Oliver Knapp commited on 2009-03-27 14:13:17
Zeige 10 geänderte Dateien mit 632 Einfügungen und 572 Löschungen.
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18613 |
|
2 |
+# Based-On-Revision: 19084 |
|
3 | 3 |
# Last-Translator: mail ed oliverknapp.de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Spende!" CHARSET="UTF-8" |
... | ... |
@@ -74,7 +74,7 @@ href="http://paypal.com/">PayPal-Konto</a>):<br /> |
74 | 74 |
<input type="hidden" name="cmd" value="_xclick-subscriptions" /> |
75 | 75 |
<input type="hidden" name="business" value="donations@torproject.org" /> |
76 | 76 |
<input type="hidden" name="item_name" value="Tor Project Membership" /> |
77 |
-<input type="hidden" name="return" value="https://www.torproject.org/"> |
|
77 |
+<input type="hidden" name="return" value="https://www.torproject.org/donate#funds"> |
|
78 | 78 |
<input type="hidden" name="cancel_return" value="https://www.torproject.org/donate"> |
79 | 79 |
</p> |
80 | 80 |
</form> |
... | ... |
@@ -97,7 +97,7 @@ href="http://paypal.com/">PayPal-Konto</a>):<br /> |
97 | 97 |
<input type="hidden" name="cmd" value="_xclick" /> |
98 | 98 |
<input type="hidden" name="business" value="donations@torproject.org" /> |
99 | 99 |
<input type="hidden" name="item_name" value="Tor" /> |
100 |
-<input type="hidden" name="return" value="https://www.torproject.org/"> |
|
100 |
+<input type="hidden" name="return" value="https://www.torproject.org/donate#funds"> |
|
101 | 101 |
<input type="hidden" name="cancel_return" value="https://www.torproject.org/donate"> |
102 | 102 |
</p> |
103 | 103 |
</form> |
... | ... |
@@ -166,10 +166,11 @@ die Adresse des Spenders stehen. |
166 | 166 |
<h3><a class="anchor" href="#funds">Was passiert mit meiner |
167 | 167 |
Spende?</a></h3> |
168 | 168 |
|
169 |
-<p>Deine Spende wird in unseren allgemeinen Fond eingezahlt. Du zählst |
|
170 |
-damit zu den <a href="<page sponsors>">vielen Spendern</a> für die |
|
171 |
-Zukunft von Tor und der Onlineanonymität. Im Jahr 2008 wurden die |
|
172 |
-Spenden wie folgt ausgegeben und eingenommen:</p> |
|
169 |
+<p>Wenn du gerade gespendet hast, vielen Dank für deinen Beitrag!Deine Spende |
|
170 |
+wird in unseren allgemeinen Fond eingezahlt. Du zählst damit zu den <a |
|
171 |
+href="<page sponsors>">vielen Spendern</a> für die Zukunft von Tor und der |
|
172 |
+Onlineanonymität. Im Jahr 2008 wurden die Spenden wie folgt ausgegeben und |
|
173 |
+eingenommen:</p> |
|
173 | 174 |
|
174 | 175 |
<p><img src="images/2008-funding-chart.png" alt="Wer spendet an das Tor-Projekt?"/> |
175 | 176 |
<img src="images/2008-expenses-chart.png" alt="Wie werden die Gelder ausgegeben?"/></p> |
... | ... |
@@ -1,8 +1,8 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18918 |
|
2 |
+# Based-On-Revision: 19103 |
|
3 | 3 |
# Last-Translator: mail a-t oliverknapp .de |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor: Download" CHARSET="UTF-8" |
|
5 |
+#include "head.wmi" TITLE="Tor: Download" CHARSET="UTF-8" ANNOUNCE_RSS="yes" |
|
6 | 6 |
|
7 | 7 |
<div class="main-column"> |
8 | 8 |
|
... | ... |
@@ -54,6 +54,21 @@ Wie das geht?</a>):</p> |
54 | 54 |
<li><a href="<package-osx-bundle-stable-sig>">Signatur des OS X Installationspakets</a></li> |
55 | 55 |
</ul></li> |
56 | 56 |
|
57 |
+<p>Um über neueste Sicherheitshinweise und neue stabile Versionen informiert |
|
58 |
+zu sein, abonniere die <a href="http://archives.seul.org/or/announce/"> |
|
59 |
+or-announce Mailingliste (Engl.)</a> (Du wirst per Mail um eine Bestätigung |
|
60 |
+gebeten). Du kannst auch den RSS-Feed der Liste <a |
|
61 |
+href="http://rss.gmane.org/gmane.network.onion-routing.announce"> |
|
62 |
+beobachten</a>. </p> |
|
63 |
+ |
|
64 |
+<form action="http://freehaven.net/cgi-bin/majordomo.cgi"> |
|
65 |
+<input type="hidden" name="mlist" value="or-announce"> |
|
66 |
+<input type="hidden" name="subscribe" value="1"> |
|
67 |
+<input type="hidden" name="host" value="freehaven.net"> |
|
68 |
+<input name="email" size="15"> |
|
69 |
+<input type="submit" value="or-announce abonnieren"> |
|
70 |
+</form> |
|
71 |
+ |
|
57 | 72 |
<li><p>Du brauchst mehr Auswahl? <a href="<page download>">Hier gibt es unserer |
58 | 73 |
Downloadseite für fortgeschrittene Anwender</a>.</p></li> |
59 | 74 |
|
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18909 |
|
2 |
+# Based-On-Revision: 18972 |
|
3 | 3 |
# Last-Translator: mail et oliverknapp INSERT_DOT de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Google Summer of Code 2009" CHARSET="UTF-8" |
... | ... |
@@ -31,14 +31,16 @@ Bewerbung</a> ist der <b>7. April 2008</b> um 17 Uhr Pacific time. </p>--> |
31 | 31 |
arbeiten können. Wir haben eine spannende Community von interessierten |
32 | 32 |
Entwicklern im IRC und auf Mailinglisten und arbeiten gerne mit dir zusammen, |
33 | 33 |
diskutieren mit dir über Designvorschläge und vieles mehr, aber du musst dich |
34 |
-und deine Zeit selbst einteilen können und solltest bereits wissen, wie die |
|
34 |
+und deine Zeit selbst einteilen können und solltest bereits ungefähr wissen, wie die |
|
35 | 35 |
Entwicklung freier Software über das Internet funktioniert. </p> |
36 | 36 |
|
37 | 37 |
<p> Es geht aber nicht nur darum, ein bisschen Entwicklungsarbeit für Tor |
38 | 38 |
fertig zu bekommen. Google und Tor wollen auch Studenten so in die Entwicklung |
39 | 39 |
einbinden, dass sie nach dem Sommer weiter dabei bleiben. Aus diesem Grund |
40 | 40 |
bevorzugen wir Studenten die bereits andauerndes Interesse und Bereitschaft |
41 |
-gezeigt haben. </p> |
|
41 |
+gezeigt haben. Wir fordern von unseren Studenten öffentliche Statusreports für |
|
42 |
+unsere Community, entweder gebloggt oder per Mail. Wir wollen, dass die |
|
43 |
+Studenten und die Tor-Gemeinschaft voneinander profitieren können.</p> |
|
42 | 44 |
|
43 | 45 |
<p> |
44 | 46 |
