproject.org/metrics-utils.git">utils</a>, <a
444) href="https://gitweb.torproject.org/metrics-web.git">web</a>, <a
445) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Metrics&order=priority">bug
446) tracker</a>)</h3>
447)
448) <p>
449) Processing and analytics of consensus data, provided to users via the
450) metrics portal. This has been under active development for several years by
451) Karsten Loesing.
452) </p>
453)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
454) <!--
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
455) <p>
456) <b>Project Ideas:</b><br />
457) <i><a href="#trackNetworkStatus">Help track the overall Tor Network status</a></i>
458) </p>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
459) -->
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
460)
461) <a id="project-torstatus"></a>
462) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/TorStatus">TorStatus</a> (<a
463) href="https://svn.torproject.org/svn/torstatus/trunk/">code</a>)</h3>
464)
465) <p>
466) Portal providing an overview of the Tor network, and details on any of its
467) current relays. Though very actively used, this project has been
468) unmaintained for a long while.
469) </p>
470)
471) <a id="project-weather"></a>
472) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/Weather">Weather</a> (<a
473) href="https://gitweb.torproject.org/weather.git">code</a>, <a
474) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Weather&order=priority">bug
475) tracker</a>)</h3>
476)
477) <p>
478) Provides automatic notification to subscribed relay operators when their
479) relay's unreachable. This underwent a rewrite by the <a
480) href="http://hfoss.wesleyan.edu/">Wesleyan HFOSS team</a>, which went live
481) in early 2011.
482) </p>
483)
484) <a id="project-gettor"></a>
485) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/EmailAutoResponder">GetTor</a> (<a
486) href="https://svn.torproject.org/svn/projects/gettor/">code</a>, <a
487) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=GetTor&order=priority">bug
488) tracker</a>)</h3>
489)
490) <p>
491) E-mail autoresponder providing Tor's packages over SMTP. This has been
492) relatively unchanged for quite a while.
493) </p>
494)
495) <a id="project-torcheck"></a>
496) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/TorCheck">TorCheck</a> (<a
497) href="https://svn.torproject.org/svn/check/trunk/">code</a>, <a
498) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Check&order=priority">bug
499) tracker</a>)</h3>
500)
501) <p>
502) Provides a simple site for determining if the visitor is using Tor or not.
503) This has been relatively unchanged for quite a while.
504) </p>
505)
506) <a id="project-bridgedb"></a>
507) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/BridgeDB">BridgeDB</a> (<a
508) href="https://gitweb.torproject.org/bridgedb.git">code</a>, <a
509) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=BridgeDB&order=priority">bug
510) tracker</a>)</h3>
511)
512) <p>
513) Backend bridge distributor, handling the various pools they're distributed
514) in. This was actively developed until Fall of 2010.
515) </p>
516)
517) <a id="project-torflow"></a>
518) <h3><a href="https://trac.torproject.org/projects/tor/wiki/projects/TorFlow">TorFlow</a> (<a
519) href="https://gitweb.torproject.org/torflow.git">code</a>, <a
520) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torflow&order=priority">bug
521) tracker</a>)</h3>
522)
523) <p>
524) Library and collection of services for actively monitoring the Tor network.
525) These include the Bandwidth Scanners (measuring throughput of relays) and
526) SoaT (scans for malicious or misconfigured exit nodes). SoaT was last
527) actively developed in the Summer of 2010, and the Bandwidth Scanners a few
528) months later. Both have been under active use since then, but development
529) has stopped.
530) </p>
531)
532) <a id="project-torbel"></a>
533) <h3><a
534) href="https://trac.torproject.org/projects/tor/wiki/projects/TorBulkExitlist">TorBEL</a> (<a
535) href="https://gitweb.torproject.org/tordnsel.git">code</a>, <a
536) href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=TorDNSEL/TorBEL&order=priority">bug
537) tracker</a>)</h3>
538)
539) <p>
540) The Tor Bulk Exitlist provides a method of identifying if IPs belong to
541) exit nodes or not. This is a replacement for TorDNSEL which is a stable
542) (though unmaintained) Haskell application for this purpose. The initial
543) version of TorBEL was started in GSOC 2010 but since then the project has
544) been inactive.
545) </p>
546)
547) <!--
548) Copy and fill out the following for new projects:
549)
550) <a id="project-"></a>
551) <h3><a href=""></a> (<a
552) href="">code</a>, <a
553) href="">bug
554) tracker</a>)</h3>
555)
556) <p>
557) </p>
558)
559) -->
560)
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
561) <a id="Coding"></a>
562) <a id="Summer"></a>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
563) <h2><a class="anchor" href="#Coding">Project Ideas</a></h2>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
564)
565) <p>
566) You may find some of these projects to be good <a href="<page
|
bump gsoc to 2011.
Andrew Lewman authored 13 years ago
|
567) about/gsoc>">Google Summer of Code 2011</a> ideas. We have labelled each idea
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
568) with how useful it would be to the overall Tor project (priority), how
569) much work we expect it would be (effort level), how much clue you should
570) start with (skill level), and which of our <a href="<page
|
remove more dead links.
Andrew Lewman authored 13 years ago
|
571) about/corepeople>">core developers</a> would be good mentors.
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
572) If one or more of these ideas looks promising to you, please <a
573) href="<page about/contact>">contact us</a> to discuss your plans rather than
574) sending blind applications. You may also want to propose your own project
575) idea — which often results in the best applications.
