Roger Dingledine commited on 2005-05-15 13:37:57
Zeige 2 geänderte Dateien mit 73 Einfügungen und 67 Löschungen.
... | ... |
@@ -48,17 +48,31 @@ width="110" height="79" alt="Tor logo" /></a> |
48 | 48 |
<h2>Tor: Contribute</h2> |
49 | 49 |
<hr /> |
50 | 50 |
|
51 |
-<p>Users:</p> |
|
51 |
+<p>Ongoing needs:</p> |
|
52 | 52 |
<ul> |
53 | 53 |
<li>Try Tor out, and let the Tor developers know about bugs you find or |
54 | 54 |
features you don't find.</li> |
55 | 55 |
<li>Please consider <a |
56 | 56 |
href="cvs/tor/doc/tor-doc.html#server">running a |
57 |
-server</a> to help with development and scalability.</li> |
|
57 |
+server</a> to help the Tor network grow.</li> |
|
58 |
+<li>We especially need people with Windows programming skills |
|
59 |
+to run an exit server on Windows, to help us debug.</li> |
|
58 | 60 |
<li>Run a <a href="cvs/tor/doc/tor-doc.html#hidden-service">Tor hidden |
59 | 61 |
service</a> and put interesting content on it.</li> |
60 | 62 |
<li>Tell your friends! Get them to run servers. Get them to run hidden |
61 | 63 |
services. Get them to tell <i>their</i> friends.</li> |
64 |
+<li>What else needs to be documented? What is mis-documented?</li> |
|
65 |
+<li>Go take a look at the <a href="http://www.eff.org/">Electronic |
|
66 |
+Frontier Foundation</a>. More EFF donations means more freedom in the world, |
|
67 |
+including more Tor development.</li> |
|
68 |
+</ul> |
|
69 |
+ |
|
70 |
+<p>We also have many project-lets: short-term or self-contained tasks |
|
71 |
+that would be really helpful for somebody to tackle so we can keep |
|
72 |
+focusing on Tor.</p> |
|
73 |
+ |
|
74 |
+<p>Writing project-lets:</p> |
|
75 |
+<ul> |
|
62 | 76 |
<li>Does somebody want to help maintain this website, or help with |
63 | 77 |
documentation, or help with managing our TODO and handling bug reports?</li> |
64 | 78 |
<li>Please help translate the web page and documentation |
... | ... |
@@ -70,60 +84,18 @@ and <a href="http://tor.freesuperhost.com/">Persian</a>)</li> |
70 | 84 |
href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>, |
71 | 85 |
and if you know the answer to a question in the "unanswered FAQs" list, |
72 | 86 |
please answer it.</li> |
73 |
-<li>What else needs to be documented? What is mis-documented?</li> |
|
74 |
-</ul> |
|
75 |
- |
|
76 |
-<!-- |
|
77 |
-<p>Graphics folks:</p> |
|
78 |
-<ul> |
|
79 |
-<li>We need a Tor logo.</li> |
|
80 |
-<li>We need a snazzy diagram or two, akin to the one BitTorrent has in |
|
81 |
-its <a href="http://bittorrent.com/introduction.html">introduction</a>, |
|
82 |
-to show people how Tor works.</li> |
|
83 |
-</ul> |
|
84 |
---> |
|
85 |
- |
|
86 |
-<p>People with sysadmin skills:</p> |
|
87 |
-<ul> |
|
88 |
-<li>Can somebody take a look at Martin's <a |
|
89 |
-href="http://wiki.noreply.org/wiki/TheOnionRouter/SquidProxy">Squid |
|
90 |
-and Tor</a> page, and update it to reflect Tor's new <a href="">RedirectExit</a> |
|
91 |
-config option?</li> |
|
92 |
-<li>Right now the hidden service descriptors are being stored on the |
|
93 |
-dirservers, but any reliable distributed storage system would do (for |
|
94 |
-example, a DHT that allows authenticated updates). Can somebody figure |
|
95 |
-out our best options and decide if they're good enough?</li> |
|
96 |
-<li>How hard is it to patch bind or a DNS proxy to redirect requests |
|
97 |
-to Tor via our tor-resolve socks extension? What about to convert UDP |
|
98 |
-DNS requests to TCP requests and send them through Tor?</li> |
|
99 |
-</ul> |
|
100 |
- |
|
101 |
-<p>Designers:</p> |
|
102 |
-<ul> |
|
103 |
-<li>Tor provides anonymous connections, but if you want to keep multiple |
|
104 |
-pseudonyms in practice (say, in case you frequently go to two websites |