Die Arbeit an Tor lohnt sich, da: |
... | ... |
@@ -65,7 +67,7 @@ href="http://freehaven.net/anonbib/">anonymen Systeme</a> aufgeworfen.</li> |
65 | 67 |
<p>Dieses Jahr haben wir zwei Ideen: Eine Sache wäre es <a href="<page |
66 | 68 |
volunteer>#Projects">bei der Entwicklung von Tor zu helfen</a>, die andere |
67 | 69 |
Idee ist, bei der Entwicklung des |
68 |
-<a href="http://www.eff.org/testyourisp/switzerland">Switzerland Werkzeugs der |
|
70 |
+<a href="http://switzerland.wiki.sourceforge.net/Projects">Switzerland Werkzeugs der |
|
69 | 71 |
EFF zu helfen.</a>.</p> |
70 | 72 |
|
71 | 73 |
<a id="Template"></a> |
... | ... |
@@ -87,7 +89,7 @@ und uns davon überzeugen, dass du planst es fertig zu bekommen.</li> |
87 | 89 |
<li>Zeig uns ein Code-Beispiel: Etwas Schickes und Sauberes, damit wir sehen |
88 | 90 |
dass du weißt was du so treibst, am Besten von einem bestehenden Projekt.</li> |
89 | 91 |
|
90 |
-<li>Warum willst du gerade beim Tor Projekt helfen?</li> |
|
92 |
+<li>Warum willst du gerade beim Tor Projekt / Switzerland helfen?</li> |
|
91 | 93 |
|
92 | 94 |
<li>Erzähl uns von deinen Erfahrungen bei der Entwicklung freier Software. Wir |
93 | 95 |
würden auch gerne hören, wie du mit anderen zusammengearbeitet hast und nicht |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18763 |
|
2 |
+# Based-On-Revision: 18968 |
|
3 | 3 |
# Last-Translator: mail [a-t] oliverknapp .de, jens @kubieziel.de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Anonymität online" CHARSET="UTF-8" |
... | ... |
@@ -71,31 +71,34 @@ href="<page donate>">spende auch du</a>!</p> |
71 | 71 |
<a id="News"></a> |
72 | 72 |
<h2><a class="anchor" href="#News">Neues</a></h2> |
73 | 73 |
|
74 |
-<ul> |
|
75 |
-<li>09. Februar 2009: Tor 0.2.0.34 wurde als neue stabile Version veröffentlicht. Lies die <a |
|
74 |
+<ul> <li>12. März 2009: Tor startet den Plan und die Kampagne für |
|
75 |
+Geschwindigkeitsverbesserungen. Lies die <a href="<page |
|
76 |
+press/2009-03-12-performance-roadmap-press-release>">Pressemitteilung</a> für |
|
77 |
+weitere Informationen.</li> |
|
78 |
+<li>09. Februar 2009: Tor 0.2.0.34 wurde als neue |
|
79 |
+stabile Version veröffentlicht. Lies die <a |
|
76 | 80 |
href="http://archives.seul.org/or/announce/Feb-2009/msg00000.html">Meldung</a> |
77 | 81 |
für weitere Informationen. Diese Version behebt ein Sicherheitsproblem!</li> |
78 | 82 |
<li>21. Januar 2009: Tor 0.2.0.33 als neue stabile Version veröffentlicht. |
79 | 83 |
Schaue dir die <a |
80 | 84 |
href="http://archives.seul.org/or/announce/Jan-2009/msg00000.html">Meldung</a> |
81 |
-für Genaueres an.</li> |
|
82 |
-<li>19. Dezember 2008: Tor veröffentlicht einen Drei-Jahres-Plan für die weitere |
|
83 |
-Entwicklung. Bitte lies die <a href="<page |
|
85 |
+für Genaueres an.</li> <li>19. Dezember 2008: Tor veröffentlicht einen |
|
86 |
+Drei-Jahres-Plan für die weitere Entwicklung. Bitte lies die <a href="<page |
|
84 | 87 |
press/2008-12-19-roadmap-press-release>">Pressemeldung</a> für mehr |
85 | 88 |
Informationen.</li> |
86 | 89 |
|
87 | 90 |
|
88 | 91 |
<li><strong>Wir suchen aktiv nach neuen Sponsoren und Geldgebern.</strong> |
89 | 92 |
Wenn deine Organisation ein Interesse an einem schnellen und gut zu |
90 |
- benutzenden Tor-Netzwerk hat, <a href="<page people>">kontaktiere |
|
91 |
- uns</a>. Alle <a href="<page sponsors>">Sponsoren von Tor</a> |
|
92 |
- bekommen persönliche Aufmerksamkeit, bessere Unterstützung und |
|
93 |
- öffentliche Aufmerksamkeit (wenn sie es wollen). Weiterhin erhalten |
|
94 |
- sie auch Einfluss auf die Richtung unserer Forschung und |
|
95 |
- Weiterentwicklung! Bitte <a href="<page donate>">spende</a>.</li> |
|
96 |
- |
|
93 |
+benutzenden Tor-Netzwerk hat, <a href="<page people>">kontaktiere uns</a>. |
|
94 |
+Alle <a href="<page sponsors>">Sponsoren von Tor</a> bekommen persönliche |
|
95 |
+Aufmerksamkeit, bessere Unterstützung und öffentliche Aufmerksamkeit (wenn sie |
|
96 |
+es wollen). Weiterhin erhalten sie auch Einfluss auf die Richtung unserer |
|
97 |
+Forschung und Weiterentwicklung! Bitte <a href="<page donate>">spende</a>.</li> |
|
97 | 98 |
</ul> |
98 |
-<p><a href="<page news>">Mehr Neuigkeiten</a></p> |
|
99 |
- </div><!-- #main --> |
|
99 |
+ |
|
100 |
+<p><a href="<page news>">Mehr Neuigkeiten</a> | <a href="<page |
|
101 |
+press/index>">Veröffentlichungen für die Presse</a> | <a href="<page |
|
102 |
+tormedia>">Tor in den Nachrichten</a></p> </div><!-- #main --> |
|
100 | 103 |
|
101 | 104 |
#include <foot.wmi> |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18547 |
|
2 |
+# Based-On-Revision: 19108 |
|
3 | 3 |
# Last-Translator: mail -at- oliverknapp .de, jens @kubieziel.de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Neuigkeiten" CHARSET="UTF-8" |
... | ... |
@@ -12,7 +12,10 @@ |
12 | 12 |
<h2><a class="anchor" href="#News">Tor: Neuigkeiten</a></h2> |
13 | 13 |
<hr /> |
14 | 14 |
|
15 |
-<ul> |
|
15 |
+<ul><li>12. März 2009: Tor startet den Plan und die Kampagne für |
|
16 |
+Geschwindigkeitsverbesserungen. Lies die <a href="<page |
|
17 |
+press/2009-03-12-performance-roadmap-press-release>">Pressemitteilung</a> für |
|
18 |
+weitere Informationen.</li> |
|
16 | 19 |
<li>09. Februar 2009: Tor 0.2.0.34 wurde als neue stabile Version veröffentlicht. Lies die <a |
17 | 20 |
href="http://archives.seul.org/or/announce/Feb-2009/msg00000.html">Meldung</a> |
18 | 21 |
für weitere Informationen. Diese Version behebt ein Sicherheitsproblem!</li> |
... | ... |
@@ -92,7 +95,7 @@ mit installierst. Schaue dir die englischsprachige |
92 | 95 |
href="http://archives.seul.org/or/announce/Oct-2007/msg00000.html">Ankündigung</a> |
93 | 96 |
für weitere Details an.</li> |
94 | 97 |
|
95 |
-<li>Oct 2007: Wie viele wissen, wurde The Tor Project im Februar eine <a |
|
98 |
+<li>Okt 2007: Wie viele wissen, wurde The Tor Project im Februar eine <a |