576) </p>
577)
578) <ol>
579)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
580) <a id="auditTBB"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
581) <li>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
582) <b>Audit Tor Browser Bundles for data leaks</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
583) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
584) Priority: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
585) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
586) Effort Level: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
587) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
588) Skill Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
589) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
590) Likely Mentors: <i>Steven, Erinn, Jacob, Andrew</i>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
591) <p>The Tor Browser Bundle incorporates Tor, Firefox, Polipo, and the Vidalia
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
592) user interface (and optionally the <a href="http://pidgin.im/">Pidgin</a>
593) Instant Messaging client). Components are pre-configured to operate in a
594) secure way, and it has very few dependencies on the installed operating
595) system. It has therefore become one of the most easy to use, and popular,
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
596) ways to use Tor on Windows.</p>
597) <p>This project is to identify all of the traces left behind by
598) using a Tor Browser Bundle on Windows, Mac OS X, or Linux. Developing
599) ways to stop, counter, or remove these traces is a final step.</p>
600) <p>Students should be familiar with operating system analysis,
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
601) application development on one or preferably all of Windows, Linux,
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
602) and Mac OS X, and be comfortable with C/C++ and shell scripting.</p>
603) <p>If you would like to help extend or do security auditing for
604) TBB, please contact Erinn.</p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
605) </li>
606)
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
607) <!--
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
608) <a id="trackNetworkStatus"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
609) <li>
610) <b>Help track the overall Tor Network status</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
611) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
612) Priority: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
613) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
614) Effort Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
615) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
616) Skill Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
617) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
618) Likely Mentors: <i>Karsten, Roger</i>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
619) <p>It would be great to set up an automated system for tracking network
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
620) health over time, graphing it, etc. Part of this project would involve
621) inventing better metrics for assessing network health and growth. Is the
622) average uptime of the network increasing? How many relays are qualifying
623) for Guard status this month compared to last month? What's the turnover
624) in terms of new relays showing up and relays shutting off? Periodically
625) people collect brief snapshots, but where it gets really interesting is
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
626) when we start tracking data points over time.</p>
627) <p>Data could be collected from the Tor Network Scanners in <a
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
628) href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from
629) the server descriptors that each relay publishes, and from other
630) sources. Results over time could be integrated into one of the <a
631) href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
632) kept separate. Speaking of the Tor Status pages, take a look at Roger's
633) <a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
634) Status wish list</a>.</p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
635) </li>
|
Modifications for the proje...
Damian Johnson authored 13 years ago
|
636) -->
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
637)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
638) <a id="resistCensorship"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
639) <li>
640) <b>Improving Tor's ability to resist censorship</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
641) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
642) Priority: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
643) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
644) Effort Level: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
645) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
646) Skill Level: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
647) <br>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
648) Likely Mentors: <i>Roger, Nick, Steven, Jake</i>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
649) <p>The Tor 0.2.1.x series makes <a
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
650) href="<svnprojects>design-paper/blocking.html">significant
651) improvements</a> in resisting national and organizational censorship.
652) But Tor still needs better mechanisms for some parts of its
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
653) anti-censorship design.</p>
654) <p>One huge category of work is adding features to our <a
|
Use HTTPS when possible on...
Robert Ransom authored 13 years ago
|
655) href="https://gitweb.torproject.org/bridgedb.git?a=tree">BridgeDB</a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
656) service (Python). Tor aims to give out <a href="<page docs/bridges>">bridge
657) relay addresses</a> to users that can't reach the Tor network
658) directly, but there's an arms race between algorithms for distributing
659) addresses and algorithms for gathering and blocking them. See <a
|
fix another 404 from the fr...
Roger Dingledine authored 13 years ago
|
660) href="<blog>bridge-distribution-strategies">our
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
661) blog post on the topic</a> as an overview, and then look at <a
662) href="http://archives.seul.org/or/dev/Dec-2009/msg00000.html">Roger's
663) or-dev post</a> from December for more recent thoughts — lots of
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
664) design work remains.</p>
665) <p>If you want to get more into the guts of Tor itself (C), a more minor problem
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
666) we should address is that current Tors can only listen on a single
667) address/port combination at a time. There's
668) <a href="<gitblob>doc/spec/proposals/118-multiple-orports.txt">a
669) proposal to address this limitation</a> and allow clients to connect
670) to any given Tor on multiple addresses and ports, but it needs more
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
671) work.</p>
672) <p>This project could involve a lot of research and design. One of the big
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
673) challenges will be identifying and crafting approaches that can still
674) resist an adversary even after the adversary knows the design, and
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
675) then trading off censorship resistance with usability and
676) robustness.</p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
677) </li>
678)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
679) <a id="armClientMode"></a>
|
Adding a volunteer project...