|
105 |
-and if anybody knew about both of them they would conclude it's you), |
|
106 |
-we don't support that well yet. We should find a good approach and |
|
107 |
-interface for handling pseudonymous profiles in Tor. See <a |
|
108 |
-href="http://archives.seul.org/or/talk/Dec-2004/msg00086.html">this |
|
109 |
-post</a> and <a |
|
110 |
-href="http://archives.seul.org/or/talk/Jan-2005/msg00007.html">followup</a> |
|
111 |
-for details.</li> |
|
112 | 87 |
</ul> |
113 | 88 |
|
114 |
-<p>Developers:</p> |
|
89 |
+<p>Programmer and developer project-lets:</p> |
|
115 | 90 |
<ul> |
116 | 91 |
<li>We need somebody to code up a GUI or other |
117 | 92 |
controller program, to do configuration, etc. See our <a |
118 | 93 |
href="cvs/tor/doc/control-spec.txt">control specification</a> for details, |
119 | 94 |
and the <a href="cvs/tor/contrib/TorControl.py">rudimentary demonstration |
120 | 95 |
Python control script</a>. No, we don't know what the interface should look |
121 |
-like. You can use any license you want, but we'd recommend modified BSD or |
|
96 |
+like. You can use any license you want, but we'd recommend 3-clause BSD or |
|
122 | 97 |
maybe GPL; and we can only help out if your license conforms to the |
123 |
-<a href="http://www.debian.org/social_contract.html#guidelines">DFSG</a>. |
|
124 |
-</li> |
|
125 |
-<li>We especially need people with Windows programming skills |
|
126 |
- to run an exit server on Windows, to help us debug.</li> |
|
98 |
+<a href="http://www.debian.org/social_contract.html#guidelines">DFSG</a>.</li> |
|
127 | 99 |
<li>We're always looking for better Windows installers. Specifically, |
128 | 100 |
it would be great if somebody were to extend our NSIS-based windows |
129 | 101 |
installer to include FreeCap and Privoxy.</li> |
... | ... |
@@ -132,15 +104,63 @@ so we can go in the system tray?</li> |
132 | 104 |
<li>A good (portable, fast, clean, BSD-free) asynchronous DNS library |
133 | 105 |
would be really handy, so we don't have to keep forking DNS worker |
134 | 106 |
threads to do gethostbyname.</li> |
107 |
+<li>Can somebody take a look at Martin's <a |
|
108 |
+href="http://wiki.noreply.org/wiki/TheOnionRouter/SquidProxy">Squid |
|
109 |
+and Tor</a> page, and update it to reflect Tor's new <a href="">RedirectExit</a> |
|
110 |
+config option?</li> |
|
135 | 111 |
<li>See the <a href="cvs/tor/doc/TODO">TODO</a> and |
136 | 112 |
<a href="cvs/tor/doc/HACKING">HACKING</a> files in the Tor distribution |
137 | 113 |
for more ideas.</li> |
138 | 114 |
</ul> |
139 | 115 |
|
140 |
-<p>Donors:</p> |
|
116 |
+<p>Security project-lets: We need people to attack the implementation |
|
117 |
+and clean it up, and also to attack the design and experiment with |
|
118 |
+defenses.</p> |
|
141 | 119 |
<ul> |
142 |
-<li>Go take a look at the <a href="http://www.eff.org/">Electronic |
|
143 |
-Frontier Foundation</a>. More EFF donations means more Tor development.</li> |
|
120 |
+<li>We need somebody to <a |
|
121 |
+href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there |
|
122 |
+good libraries out there for what we want? What are the first steps? Win |
|
123 |
+fame by getting credit when we put out a new release because of you! |
|
124 |
+<li>Server CPU load is high because clients keep asking to make new |
|
125 |
+circuits, which uses public key crypto. Possible defenses include: |
|
126 |
+using helper nodes (fixed entry nodes); rate limiting the number of |
|
127 |
+create cells handled per second; having clients retry failed extensions |
|
128 |
+a few times; implementing ssl sessions; and using hardware crypto when |
|
129 |
+available.</li> |
|
130 |