|
96 | 99 |
href="<page people>">unabhängige, offizielle Nonprofit-Organisation</a>. Wir |
97 | 100 |
haben das gemacht, um Zuwendungen von Gruppen erhalten zu können, die nur an |
98 | 101 |
NGOs spenden. Damit können Spender Spendenquittungen von uns erhalten. |
... | ... |
@@ -106,11 +109,9 @@ Weiterhin haben sie auch unsere Wandlung in eine Nonprofit-Organisation |
106 | 109 |
betreut.</a> |
107 | 110 |
|
108 | 111 |
<li>Sep 2007: Falls du eine E-Mail erhalten hast, die behauptet von Tor zu |
109 |
-stammen, dann war diese nicht von uns. |
|
110 |
-Die <a href="<page download>">offiziellen Tor-Pakete</a> können über deren |
|
111 |
-<a |
|
112 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">Signatur |
|
113 |
-als authentisch</a> bewertet werden.</li> |
|
112 |
+stammen, dann war diese nicht von uns. Die <a href="<page download>"> |
|
113 |
+offiziellen Tor-Pakete</a> können über deren <a href="<page |
|
114 |
+verifying-signatures>">Signatur als authentisch</a> bewertet werden.</li> |
|
114 | 115 |
|
115 | 116 |
<li>Aug 2007: <strong>Bitte bringe deine Tor-Software auf den aktuellsten |
116 | 117 |
Stand!</strong> Die letzten Versionen (stable: 0.1.2.17; development: |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18762 |
|
2 |
+# Based-On-Revision: 19085 |
|
3 | 3 |
# Last-Translator: mail (a-t) oliverknapp .de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="The Tor Project in den Medien" CHARSET="UTF-8" |
... | ... |
@@ -24,10 +24,15 @@ Beispiele:</p> |
24 | 24 |
</tr> |
25 | 25 |
</thead> |
26 | 26 |
|
27 |
+<td>12. März 2009</td> |
|
28 |
+<td>BBC World Service</td> |
|
29 |
+<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch im Interview über Tor und Zensur</a></td> |
|
30 |
+</tr> |
|
31 |
+<tr> |
|
27 | 32 |
<tr> |
28 | 33 |
<td>2009 Feb 13</td> |
29 | 34 |
<td>Hearsay Culture</td> |
30 |
-<td><a href="http://www.hearsayculture.com/">Hearsay Culture Radio Interview/Podcast</a></td> |
|
35 |
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td> |
|
31 | 36 |
</tr> |
32 | 37 |
<tr style="background-color: #e5e5e5;"> |
33 | 38 |
<td>2008 Dec 29</td> |
... | ... |
@@ -112,7 +117,17 @@ Artikel.</p> |
112 | 117 |
<th>Thema</th> |
113 | 118 |
</tr> |
114 | 119 |
</thead> |
115 |
- |
|
120 |
+<tr> |
|
121 |
+<td>18. März 2009</td> |
|
122 |
+<td>Marie Claire</td> |
|
123 |
+<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td> |
|
124 |
+</tr> |
|
125 |
+<tr> |
|
126 |
+<td>13. März 2009</td> |
|
127 |
+<td>Wall Street Journal</td> |
|
128 |
+<td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a> |
|
129 |
+</tr> |
|
130 |
+<tr style="background-color: #e5e5e5;"> |
|
116 | 131 |
<tr> |
117 | 132 |
<td>2009 Mar 03</td> |
118 | 133 |
<td>Orf Austria</td> |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18921 |
|
2 |
+# Based-On-Revision: 18944 |
|
3 | 3 |
# Last-Translator: mail 11 oliverknapp 22 de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Mithelfen" CHARSET="UTF-8" |
... | ... |
@@ -112,50 +112,82 @@ |
112 | 112 |
Übersetzungen</a>.</li> |
113 | 113 |
</ol> |
114 | 114 |
|
115 |
-<a id="Coding"></a> |
|
116 |
- <p>Die untenstehenden Angaben wurden in der Originalsprache |
|
117 |
- belassen. Da diese sich ausschließlich auf englischsprachige |
|
118 |
- Bewerber beziehen.</p> |
|
115 |
+<a id="Coding"></a> <p>Die untenstehenden Angaben wurden in der |
|
116 |
+Originalsprache belassen. Da diese sich ausschließlich auf Bewerber beziehen, |
|
117 |
+die ausreichende Englischkenntnisse besitzen.</p> |
|
119 | 118 |
|
120 | 119 |
<a id="Summer"></a> |
121 | 120 |
<a id="Projects"></a> |
122 | 121 |
<h2><a class="anchor" href="#Projects">Good Coding Projects</a></h2> |
123 | 122 |
|
124 | 123 |
<p> |
125 |
-Here is a list of ideas that were proposed for the <a href="<page gsoc>">Google Summer of Code 2009</a> |
|
126 |
-but have not been put into practice. Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a> |
|
127 |
-might also be short on developers. If you think you can help out, <a href="<page contact>"> let us know!</a> |
|
124 |
+You may find some of these projects to be good <a href="<page |
|
125 |
+gsoc>">Google Summer of Code 2009</a> ideas. We have labelled each idea |
|
126 |
+with how useful it would be to the overall Tor project (priority), how |
|
127 |
+much work we expect it would be (effort level), how much clue you should |
|
128 |
+start with (skill level), and which of our <a href="<page |
|
129 |
+people>#Core">core developers</a> would be good mentors. |
|
130 |
+If one or more of these ideas looks promising to you, please <a |
|
131 |
+href="<page contact>">contact us</a> to discuss your plans rather than |
|
132 |
+sending blind applications. You may also want to propose your own project |
|
133 |
+idea which often results in the best applications. |
|
128 | 134 |
</p> |
129 | 135 |
|
130 | 136 |
<ol> |
131 |
-<!-- Mike is already working on this |
|
137 |
+ |
|
132 | 138 |
<li> |
133 |
-<b>Tor Node Scanner improvements</b> |
|
139 |
+<b>Tor Browser Bundle for Linux/Mac OS X</b> |
|
134 | 140 |
<br /> |
135 |
-Similar to the SoaT exit scanner (or perhaps even during exit scanning), |
|
136 |
-statistics can be gathered about the reliability of nodes. Nodes that |
|
137 |
-fail too high a percentage of their circuits should not be given |
|
138 |
-Guard status. Perhaps they should have their reported bandwidth |
|
139 |
-penalized by some ratio as well, or just get marked as Invalid. In |
|
140 |
-addition, nodes that exhibit a very low average stream capacity but |
|
141 |
-advertise a very high node bandwidth can also be marked as Invalid. |
|
142 |
-Much of this statistics gathering is already done, it just needs to be |
|
143 |
-transformed into something that can be reported to the Directory |
|
144 |