Damian Johnson authored 13 years ago
|
680) <li>
681) <b>Client Mode Use Cases for Arm</b>
682) <br>
683) Priority: <i>Medium</i>
684) <br>
685) Effort Level: <i>High</i>
686) <br>
687) Skill Level: <i>Medium</i>
688) <br>
689) Likely Mentors: <i>Damian</i>
690) <p><a href="<page projects/arm>">Arm</a> is a Tor command line status
691) monitor on *nix environments (Linux, Mac, and BSD). It functions much like
692) top does, giving a CLI overlay of Tor's bandwidth usage, connections,
693) configuration, log, etc. Thus far its design has been geared for Tor relay
694) operators. However, this doesn't need to be the case. This project would be
695) to expand and simplify arm to make it useful for Tor's client users
696) too.</p>
697)
698) <p>This would include UI design, experimenting, and a lot of python
699) hacking. Here's some ideas for client functionality arm could provide:</p>
700)
701) <ul>
702) <li>A panel for client connections, showing each hop of the user's
703) circuits with the ISP, country, and jurisdiction where those relays
704) reside. Other interesting information would be the circuit's latency, how
705) long its been around, and its possible exit ports. Some of this will be
706) pretty tricky and require some experimentation to figure out what
707) information can be fetched safely (for instance, scraping rdns and whois
708) lookups could give hints about a relay's ISP, but we'd need to do it on
709) all Tor relays to avoid leaking our connections to the resolver).</li>
710)
711) <li>Options to let the user request new circuits (the "New
712) Identity" feature in Vidalia), select the exit country, etc.</li>
713)
714) <li>A panel showing Internet application and if their connections are
715) being routed through Tor or not (giving a warning if there's leaks).</li>
716)
717) <li>The status of the bridges we're configured to use (ie, are they up?).
718) This would include adding control port functionality to Tor for <a
719) href="https://trac.torproject.org/projects/tor/ticket/2068">ticket
720) 2068</a>.</li>
721)
722) <li>A one click option to set Tor to be a client, relay, or bridge. The
723) goal would be to make it trivial for users to voluntarily contribute to
724) the Tor network.</li>
725)
726) <li>Menus as an alternative to hotkeys to make the interface more
727) intuitive and usable for beginners (<a
728) href="http://gnosis.cx/publish/programming/charming_python_6.html">example</a>).</li>
729)
730) <li>Look at Vidalia and TorK for ideas and solicit input from the Tor community.</li>
731)
732) <li>Make it easier for users to install arm by <a
733) href="https://secure.wikimedia.org/wikipedia/en/wiki/Opkg">packaging for
734) OpenWrt</a> (as a UI for the <a
735) href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter">Torouter
736) project</a>) and Macs.</li>
737) </ul>
738)
739) <p>For more project ideas see arm's <a
740) href="https://svn.torproject.org/svn/arm/trunk/TODO">TODO</a>.</p>
741) </li>
742)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
743) <a id="unitTesting"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
744) <li>
745) <b>Improve our unit testing process</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
746) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
747) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
748) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
749) Effort Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
750) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
751) Skill Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
752) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
753) Likely Mentors: <i>Nick, Erinn</i>
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
754) <p>Tor needs to be tested far more thoroughly. This is a
755) multi-part effort. To start with, our unit test coverage should
756) rise substantially, especially in the areas outside the utility
757) functions. This will require significant refactoring of some parts
758) of Tor, in order to dissociate as much logic as possible from
759) globals.</p>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
760) <p>Additionally, we need to automate our performance testing. We've got
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
761) buildbot to automate our regular integration and compile testing already
762) (though we need somebody to set it up on Windows),
763) but we need to get our network simulation tests (as built in <a
764) href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>)
765) updated for more recent versions of Tor, and designed to launch a test
766) network either on a single machine, or across several, so we can test
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
767) changes in performance on machines in different roles automatically.</p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
768) </li>
769)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
770) <a id="orbotDevelopment"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
771) <li>
772) <b>More on Orbot & Android OS-specific development</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
773) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
774) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
775) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
776) Effort Level: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
777) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
778) Skill Level: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
779) <br>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
780) Likely Mentors: <i>Nathan, Jake</i>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
781) <p><b>Android Java UI work:</b> Improved home screen to show better
782) statistics about data transferred (up/down), number of circuits
783) connected, quality of connection and so on. The "Tether Wifi"
784) Android application is a good model to follow in how it shows
785) a realtime count of bytes transferred as well as notifications
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
786) when wifi clients connect. In addition, better display/handling
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
787) of Tor system/error messages would also be very helpful. Finally,
788) the addition of a wizard or tutorial walkthrough for novice
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
789) users to explain to them exactly what is and what is not anonymized
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
790) or protected would greatly improve the likelihood they will use
791) Orbot correctly.</p>
792)
793) <p><b>Android Java OS/Core app work:</b> Better system-wide
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
794) indication, either via the notification bar, "Toast" pop-up dialogs
795) or some other indicator, that an application's traffic is indeed
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
796) moving through Orbot/Tor. For instance, right now you need to
797) first go to a torcheck web service to ensure your browser is
798) routing via Tor. Orbot should be able to notify you that circuits
799) are being opened, used, etc. The aforementioned data transfer
800) tracker might provide this type of awareness as well.</p>
801)
802) <p><b>Android Java Library/Community Outreach work:</b> We need
803) to package a simple library for use with third-party application
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
804) to easily enable them to support "Torification" on non-rooted
805) devices (i.e. w/o transparent proxying). This library should
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
806) include a wrapper for the Apache HTTPClient library, a utility
807) class for detecting the state of Orbot connectivity, and other
808) relevant/useful things an Android app might need to anonymize
809) itself. This work would include the creation of the library,
810) documentation, and sample code. Outreach or effort to implement
811) the library within other open-source apps would follow.</p>
812)
813) <p><b>Android OS/C/Linux work:</b> The port of Tor to Android
814) is basically a straight cross-compile to Linux ARM. There has
815) been no work done in looking the optimization of Tor within a
816) mobile hardware environment, on the ARM processor or other
817) Android hardware, or on mobile networks. It should be noted,
818) that even without optimization, Tor is handling the mobile
819) network environment very well, automatically detecting change
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
820) in IP addresses, reconnecting circuits, etc. across switching
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
