rewrite the contribute.html page
Roger Dingledine

Roger Dingledine commited on 2005-05-15 13:37:57
Zeige 2 geänderte Dateien mit 73 Einfügungen und 67 Löschungen.

... ...
@@ -48,17 +48,31 @@ width="110" height="79" alt="Tor logo" /></a>
48 48
 <h2>Tor: Contribute</h2>
49 49
 <hr />
50 50
 
51
-<p>Users:</p>
51
+<p>Ongoing needs:</p>
52 52
 <ul>
53 53
 <li>Try Tor out, and let the Tor developers know about bugs you find or
54 54
 features you don't find.</li>
55 55
 <li>Please consider <a
56 56
 href="cvs/tor/doc/tor-doc.html#server">running a
57
-server</a> to help with development and scalability.</li>
57
+server</a> to help the Tor network grow.</li>
58
+<li>We especially need people with Windows programming skills
59
+to run an exit server on Windows, to help us debug.</li>
58 60
 <li>Run a <a href="cvs/tor/doc/tor-doc.html#hidden-service">Tor hidden
59 61
 service</a> and put interesting content on it.</li>
60 62
 <li>Tell your friends! Get them to run servers. Get them to run hidden
61 63
 services. Get them to tell <i>their</i> friends.</li>
64
+<li>What else needs to be documented? What is mis-documented?</li>
65
+<li>Go take a look at the <a href="http://www.eff.org/">Electronic
66
+Frontier Foundation</a>. More EFF donations means more freedom in the world,
67
+including more Tor development.</li>
68
+</ul>
69
+
70
+<p>We also have many project-lets: short-term or self-contained tasks
71
+that would be really helpful for somebody to tackle so we can keep
72
+focusing on Tor.</p>
73
+
74
+<p>Writing project-lets:</p>
75
+<ul>
62 76
 <li>Does somebody want to help maintain this website, or help with
63 77
 documentation, or help with managing our TODO and handling bug reports?</li>
64 78
 <li>Please help translate the web page and documentation
... ...
@@ -70,60 +84,18 @@ and <a href="http://tor.freesuperhost.com/">Persian</a>)</li>
70 84
 href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>,
71 85
 and if you know the answer to a question in the "unanswered FAQs" list,
72 86
 please answer it.</li>
73
-<li>What else needs to be documented? What is mis-documented?</li>
74
-</ul>
75
-
76
-<!--
77
-<p>Graphics folks:</p>
78
-<ul>
79
-<li>We need a Tor logo.</li>
80
-<li>We need a snazzy diagram or two, akin to the one BitTorrent has in
81
-its <a href="http://bittorrent.com/introduction.html">introduction</a>,
82
-to show people how Tor works.</li>
83
-</ul>
84
--->
85
-
86
-<p>People with sysadmin skills:</p>
87
-<ul>
88
-<li>Can somebody take a look at Martin's <a
89
-href="http://wiki.noreply.org/wiki/TheOnionRouter/SquidProxy">Squid
90
-and Tor</a> page, and update it to reflect Tor's new <a href="">RedirectExit</a>
91
-config option?</li>
92
-<li>Right now the hidden service descriptors are being stored on the
93
-dirservers, but any reliable distributed storage system would do (for
94
-example, a DHT that allows authenticated updates). Can somebody figure
95
-out our best options and decide if they're good enough?</li>
96
-<li>How hard is it to patch bind or a DNS proxy to redirect requests
97
-to Tor via our tor-resolve socks extension? What about to convert UDP
98
-DNS requests to TCP requests and send them through Tor?</li>
99
-</ul>
100
-
101
-<p>Designers:</p>
102
-<ul>
103
-<li>Tor provides anonymous connections, but if you want to keep multiple
104
-pseudonyms in practice (say, in case you frequently go to two websites
105
-and if anybody knew about both of them they would conclude it's you),
106
-we don't support that well yet. We should find a good approach and
107
-interface for handling pseudonymous profiles in Tor. See <a
108
-href="http://archives.seul.org/or/talk/Dec-2004/msg00086.html">this
109
-post</a> and <a
110
-href="http://archives.seul.org/or/talk/Jan-2005/msg00007.html">followup</a>
111
-for details.</li>
112 87
 </ul>
113 88
 