-Authorities to blacklist/penalize nodes in such a way that clients |
|
145 |
-will listen. |
|
141 |
+Priority: <i>High</i> |
|
146 | 142 |
<br /> |
147 |
-In addition, these same statistics can be gathered about the traffic |
|
148 |
-through a node. Events can be added to the <a |
|
149 |
-href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control |
|
150 |
-Protocol</a> to |
|
151 |
-report if a circuit extend attempt through the node succeeds or fails, and |
|
152 |
-passive statistics can be gathered on both bandwidth and reliability |
|
153 |
-of other nodes via a node-based monitor using these events. Such a |
|
154 |
-scanner would also report information on oddly-behaving nodes to |
|
155 |
-the Directory Authorities, but a communication channel for this |
|
156 |
-currently does not exist and would need to be developed as well. |
|
143 |
+Effort Level: <i>High</i> |
|
144 |
+<br /> |
|
145 |
+Skill Level: <i>Medium</i> |
|
146 |
+<br /> |
|
147 |
+Likely Mentors: <i>Steven, Andrew</i> |
|
148 |
+<br /> |
|
149 |
+The Tor Browser bundle incorporates Tor, Firefox, and the Vidalia user |
|
150 |
+interface (and optionally Pidgin IM). Components are pre-configured to |
|
151 |
+operate in a secure way, and it has very few dependencies on the |
|
152 |
+installed operating system. It has therefore become one of the most |
|
153 |
+easy to use, and popular, ways to use Tor on Windows. |
|
154 |
+<br /> |
|
155 |
+However, there is currently no comparable package for Linux and Mac OS |
|
156 |
+X, so this project would be to implement Tor Browser Bundle for these |
|
157 |
+platforms. This will involve modifications to Vidalia (C++), possibly |
|
158 |
+Firefox (C) then creating and testing the launcher on a range of |
|
159 |
+operating system versions and configurations to verify portability. |
|
160 |
+<br /> |
|
161 |
+Students should be familiar with application development on one or |
|
162 |
+preferably both of Linux and Mac OS X, and be comfortable with C/C++ |
|
163 |
+and shell scripting. |
|
164 |
+<br /> |
|
165 |
+Part of this project could be usability testing of Tor Browser Bundle, |
|
166 |
+ideally amongst our target demographic. |
|
167 |
+That would help a lot in knowing what needs to be done in terms of bug |
|
168 |
+fixes or new features. We get this informally at the moment, but a more |
|
169 |
+structured process would be better. |
|
170 |
+</li> |
|
171 |
+ |
|
172 |
+<li> |
|
173 |
+<b>Translation wiki for our website</b> |
|
174 |
+<br /> |
|
175 |
+Priority: <i>High</i> |
|
176 |
+<br /> |
|
177 |
+Effort Level: <i>Medium</i> |
|
178 |
+<br /> |
|
179 |
+Skill Level: <i>Medium</i> |
|
180 |
+<br /> |
|
181 |
+Likely Mentors: <i>Jacob</i> |
|
182 |
+<br /> |
|
183 |
+The Tor Project has been working over the past year to set up web-based |
|
184 |
+tools to help volunteers translate our applications into other languages. |
|
185 |
+We finally hit upon Pootle, and we have a fine web-based translation engine |
|
186 |
+in place for Vidalia, Torbutton, and Torcheck. However, Pootle only |
|
187 |
+translates strings that are in the "po" format, and our website uses wml |
|
188 |
+files. This project is about finding a way to convert our wml files into po |
|
189 |
+strings and back, so they can be handled by Pootle. |
|
157 | 190 |
</li> |
158 |
- --> |
|
159 | 191 |
|
160 | 192 |
<li> |
161 | 193 |
<b>Help track the overall Tor Network status</b> |
... | ... |
@@ -166,7 +198,7 @@ Effort Level: <i>Medium</i> |
166 | 198 |
<br /> |
167 | 199 |
Skill Level: <i>Medium</i> |
168 | 200 |
<br /> |
169 |
-Likely Mentors: <i>Karsten</i> |
|
201 |
+Likely Mentors: <i>Karsten, Roger</i> |
|
170 | 202 |
<br /> |
171 | 203 |
It would be great to set up an automated system for tracking network |
172 | 204 |
health over time, graphing it, etc. Part of this project would involve |
... | ... |
@@ -177,8 +209,8 @@ in terms of new relays showing up and relays shutting off? Periodically |
177 | 209 |
people collect brief snapshots, but where it gets really interesting is |
178 | 210 |
when we start tracking data points over time. |
179 | 211 |
<br /> |
180 |
-Data could be collected from the "Tor Node Scanner" in |
|
181 |
-<a href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from |
|
212 |
+Data could be collected from the Tor Network Scanners in <a |
|
213 |
+href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from |
|
182 | 214 |
the server descriptors that each relay publishes, and from other |
183 | 215 |
sources. Results over time could be integrated into one of the <a |
184 | 216 |
href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be |
... | ... |
@@ -187,62 +219,16 @@ kept separate. Speaking of the Tor Status pages, take a look at Roger's |
187 | 219 |
Status wish list</a>. |
188 | 220 |
</li> |
189 | 221 |
|
190 |
-<!-- Is this still a useful project? If so, move it to another section. |
|
191 |
-<li> |
|
192 |
-<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b> |
|
193 |
-<br /> |
|
194 |
-Vidalia currently doesn't play nicely on Debian and Ubuntu with the |
|
195 |
-default Tor packages. The current Tor packages automatically start Tor |
|
196 |
-as a daemon running as the debian-tor user and (sensibly) do not have a |
|
197 |
-<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined |
|
198 |
-in the default torrc. Consequently, Vidalia will try |
|
199 |
-to start its own Tor process since it could not connect to the existing |
|
200 |
-Tor, and Vidalia's Tor process will then exit with an error message |
|
201 |
-the user likely doesn't understand since Tor cannot bind its listening |
|
202 |
-ports — they're already in use by the original Tor daemon. |
|
203 |
-<br /> |
|
204 |
-The current solution involves either telling the user to stop the |
|
205 |
-existing Tor daemon and let Vidalia start its own Tor process, or |