821) from 2G to 3G to Wifi, and so forth.</p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
822) </li>
823)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
824) <a id="simulateSlowConnections"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
825) <li>
826) <b>Simulator for slow Internet connections</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
827) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
828) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
829) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
830) Effort Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
831) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
832) Skill Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
833) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
834) Likely Mentors: <i>Steven</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
835) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
836) Many users of Tor have poor-quality Internet connections, giving low
837) bandwidth, high latency, and high packet loss/re-ordering. User
838) experience is that Tor reacts badly to these conditions, but it is
839) difficult to improve the situation without being able to repeat the
840) problems in the lab.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
841) </p>
842)
843) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
844) This project would be to build a simulation environment which
845) replicates the poor connectivity so that the effect on Tor performance
846) can be measured. Other components would be a testing utility to
847) establish what are the properties of connections available, and to
848) measure the effect of performance-improving modifications to Tor.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
849) </p>
850)
851) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
852) The tools used would be up to the student, but dummynet (for FreeBSD)
853) and nistnet (for Linux) are two potential components on which this
854) project could be built. Students should be experienced with network
855) programming/debugging and TCP/IP, and preferably familiar with C and a
856) scripting language.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
857) </p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
858) </li>
859)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
860) <a id="torbuttonForThunderbird"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
861) <li>
862) <b>Torbutton equivalent for Thunderbird</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
863) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
864) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
865) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
866) Effort Level: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
867) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
868) Skill Level: <i>High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
869) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
870) Likely Mentors: <i>Mike</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
871) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
872) We're hearing from an increasing number of users that they want to use
873) Thunderbird with Tor. However, there are plenty of application-level
874) concerns, for example, by default Thunderbird will put your hostname in
875) the outgoing mail that it sends. At some point we should start a new
876) push to build a Thunderbird extension similar to Torbutton.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
877) </p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
878) </li>
879)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
880) <a id="usabilityTesting"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
881) <li>
882) <b>Usability testing of Tor</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
883) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
884) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
885) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
886) Effort Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
887) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
888) Skill Level: <i>Low to Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
889) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
890) Likely Mentors: <i>Andrew</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
891) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
892) Especially the browser bundle, ideally amongst our target demographic.
893) That would help a lot in knowing what needs to be done in terms of bug
894) fixes or new features. We get this informally at the moment, but a more
895) structured process would be better.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
896) </p>
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
897)
898) <p>
899) Please note that since this isn't a coding project, it isn't suitable for
900) Google Summer of Code.
901) </p>
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
902) </li>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
903)
|
Remove the authenticating i...
Sebastian Hahn authored 13 years ago
|
904) <!-- <a id="authenticatingIrcProxy"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
905) <li>
906) <b>An authenticating IRC proxy</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
907) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
908) Priority: <i>Low</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
909) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
910) Effort Level: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
911) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
912) Skill Level: <i>Medium to High</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
913) <br>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
914) Likely Mentors: <i>Sebastian, Peter, Roger</i>
915) <p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
916) The world needs an authenticating irc proxy. As we're periodically
917) reminded from the Penny Arcade web comic, "Internet user + anonymity =
918) jerk". With respect to websites we're actually doing ok, since websites
919) can make their users log in and use other application-level authentication
920) approaches. But IRC servers are much worse off, because most IRC server
921) code is poorly written: hard to maintain, and harder to modify. Many
922) IRC networks now block connections from Tor, and we're basically down to
923) two holdouts (OFTC and Freenode). This state of affairs means that a lot
924) of people around the world are thinking "I told you so" about anonymity
925) online, when in fact the problem is simply lack of technology to make the
926) problem manageable. We need some way to let the IRC networks distinguish
927) which users have developed a reputation as not being jerks, so they can
928) treat the two groups separately. There are some really cool research
929) designs like <a href="http://www.cs.dartmouth.edu/~nymble/">Nymble</a>,
930) which aim to let websites blacklist users without needing to learn who
931) they are. But Nymble is designed around web interactions. We need to
932) build the glue around the IRC protocol that would let us plug in a project
933) like Nymble (or a simpler one to start, as a proof-of-concept). One way
934) to do that would be to build an IRC proxy that knows how to hear from
935) IRC clients, knows how to talk to IRC servers, and has an additional
936) layer that requires the users to authenticate. Some work on this has
937) begun by other volunteers, see their progress at <a
|
Use HTTPS when possible on...
Robert Ransom authored 13 years ago
|
938) href="https://github.com/anonirc/orc">https://github.com/anonirc/orc</a>.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
939) </p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
940) </li>
|
Remove the authenticating i...
Sebastian Hahn authored 13 years ago
|
941) -->
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
942) <a id="torsocksForOSX"></a>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
943) <li>
944) <b>Make torsocks/dsocks work on OS X</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
945) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
946) Priority: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
947) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
948) Effort Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
949) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
950) Skill Level: <i>Medium</i>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
951) <br>
|
Setting Robert Hogan as the...