+<li>Website volume fingerprinting attacks (<a |
|
131 |
+href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a |
|
132 |
+href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). |
|
133 |
+Defenses include a large cell size, <a |
|
134 |
+href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>, |
|
135 |
+etc. How well does each approach work?</li> |
|
136 |
+<li>The end-to-end traffic confirmation attack. We need to study |
|
137 |
+long-range dummies more, along with traffic shaping. How much traffic |
|
138 |
+of what sort of distribution is needed before the adversary is confident |
|
139 |
+he has won?</li> |
|
140 |
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles |
|
141 |
+the right answer? What other practical approaches are there?</li> |
|
142 |
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers |
|
143 |
+better?</li> |
|
144 |
+</ul> |
|
145 |
+ |
|
146 |
+<p>Designer project-lets:</p> |
|
147 |
+<ul> |
|
148 |
+<li>Right now the hidden service descriptors are being stored on the |
|
149 |
+dirservers, but any reliable distributed storage system would do (for |
|
150 |
+example, a DHT that allows authenticated updates). Can somebody figure |
|
151 |
+out our best options and decide if they're good enough?</li> |
|
152 |
+<li>How hard is it to patch bind or a DNS proxy to redirect requests |
|
153 |
+to Tor via our tor-resolve socks extension? What about to convert UDP |
|
154 |
+DNS requests to TCP requests and send them through Tor?</li> |
|
155 |
+<li>Tor provides anonymous connections, but if you want to keep multiple |
|
156 |
+pseudonyms in practice (say, in case you frequently go to two websites |
|
157 |
+and if anybody knew about both of them they would conclude it's you), |
|
158 |
+we don't support that well yet. We should find a good approach and |
|
159 |
+interface for handling pseudonymous profiles in Tor. See <a |
|
160 |
+href="http://archives.seul.org/or/talk/Dec-2004/msg00086.html">this |
|
161 |
+post</a> and <a |
|
162 |
+href="http://archives.seul.org/or/talk/Jan-2005/msg00007.html">followup</a> |
|
163 |
+for details.</li> |
|
144 | 164 |
</ul> |
145 | 165 |
|
146 | 166 |
<a href="mailto:tor-volunteer@freehaven.net">Email |
... | ... |
@@ -51,24 +51,10 @@ href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these |
51 | 51 |
papers</a> (especially the ones in boxes) to get up to speed on anonymous |
52 | 52 |
communication systems.</p> |
53 | 53 |
|
54 |
-<p>We need people to attack the system, quantify defenses, etc. For example: |
|
54 |
+<p>We need people to attack the system, quantify defenses, |
|
55 |
+etc. See the "security project-lets" section of the <a |
|
56 |
+href="contribute.html">contribute</a> page.</p> |
|
55 | 57 |
</p> |
56 |
-<ul> |
|
57 |
-<li>Website volume fingerprinting attacks (<a |
|
58 |
-href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a |
|
59 |
-href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). |
|
60 |
-Defenses include a large cell size, <a |
|
61 |
-href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>, |
|
62 |
-etc. How well does each approach work?</li> |
|
63 |
-<li>The end-to-end traffic confirmation attack. We need to study |
|
64 |
-long-range dummies more, along with traffic shaping. How much traffic |
|
65 |
-of what sort of distribution is needed before the adversary is confident |
|
66 |
-he has won?</li> |
|
67 |
-<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles |
|
68 |
-the right answer? What other practical approaches are there?</li> |
|
69 |
-<li>What sensitive info squeaks by privoxy? Are other html scrubbers |
|
70 |
-better?</li> |
|
71 |
-</ul> |
|
72 | 58 |
|
73 | 59 |
</div><!-- #main --> |
74 | 60 |
</div> |
75 | 61 |