|
206 |
-explaining to the user how to set a control port and password in their |
|
207 |
-torrc. A better solution on Debian would be to use Tor's ControlSocket, |
|
208 |
-which allows Vidalia to talk to Tor via a Unix domain socket, and could |
|
209 |
-possibly be enabled by default in Tor's Debian packages. Vidalia can |
|
210 |
-then authenticate to Tor using filesystem-based (cookie) authentication |
|
211 |
-if the user running Vidalia is also in the debian-tor group. |
|
212 |
-<br /> |
|
213 |
-This project will first involve adding support for Tor's ControlSocket |
|
214 |
-to Vidalia. The student will then develop and test Debian and Ubuntu |
|
215 |
-packages for Vidalia that conform to Debian's packaging standards and |
|
216 |
-make sure they work well with the existing Tor packages. We can also |
|
217 |
-set up an apt repository to host the new Vidalia packages. |
|
218 |
-<br /> |
|
219 |
-The next challenge would be to find an intuitive usable way for Vidalia |
|
220 |
-to be able to change Tor's configuration (torrc) even though it is |
|
221 |
-located in <code>/etc/tor/torrc</code> and thus immutable. The best |
|
222 |
-idea we've come up with so far is to feed Tor a new configuration via |
|
223 |
-the ControlSocket when Vidalia starts, but that's bad because Tor starts |
|
224 |
-each boot with a different configuration than the user wants. The second |
|
225 |
-best idea |
|
226 |
-we've come up with is for Vidalia to write out a temporary torrc file |
|
227 |
-and ask the user to manually move it to <code>/etc/tor/torrc</code>, |
|
228 |
-but that's bad because users shouldn't have to mess with files directly. |
|
229 |
-<br /> |
|
230 |
-A person undertaking this project should have prior knowledge of |
|
231 |
-Debian package management and some C++ development experience. Previous |
|
232 |
-experience with Qt is helpful, but not required. |
|
233 |
-</li> |
|
234 |
---> |
|
235 |
- |
|
236 | 222 |
<li> |
237 | 223 |
<b>Improving Tor's ability to resist censorship</b> |
238 | 224 |
<br /> |
239 |
-Priority: <i>High</i> |
|
225 |
+Priority: <i>Medium to High</i> |
|
240 | 226 |
<br /> |
241 |
-Effort Level: <i>High</i> |
|
227 |
+Effort Level: <i>Medium</i> |
|
242 | 228 |
<br /> |
243 | 229 |
Skill Level: <i>High</i> |
244 | 230 |
<br /> |
245 |
-Likely Mentors: <i>Nick</i> |
|
231 |
+Likely Mentors: <i>Nick, Roger, Steven</i> |
|
246 | 232 |
<br /> |
247 | 233 |
The Tor 0.2.0.x series makes <a |
248 | 234 |
href="<svnsandbox>doc/design-paper/blocking.html">significant |
... | ... |
@@ -268,74 +254,83 @@ resist an adversary even after the adversary knows the design, and |
268 | 254 |
then trading off censorship resistance with usability and robustness. |
269 | 255 |
</li> |
270 | 256 |
|
271 |
-<!-- This should be mostly done. |
|
272 | 257 |
<li> |
273 |
-<b>Tor/Polipo/Vidalia Auto-Update Framework</b> |
|
258 |
+<b>Tuneup Tor!</b> |
|
274 | 259 |
<br /> |
275 |
-We're in need of a good authenticated-update framework. |
|
276 |
-Vidalia already has the ability to notice when the user is running an |
|
277 |
-outdated or unrecommended version of Tor, using signed statements inside |
|
278 |
-the Tor directory information. Currently, Vidalia simply pops |
|
279 |
-up a little message box that lets the user know they should manually |
|
280 |
-upgrade. The goal of this project would be to extend Vidalia with the |
|
281 |
-ability to also fetch and install the updated Tor software for the |
|
282 |
-user. We should do the fetches via Tor when possible, but also fall back |
|
283 |
-to direct fetches in a smart way. Time permitting, we would also like |
|
284 |
-to be able to update other |
|
285 |
-applications included in the bundled installers, such as Polipo and |
|
286 |
-Vidalia itself. |
|
260 |
+Priority: <i>Medium to High</i> |
|
287 | 261 |
<br /> |
288 |
-To complete this project, the student will first need to first investigate |
|
289 |
-the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate |
|
290 |
-their strengths, weaknesses, security properties, and ability to be |
|
291 |
-integrated into Vidalia. If none are found to be suitable, the student |
|
292 |
-will design their own auto-update framework, document the design, and |
|
293 |
-then discuss the design with other developers to assess any security |
|
294 |
-issues. The student will then implement their framework (or integrate |
|
295 |
-an existing one) and test it. |
|
262 |
+Effort Level: <i>Medium to High</i> |
|
296 | 263 |
<br /> |
297 |
-A person undertaking this project should have good C++ development |
|
298 |
-experience. Previous experience with Qt is helpful, but not required. One |
|
299 |
-should also have a good understanding of common security |
|
300 |
-practices, such as package signature verification. Good writing ability |
|
301 |
-is also important for this project, since a vital step of the project |
|
302 |
-will be producing a design document to review and discuss |
|
303 |
-with others prior to implementation. |
|
264 |
+Skill Level: <i>High</i> |
|
265 |
+<br /> |
|
266 |
+Likely Mentors: <i>Nick, Roger, Mike, Karsten</i> |
|
267 |
+<br /> |
|
268 |
+Right now, Tor relays measure and report their own bandwidth, and Tor |
|
269 |
+clients choose which relays to use in part based on that bandwidth. |
|
270 |
+This approach is vulnerable to |
|
271 |
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where |
|
272 |
+relays lie about their bandwidth</a>; |
|
273 |
+to address this, Tor currently caps the maximum bandwidth |
|
274 |
+it's willing to believe any relay provides. This is a limited fix, and |
|
275 |
+a waste of bandwidth capacity to boot. Instead, |
|
276 |
+Tor should possibly measure bandwidth in a more distributed way, perhaps |
|
277 |
+as described in the |
|
278 |