Damian Johnson authored 13 years ago
|
952) Likely Mentors: <i>Robert Hogan</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
953) <p>
|
Use HTTPS when possible on...
Robert Ransom authored 13 years ago
|
954) <a href="https://code.google.com/p/torsocks/">Torsocks</a> and <a
955) href="https://code.google.com/p/dsocks/">dsocks</a> are wrappers that will
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
956) run applications, intercept their outgoing network connections, and push
957) those connections through Tor. The goal is to handle applications that
958) don't support proxies (or don't supporting them well). To get it right,
959) they need to intercept many system calls. The syscalls you need to
960) intercept on Linux differ dramatically from those on BSD. So Torsocks
961) works fine on Linux, dsocks works ok on BSD (though it may be less
962) maintained and thus might miss more syscalls), and nothing works well
963) on both. First, we should patch dsocks to use Tor's <i>mapaddress</i>
964) commands from the controller interface, so we don't waste a whole
965) round-trip inside Tor doing the resolve before connecting. Second,
966) we should make our <i>torify</i> script detect which of torsocks or
967) dsocks is installed, and call them appropriately. This probably means
968) unifying their interfaces, and might involve sharing code between them
969) or discarding one entirely.
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
970) </p>
971) </li>
972)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
973) <a id="vidaliaStatusEventInterface"></a>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
974) <li>
975) <b>Tor Controller Status Event Interface for Vidalia</b>
976) <br>
977) Priority: <i>Medium</i>
978) <br>
979) Effort Level: <i>Medium</i>
980) <br>
981) Skill Level: <i>Low to Medium</i>
982) <br>
|
Tomás said he's willing to...
Damian Johnson authored 13 years ago
|
983) Likely Mentors: <i>Tomás</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
984) <p>There are a number of status changes inside Tor of which the user may need
985) to be informed. For example, if the user is trying to set up his Tor as a
986) relay and Tor decides that its ports are not reachable from outside
987) the user's network, we should alert the user. Currently, all the user
988) gets is a couple of log messages in Vidalia's 'message log' window, which they
989) likely never see since they don't receive a notification that something
990) has gone wrong. Even if the user does actually look at the message log,
991) most of the messages make little sense to the novice user.</p>
992) <p>Tor has the ability to inform Vidalia of many such status
993) changes, and we recently implemented support for a couple of these
994) events. Still, there are many more status events which the user should
995) be informed of, and we need a better UI for actually displaying them
996) to the user.</p>
997) <p>The goal of this project then is to design and implement a UI for
998) displaying Tor status events to the user. For example, we might put a
999) little badge on Vidalia's tray icon that alerts the user to new status
1000) events they should look at. Double-clicking the icon could bring up a
1001) dialog that summarizes recent status events in simple terms and maybe
1002) suggests a remedy for any negative events if they can be corrected by
1003) the user. Of course, this is just an example and one is free to
1004) suggest another approach.</p>
1005) <p>A person undertaking this project should have good UI design and layout
1006) skills and some C++ development experience. Previous experience with Qt and
1007) Qt's Designer will be very helpful, but are not required. Some
1008) English writing ability will also be useful, since this project will
1009) likely involve writing small amounts of help documentation that should
1010) be understandable by non-technical users. Bonus points for some graphic
1011) design/Photoshop fu, since we might want/need some shiny new icons too.</p>
1012) </li>
1013)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
1014) <a id="vidaliaNetworkMap"></a>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
1015) <li>
1016) <b>An Improved and More Usable Network Map in Vidalia</b>
1017) <br>
1018) Priority: <i>Low to Medium</i>
1019) <br>
1020) Effort Level: <i>Medium</i>
1021) <br>
1022) Skill Level: <i>Medium</i>
1023) <br>
|
Tomás said he's willing to...
Damian Johnson authored 13 years ago
|
1024) Likely Mentors: <i>Tomás</i>
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
1025) <p>
1026) One of Vidalia's existing features is a network map that shows the user
1027) the approximate geographic location of relays in the Tor network and
1028) plots the paths the user's traffic takes as it is tunneled through the
1029) Tor network. The map is currently not very interactive and has rather
1030) poor graphics. Instead, we implemented KDE's Marble widget such
1031) that it gives us a better quality map and enables improved interactivity,
1032) such as allowing the user to click on individual relays or circuits to
1033) display additional information. We want to add the ability
1034) for users to click on a particular relay or a country containing one or
1035) more Tor exit relays and say, "I want my connections to exit
1036) from here."
1037) </p>
1038)
1039) <p>
1040) This project will first involve getting familiar with Vidalia
1041) and the Marble widget's API. One will then integrate the widget
1042) into Vidalia and customize Marble to be better suited for our application,
1043) such as making circuits clickable, storing cached map data in Vidalia's
1044) own data directory, and customizing some of the widget's dialogs.
1045) </p>
1046)
1047) <p>
1048) A person undertaking this project should have good C++ development
1049) experience. Previous experience with Qt and CMake is helpful, but not
1050) required.
1051) </p>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1052) </li>
1053)
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
1054) <!--
1055) <li>
1056) <b>Help with independent Tor client implementations</b>
1057) <br>
1058) Priority: <i>Medium</i>
1059) <br>
1060) Effort Level: <i>High</i>
1061) <br>
1062) Skill Level: <i>Medium to High</i>
1063) <br>
1064) Likely Mentors: <i>Bruce, Nathan</i>
1065) <p>Others are currently working on Tor clients for Java, Android, and Maemo
1066) environments. The first step is to get a handle on the current state of
1067) the project in which you are interested in helping; <a
|
Use HTTPS when possible on...