114
-<p>Developers:</p>
89
+<p>Programmer and developer project-lets:</p>
115 90
 <ul>
116 91
 <li>We need somebody to code up a GUI or other
117 92
 controller program, to do configuration, etc. See our <a
118 93
 href="cvs/tor/doc/control-spec.txt">control specification</a> for details,
119 94
 and the <a href="cvs/tor/contrib/TorControl.py">rudimentary demonstration
120 95
 Python control script</a>. No, we don't know what the interface should look
121
-like.  You can use any license you want, but we'd recommend modified BSD or
96
+like.  You can use any license you want, but we'd recommend 3-clause BSD or
122 97
 maybe GPL; and we can only help out if your license conforms to the
123
-<a href="http://www.debian.org/social_contract.html#guidelines">DFSG</a>.
124
-</li>
125
-<li>We especially need people with Windows programming skills
126
-     to run an exit server on Windows, to help us debug.</li>
98
+<a href="http://www.debian.org/social_contract.html#guidelines">DFSG</a>.</li>
127 99
 <li>We're always looking for better Windows installers.  Specifically,
128 100
    it would be great if somebody were to extend our NSIS-based windows
129 101
    installer to include FreeCap and Privoxy.</li>
... ...
@@ -132,15 +104,63 @@ so we can go in the system tray?</li>
132 104
 <li>A good (portable, fast, clean, BSD-free) asynchronous DNS library
133 105
 would be really handy, so we don't have to keep forking DNS worker
134 106
 threads to do gethostbyname.</li>
107
+<li>Can somebody take a look at Martin's <a
108
+href="http://wiki.noreply.org/wiki/TheOnionRouter/SquidProxy">Squid
109
+and Tor</a> page, and update it to reflect Tor's new <a href="">RedirectExit</a>
110
+config option?</li>
135 111
 <li>See the <a href="cvs/tor/doc/TODO">TODO</a> and
136 112
 <a href="cvs/tor/doc/HACKING">HACKING</a> files in the Tor distribution
137 113
 for more ideas.</li>
138 114
 </ul>
139 115
 
140
-<p>Donors:</p>
116
+<p>Security project-lets: We need people to attack the implementation
117
+and clean it up, and also to attack the design and experiment with
118
+defenses.</p>
141 119
 <ul>
142
-<li>Go take a look at the <a href="http://www.eff.org/">Electronic
143
-Frontier Foundation</a>. More EFF donations means more Tor development.</li>
120
+<li>We need somebody to <a
121
+href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there
122
+good libraries out there for what we want? What are the first steps? Win
123
+fame by getting credit when we put out a new release because of you!
124
+<li>Server CPU load is high because clients keep asking to make new
125
+circuits, which uses public key crypto. Possible defenses include:
126
+using helper nodes (fixed entry nodes); rate limiting the number of
127
+create cells handled per second; having clients retry failed extensions
128
+a few times; implementing ssl sessions; and using hardware crypto when
129
+available.</li>
130
+<li>Website volume fingerprinting attacks (<a
131
+href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a
132
+href="http://freehaven.net/anonbib/#hintz02">Hintz</a>).
133
+Defenses include a large cell size, <a
134
+href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>,
135
+etc. How well does each approach work?</li>
136
+<li>The end-to-end traffic confirmation attack. We need to study
137
+long-range dummies more, along with traffic shaping. How much traffic
138
+of what sort of distribution is needed before the adversary is confident
139
+he has won?</li>
140
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles
141
+the right answer? What other practical approaches are there?</li>
142
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers
143
+better?</li>
144
+</ul>
145
+
146
+<p>Designer project-lets:</p>
147
+<ul>
148
+<li>Right now the hidden service descriptors are being stored on the
149
+dirservers, but any reliable distributed storage system would do (for
150
+example, a DHT that allows authenticated updates). Can somebody figure
151
+out our best options and decide if they're good enough?</li>
152
+<li>How hard is it to patch bind or a DNS proxy to redirect requests
153
+to Tor via our tor-resolve socks extension? What about to convert UDP
154
+DNS requests to TCP requests and send them through Tor?</li>
155
+<li>Tor provides anonymous connections, but if you want to keep multiple
156
+pseudonyms in practice (say, in case you frequently go to two websites
157
+and if anybody knew about both of them they would conclude it's you),
158
+we don't support that well yet. We should find a good approach and
159
+interface for handling pseudonymous profiles in Tor. See <a
160
+href="http://archives.seul.org/or/talk/Dec-2004/msg00086.html">this
161
+post</a> and <a
162
+href="http://archives.seul.org/or/talk/Jan-2005/msg00007.html">followup</a>
163
+for details.</li>
144 164
 </ul>
145 165
 
146 166
 <a href="mailto:tor-volunteer@freehaven.net">Email
... ...
@@ -51,24 +51,10 @@ href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these
51 51
 papers</a> (especially the ones in boxes) to get up to speed on anonymous
52 52
 communication systems.</p>
53 53
 
54
-<p>We need people to attack the system, quantify defenses, etc. For example:
54
+<p>We need people to attack the system, quantify defenses,
55
+etc. See the "security project-lets" section of the <a
56
+href="contribute.html">contribute</a> page.</p>
55 57
 </p>
56
-<ul>
57
-<li>Website volume fingerprinting attacks (<a
58
-href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a
59
-href="http://freehaven.net/anonbib/#hintz02">Hintz</a>).
60
-Defenses include a large cell size, <a
61
-href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>,
62
-etc. How well does each approach work?</li>
63
-<li>The end-to-end traffic confirmation attack. We need to study
64
-long-range dummies more, along with traffic shaping. How much traffic
65
-of what sort of distribution is needed before the adversary is confident
66
-he has won?</li>
67
-<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles
68
-the right answer? What other practical approaches are there?</li>
69
-<li>What sensitive info squeaks by privoxy? Are other html scrubbers
70
-better?</li>
71
-</ul>
72 58
 
73 59
   </div><!-- #main -->
74 60
 </div>
75 61