+<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for |
|
279 |
+Tor"</a> paper |
|
280 |
+by Snader and Borisov. One could use current testing code to |
|
281 |
+double-check this paper's findings and verify the extent to which they |
|
282 |
+dovetail with Tor as deployed in the wild, and determine good ways to |
|
283 |
+incorporate them into their suggestions Tor network without adding too |
|
284 |
+much communications overhead between relays and directory |
|
285 |
+authorities. |
|
304 | 286 |
</li> |
305 |
---> |
|
306 | 287 |
|
307 | 288 |
<li> |
308 |
-<b>An Improved and More Usable Network Map in Vidalia</b> |
|
289 |
+<b>Improving Polipo on Windows</b> |
|
309 | 290 |
<br /> |
310 |
-Priority: <i>Medium</i> |
|
291 |
+Priority: <i>Medium to High</i> |
|
311 | 292 |
<br /> |
312 | 293 |
Effort Level: <i>Medium</i> |
313 | 294 |
<br /> |
314 | 295 |
Skill Level: <i>Medium</i> |
315 | 296 |
<br /> |
316 |
-Likely Mentors: <i>Matt</i> |
|
297 |
+Likely Mentors: <i>Martin</i> |
|
317 | 298 |
<br /> |
318 |
-One of Vidalia's existing features is a network map that shows the user |
|
319 |
-the approximate geographic location of relays in the Tor network and |
|
320 |
-plots the paths the user's traffic takes as it is tunneled through the |
|
321 |
-Tor network. The map is currently not very interactive and has rather |
|
322 |
-poor graphics. Instead, we implemented KDE's Marble widget such |
|
323 |
-that it gives us a better quality map and enables improved interactivity, |
|
324 |
-such as allowing the user to click on individual relays or circuits to |
|
325 |
-display additional information. We want to add the ability |
|
326 |
-for users to click on a particular relay or a country containing one or |
|
327 |
-more Tor exit relays and say, "I want my connections to exit |
|
328 |
-from here." |
|
299 |
+Help port <a |
|
300 |
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to |
|
301 |
+Windows. Example topics to tackle include: |
|
302 |
+1) the ability to asynchronously |
|
303 |
+query name servers, find the system nameservers, and manage netbios |
|
304 |
+and dns queries. |
|
305 |
+2) manage events and buffers |
|
306 |
+natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in |
|
307 |
+Windows it's whatever the config specifies). 3) some sort of GUI config |
|
308 |
+and reporting tool, bonus if it has a systray icon with right clickable |
|
309 |
+menu options. Double bonus if it's cross-platform compatible. |
|
310 |
+4) allow the software to use the Windows Registry and handle proper Windows directory locations, such as "C:\Program Files\Polipo" |
|
311 |
+</li> |
|
312 |
+ |
|
313 |
+<li> |
|
314 |
+<b>Implement a torrent-based scheme for downloading Thandy packages</b> |
|
329 | 315 |
<br /> |
330 |
-This project will first involve getting familiar with Vidalia |
|
331 |
-and the Marble widget's API. One will then integrate the widget |
|
332 |
-into Vidalia and customize Marble to be better suited for our application, |
|
333 |
-such as making circuits clickable, storing cached map data in Vidalia's |
|
334 |
-own data directory, and customizing some of the widget's dialogs. |
|
316 |
+Priority: <i>Medium to High</i> |
|
335 | 317 |
<br /> |
336 |
-A person undertaking this project should have good C++ development |
|
337 |
-experience. Previous experience with Qt and CMake is helpful, but not |
|
338 |
-required. |
|
318 |
+Effort Level: <i>High</i> |
|
319 |
+<br /> |
|
320 |
+Skill Level: <i>Medium to High</i> |
|
321 |
+<br /> |
|
322 |
+Likely Mentors: <i>Martin, Nick</i> |
|
323 |
+<br /> |
|
324 |
+<a |
|
325 |
+href="http://git.torproject.org/checkout/thandy/master/specs/thandy-spec.txt">Thandy</a> |
|
326 |
+is a relatively new software to allow assisted updates of Tor and related |
|
327 |
+software. Currently, there are very few users, but we expect Thandy to be |
|
328 |
+used by almost every Tor user in the future. To avoid crashing servers on |
|
329 |
+the day of a Tor update, we need new ways to distribute new packages |
|
330 |
+efficiently, and using libtorrent seems to be a possible solution. If you |
|
331 |
+think of other good ideas, great - please do let us know!<br /> |
|
332 |
+We also need to investigate how to include our mirrors better. If possible, |
|
333 |
+there should be an easy way for them to help distributing the packages. |
|
339 | 334 |
</li> |
340 | 335 |
|
341 | 336 |
<li> |
... | ... |
@@ -345,7 +340,7 @@ Priority: <i>Medium</i> |
345 | 340 |
<br /> |
346 | 341 |
Effort Level: <i>Medium</i> |
347 | 342 |
<br /> |
348 |
-Skill Level: <i>Medium</i> |
|
343 |
+Skill Level: <i>Low to Medium</i> |
|
349 | 344 |
<br /> |
350 | 345 |
Likely Mentors: <i>Matt</i> |
351 | 346 |
<br /> |
... | ... |
@@ -381,167 +376,16 @@ be understandable by non-technical users. Bonus points for some graphic |
381 | 376 |
design/Photoshop fu, since we might want/need some shiny new icons too. |
382 | 377 |
</li> |
383 | 378 |
|
384 |
-<!-- Jake already did most of this. |
|
385 | 379 |
<li> |
386 |
-<b>Improvements on our active browser configuration tester</b> - |
|
387 |
-<a href="https://check.torproject.org/">https://check.torproject.org/</a> |
|
380 |
+<b>Improve our unit testing process</b> |
|
388 | 381 |
<br /> |
389 |
-We currently have a functional web page to detect if Tor is working. It |
|
390 |
-has a few places where it falls short. It requires improvements with |
|
391 |
-regard to default languages and functionality. It currently only responds |
|
392 |
-in English. In addition, it is a hack of a perl script that should have |
|
393 |
-never seen the light of day. It should probably be rewritten in python |
|
394 |
-with multi-lingual support in mind. It currently uses the <a |
|
395 |
-href="http://exitlist.torproject.org/">Tor DNS exit list</a> |
|
396 |