Robert Ransom authored 13 years ago
|
1068) href="https://github.com/brl/JTor">Tor for Java</a>,
|
Revisions to project ideas...
Damian Johnson authored 13 years ago
|
1069) <a href="https://svn.torproject.org/svn/projects/android/trunk/">Android/Orbot</a>,
1070) or <a href="<page docs/N900>">Tor for Maemo</a>. Check out the
1071) repository and familiarize yourself
1072) with the source code. Further, support for requesting or even providing
1073) Tor hidden services would be neat, but not required.</p>
1074) <p>A prospective developer should be able to understand and write new Java
1075) code, including a Java cryptography API. Being able to read C code would be helpful,
1076) too. One should be willing to read the existing documentation,
1077) implement code based on it, and refine the documentation
1078) when things are underdocumented. This project is mostly about coding and
1079) to a small degree about design.</p>
1080) </li>
1081) -->
1082)
|
Adding project summaries an...
Damian Johnson authored 13 years ago
|
1083) <!--
1084) <li>
1085) <b>Improvements for Tor+Vidalia interaction on Linux/Unix platforms</b>
1086) <br>
1087) Priority: <i>Medium</i>
1088) <br>
1089) Effort Level: <i>Medium</i>
1090) <br>
1091) Skill Level: <i>Medium</i>
1092) <br>
1093) Likely Mentors: <i>Erinn, Peter</i>
1094) <p>
1095) Vidalia currently doesn't play nicely with Tor on Linux and Unix platforms.
1096) Currently, on Debian and Ubuntu, there is a configuration mechanism which
1097) allows Vidalia to override Tor's ability to start on boot (by sourcing
1098) <code>/etc/default/tor.vidalia</code> which sets <code>RUN_DAEMON=no</code> at the user's
1099) request), but full implementation of <a href="<gitblob>doc/spec/control-spec.txt">ControlPort</a>
1100) communication is still required.
1101) </p>
1102)
1103) <p>
1104) A better solution on Linux and Unix platforms would be to use Tor's
1105) ControlSocket, which allows Vidalia to talk to Tor via a Unix domain socket,
1106) and could possibly be enabled by default in Tor's distribution packages.
1107) Vidalia can then authenticate to Tor using filesystem-based (cookie)
1108) authentication if the user running Vidalia is also in the distribution-specific
1109) tor group.
1110) </p>
1111)
1112) <p>
1113) This project will first involve adding support for Tor's ControlSocket to
1114) Vidalia. The student will then develop and test this support on various
1115) distributions to make sure it behaves in a predictable and consistent manner on
1116) all of them.
1117) </p>
1118)
1119) <p>
1120) The next challenge would be to find an intuitive and usable way for Vidalia to be
1121) able to change Tor's configuration (torrc) even though it is located in
1122) <code>/etc/tor/torrc</code> and thus immutable. In Debian and Ubuntu we handle
1123) this with the aforementioned <code>/etc/default/tor.vidalia</code> but this
1124) functionality could (or should) be less distribution-specific.
1125) </p>
1126)
1127) <p>
1128) The best idea we've come up with so far is to feed Tor a new configuration via
1129) the ControlSocket when Vidalia starts, but that's bad because if the user is not
1130) using the latest Debian/Ubuntu packages, they may not have disabled Tor's
1131) ability to run on boot and will end up with a configuration that is different
1132) from what they want. The second best idea we've come up with is for Vidalia to
1133) write out a temporary torrc file and ask the user to manually move it to
1134) <code>/etc/tor/torrc</code>, but that's bad because users shouldn't have to
1135) mess with files directly.
1136) </p>
1137)
1138) <p>
1139) A person undertaking this project should have prior knowledge of various Linux
1140) distributions and their packaging mechanisms as well as some C++ development
1141) experience. Previous experience with Qt is helpful, but not required.
1142) </p>
1143) </li>
1144) -->
1145)
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1146) <li>
1147) <b>Bring up new ideas!</b>
|
We decided to go with HTML...
Sebastian Hahn authored 13 years ago
|
1148) <br>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1149) Don't like any of these? Look at the <a
1150) href="<gitblob>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
1151) roadmap</a> for more ideas, or just try out Tor, Vidalia, and Torbutton,
1152) and find out what you think needs fixing.
1153) Some of the <a href="<gittree>doc/spec/proposals">current proposals</a>
1154) might also be short on developers.