-and should continue to do so in the future. It currently result in certain |
|
397 |
-false positives and these should be discovered, documented, and fixed |
|
398 |
-where possible. Anyone working on this project should be interested in |
|
399 |
-DNS, basic perl or preferably python programming skills, and will have |
|
400 |
-to interact minimally with Tor to test their code. |
|
401 |
-<br /> |
|
402 |
-If you want to make the project more exciting |
|
403 |
-and involve more design and coding, take a look at <a |
|
404 |
-href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal |
|
405 |
-131-verify-tor-usage.txt</a>. |
|
406 |
-</li> |
|
407 |
---> |
|
408 |
- |
|
409 |
-<!-- If we decide to switch to the exit list in TorStatus, this is obsolete. |
|
410 |
-<li> |
|
411 |
-<b>Improvements on our DNS Exit List service</b> - |
|
412 |
-<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a> |
|
413 |
-<br /> |
|
414 |
-The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a> |
|
415 |
-is written by our fabulous anonymous |
|
416 |
-contributer Tup. It's a DNS server written in Haskell that supports part of our <a |
|
417 |
-href="<svnsandbox>doc/contrib/torel-design.txt">exitlist |
|
418 |
-design document</a>. Currently, it is functional and it is used by |
|
419 |
-check.torproject.org and other users. The issues that are outstanding |
|
420 |
-are mostly aesthetic. This wonderful service could use a much better |
|
421 |
-website using the common Tor theme. It would be best served with better |
|
422 |
-documentation for common services that use an RBL. It could use more |
|
423 |
-publicity. A person working on this project should be interested in DNS, |
|
424 |
-basic RBL configuration for popular services, and writing documentation. |
|
425 |
-The person would require minimal Tor interaction — testing their |
|
426 |
-own documentation at the very least. Furthermore, it would be useful |
|
427 |
-if they were interested in Haskell and wanted to implement more of the |
|
428 |
-torel-design.txt suggestions. |
|
429 |
-</li> |
|
430 |
---> |
|
431 |
- |
|
432 |
-<!-- Nobody wanted to keep this. |
|
433 |
-<li> |
|
434 |
-<b>Testing integration of Tor with web browsers for our end users</b> |
|
435 |
-<br /> |
|
436 |
-The Tor project currently lacks a solid test suite to ensure that a |
|
437 |
-user has a properly and safely configured web browser. It should test for as |
|
438 |
-many known issues as possible. It should attempt to decloak the |
|
439 |
-user in any way possible. Two current webpages that track these |
|
440 |
-kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a |
|
441 |
-href="http://pseudo-flaw.net/tor/torbutton/">list of issues along |
|
442 |
-with their proof of concept code, bug issues, etc</a>. HD Moore runs |
|
443 |
-the <a href="http://www.decloak.net/">metasploit |
|
444 |
-decloak website</a>. A person interested in defending Tor could start |
|
445 |
-by collecting as many workable and known methods for decloaking a |
|
446 |
-Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may |
|
447 |
-be helpful as a start.) One should be familiar with the common pitfalls but |
|
448 |
-possibly have new methods in mind for implementing decloaking issues. The |
|
449 |
-website should ensure that it tells a user what their problem is. It |
|
450 |
-should help them to fix the problem or direct them to the proper support |
|
451 |
-channels. The person should also be closely familiar with using Tor and how |
|
452 |
-to prevent Tor information leakage. |
|
453 |
-</li> |
|
454 |
---> |
|
455 |
- |
|
456 |
-<!-- Nick did quite some work here. Is this project still required then? |
|
457 |
-<li> |
|
458 |
-<b>Libevent and Tor integration improvements</b> |
|
459 |
-<br /> |
|
460 |
-Tor should make better use of the more recent features of Niels |
|
461 |
-Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a> |
|
462 |
-library. Tor already uses Libevent for its low-level asynchronous IO |
|
463 |
-calls, and could also use Libevent's increasingly good implementations |
|
464 |
-of network buffers and of HTTP. This wouldn't be simply a matter of |
|
465 |
-replacing Tor's internal calls with calls to Libevent: instead, we'll |
|
466 |
-need to refactor Tor to use Libevent calls that do not follow the |
|
467 |
-same models as Tor's existing backends. Also, we'll need to add |
|
468 |
-missing functionality to Libevent as needed — most difficult likely |
|
469 |
-will be adding OpenSSL support on top of Libevent's buffer abstraction. |
|
470 |
-Also tricky will be adding rate-limiting to Libevent. |
|
471 |
-</li> |
|
472 |
---> |
|
473 |
- |
|
474 |
-<li> |
|
475 |
-<b>Tuneup Tor!</b> |
|
476 |
-<br /> |
|
477 |
-Priority: <i>Medium</i> |
|
478 |
-<br /> |
|
479 |
-Effort Level: <i>Medium</i> |
|
480 |
-<br /> |
|
481 |
-Skill Level: <i>Medium to High</i> |
|
482 |
-<br /> |
|
483 |
-Likely Mentors: <i>Nick, Roger, Mike</i> |
|
484 |
-<br /> |
|
485 |
-Right now, Tor relays measure and report their own bandwidth, and Tor |
|
486 |
-clients choose which relays to use in part based on that bandwidth. |
|
487 |
-This approach is vulnerable to |
|
488 |
-<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where |
|
489 |
-relays lie about their bandwidth</a>; |
|
490 |
-to address this, Tor currently caps the maximum bandwidth |
|
491 |
-it's willing to believe any relay provides. This is a limited fix, and |
|
492 |
-a waste of bandwidth capacity to boot. Instead, |
|
493 |
-Tor should possibly measure bandwidth in a more distributed way, perhaps |
|
494 |
-as described in the |
|
495 |
-<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for |
|
496 |
-Tor"</a> paper |
|
497 |
-by Snader and Borisov. One could use current testing code to |
|
498 |
-double-check this paper's findings and verify the extent to which they |
|