1155) </li>
1156)
1157) </ol>
1158)
1159) <a id="OtherCoding"></a>
1160) <h2><a class="anchor" href="#OtherCoding">Other Coding and Design related ideas</a></h2>
1161) <ol>
1162) <li>Tor relays don't work well on Windows XP. On
1163) Windows, Tor uses the standard <tt>select()</tt> system
1164) call, which uses space in the non-page pool. This means
1165) that a medium sized Tor relay will empty the non-page pool, <a
1166) href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/WindowsBufferProblems">causing
1167) havoc and system crashes</a>. We should probably be using overlapped IO
1168) instead. One solution would be to teach <a
1169) href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use
1170) overlapped IO rather than select() on Windows, and then adapt Tor to
1171) the new libevent interface. Christian King made a
1172) <a href="https://svn.torproject.org/svn/libevent-urz/trunk/">good
1173) start</a> on this in the summer of 2007.</li>
1174)
1175) <li>We need to actually start building our <a href="<page
1176) docs/documentation>#DesignDoc">blocking-resistance design</a>. This involves
1177) fleshing out the design, modifying many different pieces of Tor, adapting
1178) <a href="<page projects/vidalia>">Vidalia</a> so it supports the
1179) new features, and planning for deployment.</li>
1180)
1181) <li>We need a flexible simulator framework for studying end-to-end
1182) traffic confirmation attacks. Many researchers have whipped up ad hoc
1183) simulators to support their intuition either that the attacks work
1184) really well or that some defense works great. Can we build a simulator
1185) that's clearly documented and open enough that everybody knows it's
1186) giving a reasonable answer? This will spur a lot of new research.
1187) See the entry <a href="#Research">below</a> on confirmation attacks for
1188) details on the research side of this task — who knows, when it's
1189) done maybe you can help write a paper or three also.</li>
1190)
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
1191) <li>Tor 0.1.1.x and later include support for hardware crypto
1192) accelerators via OpenSSL. It has been lightly tested and is
1193) possibly very buggy. We're looking for more rigorous testing,
|
apply fixes from rransom.
Andrew Lewman authored 13 years ago
|
1194) performance analysis, and optimally, code fixes to OpenSSL and
|
format the paragraphs corre...
Andrew Lewman authored 13 years ago
|
1195) Tor if needed.</li>
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1196)
1197) <li>Perform a security analysis of Tor with <a
|
Use HTTPS when possible on...
Robert Ransom authored 13 years ago
|
1198) href="https://secure.wikimedia.org/wikipedia/en/wiki/Fuzz_testing">"fuzz"</a>. Determine
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1199) if there are good fuzzing libraries out there for what we want. Win fame by
1200) getting credit when we put out a new release because of you!</li>
1201)
1202) <li>Tor uses TCP for transport and TLS for link
1203) encryption. This is nice and simple, but it means all cells
1204) on a link are delayed when a single packet gets dropped, and
1205) it means we can only reasonably support TCP streams. We have a <a
|
revise TransportIPnotTCP an...
Roger Dingledine authored 13 years ago
|
1206) href="<page docs/faq>#TransportIPnotTCP">list
|
first cut of the new, shiny...
Andrew Lewman authored 13 years ago
|
1207) of reasons why we haven't shifted to UDP transport</a>, but it would
1208) be great to see that list get shorter. We also have a proposed <a
1209) href="<gitblob>doc/spec/proposals/100-tor-spec-udp.txt">specification
1210) for Tor and
1211) UDP</a> — please let us know what's wrong with it.</li>
1212)
1213) <li>We're not that far from having IPv6 support for destination addresses
1214) (at exit nodes). If you care strongly about IPv6, that's probably the
1215) first place to start.</li>
1216)
1217) <li>We need a way to generate the website diagrams (for example, the "How
1218) Tor Works" pictures on the <a href="<page about/overview>">overview page</a>
1219) from source, so we can translate them as UTF-8 text rather than edit
1220) them by hand with Gimp. We might want to
1221) integrate this as an wml file so translations are easy and images are
1222) generated in multiple languages whenever we build the website.</li>
1223)
1224) <li>How can we make the various LiveCD/USB systems easier
1225) to maintain, improve, and document? One example is <a
1226) href="https://amnesia.boum.org/">The (Amnesic) Incognito Live
1227) System</a>.
1228) </li>
1229)
1230) <li>
1231) Another anti-censorship project is to try to make Tor
1232) more scanning-resistant. Right now, an adversary can identify <a
1233) href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
1234) just by trying to connect to them, following the Tor protocol,
1235) and seeing if they respond. To solve this, bridges could <a
1236) href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
1237) webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
1238) and not act like bridges until the user provides a bridge-specific key.
1239) To start, check out Shane Pope's <a
1240) href="http://dl.dropbox.com/u/37735/index.html">thesis and prototype</a>.
1241) </li>
1242)
1243) </ol>
1244)
1245) <a id="Research"></a>
1246) <h2><a class="anchor" href="#Research">Research</a></h2>
1247) <ol>
1248) <li>The "end-to-end traffic confirmation attack":
1249) by watching traffic at Alice and at Bob, we can <a
1250) href="http://freehaven.net/anonbib/#danezis:pet2004">compare
1251) traffic signatures and become convinced that we're watching the same
1252) stream</a>. So far Tor accepts this as a fact of life and assumes this
1253) attack is trivial in all cases. First of all, is that actually true? How
1254) much traffic of what sort of distribution is needed before the adversary
1255) is confident he has won? Are there scenarios (e.g. not transmitting much)
1256) that slow down the attack? Do some traffic padding or traffic shaping
1257) schemes work better than others?</li>
1258) <li>A related question is: Does running a relay/bridge provide additional
1259) protection against these timing attacks? Can an external adversary that can't
1260) see inside TLS links still recognize individual streams reliably?
1261) Does the amount of traffic carried degrade this ability any? What if the
1262) client-relay deliberately delayed upstream relayed traffic to create a queue
1263) that could be used to mimic timings of client downstream traffic to make it
1264) look like it was also relayed? This same queue could also be used for masking
1265) timings in client upstream traffic with the techniques from <a
1266) href="http://www.freehaven.net/anonbib/#ShWa-Timing06">adaptive padding</a>,
1267) but without the need for additional traffic. Would such an interleaving of
1268) client upstream traffic obscure timings for external adversaries? Would the
1269) strategies need to be adjusted for asymmetric links? For example, on
1270) asymmetric links, is it actually possible to differentiate client traffic from
1271) natural bursts due to their asymmetric capacity? Or is it easier than
1272) symmetric links for some other reason?</li>
1273) <li>Repeat Murdoch and Danezis's <a
1274) href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta">attack from
1275) Oakland 05</a> on the current Tor network. See if you can learn why it
1276) works well on some nodes and not well on others. (My theory is that the
1277) fast nodes with spare capacity resist the attack better.) If that's true,
1278) then experiment with the RelayBandwidthRate and RelayBandwidthBurst
1279) options to run a relay that is used as a client while relaying the
1280) attacker's traffic: as we crank down the RelayBandwidthRate, does the
1281) attack get harder? What's the right ratio of RelayBandwidthRate to
1282) actually capacity? Or is it a ratio at all? While we're at it, does a
1283) much larger set of candidate relays increase the false positive rate
1284) or other complexity for the attack? (The Tor network is now almost two
1285) orders of magnitude larger than it was when they wrote their paper.) Be
1286) sure to read <a href="http://freehaven.net/anonbib/#clog-the-queue">Don't
1287) Clog the Queue</a> too.</li>
1288) <li>The "routing zones attack": most of the literature thinks of
1289) the network path between Alice and her entry node (and between the
1290) exit node and Bob) as a single link on some graph. In practice,
1291) though, the path traverses many autonomous systems (ASes), and <a
1292) href="http://freehaven.net/anonbib/#feamster:wpes2004">it's not uncommon
1293) that the same AS appears on both the entry path and the exit path</a>.
1294) Unfortunately, to accurately predict whether a given Alice, entry,
1295) exit, Bob quad will be dangerous, we need to download an entire Internet
1296) routing zone and perform expensive operations on it. Are there practical
1297) approximations, such as avoiding IP addresses in the same /8 network?</li>
1298) <li>Other research questions regarding geographic diversity consider
1299) the tradeoff between choosing an efficient circuit and choosing a random
1300) circuit. Look at Stephen Rollyson's <a
1301) href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position
1302) paper</a> on how to discard particularly slow choices without hurting
1303) anonymity "too much". This line of reasoning needs more work and more
1304) thinking, but it looks very promising.</li>
1305) <li>Tor doesn't work very well when relays have asymmetric bandwidth
1306) (e.g. cable or DSL). Because Tor has separate TCP connections between
1307) each hop, if the incoming bytes are arriving just fine and the outgoing
1308) bytes are all getting dropped on the floor, the TCP push-back mechanisms
1309) don't really transmit this information back to the incoming streams.
1310) Perhaps Tor should detect when it's dropping a lot of outgoing packets,
1311) and rate-limit incoming streams to regulate this itself? I can imagine
1312) a build-up and drop-off scheme where we pick a conservative rate-limit,
1313) slowly increase it until we get lost packets, back off, repeat. We
1314) need somebody who's good with networks to simulate this and help design
1315) solutions; and/or we need to understand the extent of the performance
1316) degradation, and use this as motivation to reconsider UDP transport.</li>
1317) <li>A related topic is congestion control. Is our
1318) current design sufficient once we have heavy use? Maybe
1319) we should experiment with variable-sized windows rather
1320) than fixed-size windows? That seemed to go well in an <a
1321) href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">ssh
1322) throughput experiment</a>. We'll need to measure and tweak, and maybe
1323) overhaul if the results are good.</li>
1324) <li>Our censorship-resistance goals include preventing
1325) an attacker who's looking at Tor traffic on the wire from <a
1326) href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing
1327) it from normal SSL traffic</a>. Obviously we can't achieve perfect
1328) steganography and still remain usable, but for a first step we'd like to
1329) block any attacks that can win by observing only a few packets. One of
1330) the remaining attacks we haven't examined much is that Tor cells are 512
1331) bytes, so the traffic on the wire may well be a multiple of 512 bytes.
1332) How much does the batching and overhead in TLS records blur this on the
1333) wire? Do different buffer flushing strategies in Tor affect this? Could
1334) a bit of padding help a lot, or is this an attack we must accept?</li>
1335) <li>Tor circuits are built one hop at a time, so in theory we have the
1336) ability to make some streams exit from the second hop, some from the
1337) third, and so on. This seems nice because it breaks up the set of exiting
1338) streams that a given relay can see. But if we want each stream to be safe,
1339) the "shortest" path should be at least 3 hops long by our current logic, so
1340) the rest will be even longer. We need to examine this performance / security
1341) tradeoff.</li>
1342) <li>It's not that hard to DoS Tor relays or directory authorities. Are client
1343) puzzles the right answer? What other practical approaches are there? Bonus
1344) if they're backward-compatible with the current Tor protocol.</li>
1345) <li>Programs like <a
|
get the website to build cl...
Andrew Lewman authored 13 years ago
|
1346) href="<page torbutton/index>">Torbutton</a> aim to hide
|