499 |
-dovetail with Tor as deployed in the wild, and determine good ways to |
|
500 |
-incorporate them into their suggestions Tor network without adding too |
|
501 |
-much communications overhead between relays and directory |
|
502 |
-authorities. |
|
503 |
-</li> |
|
504 |
- |
|
505 |
-<!-- |
|
506 |
-<li> |
|
507 |
-<b>Improving the Tor QA process: Continuous Integration for Windows builds</b> |
|
508 |
-<br /> |
|
509 |
-It would be useful to have automated build processes for Windows and |
|
510 |
-probably other platforms. The purpose of having a continuous integration |
|
511 |
-build environment is to ensure that Windows isn't left behind for any of |
|
512 |
-the software projects used in the Tor project or its accompanying.<br /> |
|
513 |
-Buildbot may be a good choice for this as it appears to support all of |
|
514 |
-the platforms Tor does. See the |
|
515 |
-<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for |
|
516 |
-buildbot</a>.<br /> |
|
517 |
-There may be better options and the person undertaking this task should |
|
518 |
-evaluate other options. Any person working on this automatic build |
|
519 |
-process should have experience or be willing to learn how to build all |
|
520 |
-of the respective Tor related code bases from scratch. Furthermore, the |
|
521 |
-person should have some experience building software in Windows |
|
522 |
-environments as this is the target audience we want to ensure we do not |
|
523 |
-leave behind. It would require close work with the Tor source code but |
|
524 |
-probably only in the form of building, not authoring.<br /> |
|
525 |
-Additionally, we need to automate our performance testing for all platforms. |
|
526 |
-We've got buildbot (except on Windows — as noted above) to automate |
|
527 |
-our regular integration and compile testing already, |
|
528 |
-but we need to get our network simulation tests (as built in torflow) |
|
529 |
-updated for more recent versions of Tor, and designed to launch a test |
|
530 |
-network either on a single machine, or across several, so we can test |
|
531 |
-changes in performance on machines in different roles automatically. |
|
532 |
-</li> |
|
533 |
---> |
|
534 |
- |
|
535 |
-<li> |
|
536 |
-<b>Improve our unit testing process</b> |
|
537 |
-<br /> |
|
538 |
-Priority: <i>Medium</i> |
|
382 |
+Priority: <i>Medium</i> |
|
539 | 383 |
<br /> |
540 | 384 |
Effort Level: <i>Medium</i> |
541 | 385 |
<br /> |
542 | 386 |
Skill Level: <i>Medium</i> |
543 | 387 |
<br /> |
544 |
-Likely Mentors: <i>Nick</i> |
|
388 |
+Likely Mentors: <i>Nick, Roger</i> |
|
545 | 389 |
<br /> |
546 | 390 |
Tor needs to be far more tested. This is a multi-part effort. To start |
547 | 391 |
with, our unit test coverage should rise substantially, especially in |
... | ... |
@@ -590,12 +434,137 @@ to a small degree about design. |
590 | 434 |
</li> |
591 | 435 |
|
592 | 436 |
<li> |
593 |
-<b>Bring moniTor to life</b> |
|
437 |
+<b>New Torbutton Features</b> |
|
438 |
+<br /> |
|
439 |
+Priority: <i>Medium</i> |
|
440 |
+<br /> |
|
441 |
+Effort Level: <i>High</i> |
|
442 |
+<br /> |
|
443 |
+Skill Level: <i>High</i> |
|
444 |
+<br /> |
|
445 |
+Likely Mentors: <i>Mike</i> |
|
446 |
+<br/> |
|
447 |
+There are several <a |
|
448 |
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5&type=2">good |
|
449 |
+feature requests</a> on the Torbutton Flyspray section. In particular, <a |
|
450 |
+href="https://bugs.torproject.org/flyspray/index.php?do=details&id=523">Integrating |
|
451 |
+'New Identity' with Vidalia</a>, |
|
452 |
+<a href="https://bugs.torproject.org/flyspray/index.php?do=details&id=940">ways of |
|
453 |
+managing multiple cookie jars/identities</a>, <a |
|
454 |
+href="https://bugs.torproject.org/flyspray/index.php?do=details&id=637">preserving |
|
455 |
+specific cookies</a> when cookies are cleared, |
|
456 |
+<a |
|
457 |
+href="https://bugs.torproject.org/flyspray/index.php?do=details&id=524">better |
|
458 |
+referrer spoofing</a>, <a |
|
459 |
+href="https://bugs.torproject.org/flyspray/index.php?do=details&id=564">correct |
|
460 |
+Tor status reporting</a>, and <a |
|
461 |
+href="https://bugs.torproject.org/flyspray/index.php?do=details&id=462">"tor://" |
|
462 |
+and "tors://" urls</a> are all interesting |
|
463 |
+features that could be added. |
|
464 |
+<br /> |
|
465 |
+This work would be independent coding in Javascript and the fun world of <a |
|
466 |
+href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>, |
|
467 |
+with not too much involvement in the Tor internals. |
|
468 |
+</li> |
|
469 |
+ |
|
470 |
+<li> |
|
471 |
+<b>New Thandy Features</b> |
|
472 |
+<br /> |
|
473 |
+Priority: <i>Medium</i> |
|
474 |
+<br /> |
|
475 |
+Effort Level: <i>Medium</i> |
|
476 |
+<br /> |
|
477 |
+Skill Level: <i>Medium to High</i> |
|
478 |
+<br /> |
|
479 |
+Likely Mentors: <i>Martin</i> |
|
480 |
+<br /> |
|
481 |
+Additional capabilities are needed for assisted updates of all the Tor |
|
482 |
+related software for Windows and other operating systems. Some of the |
|
483 |
+features to consider include: |
|
484 |
+1) Integration of the <a |
|
485 |
+href="http://chandlerproject.org/Projects/MeTooCrypto">MeTooCrypto |
|
486 |
+Python library</a> |
|
487 |
+for authenticated HTTPS downloads. 2) Adding a level of indirection |
|
488 |
+between the timestamp signatures and the package files included in an |
|
489 |
+update. See the "Thandy attacks / suggestions" thread on or-dev. |
|
490 |
+3) Support locale specific installation and configuration of assisted |
|
491 |
+updates based on preference, host, or user account language settings. |
|
492 |
+Familiarity with Windows codepages, unicode, and other character sets |
|
493 |
+is helpful in addition to general win32 and posix API experience and |
|
494 |
+Python proficiency. |
|
495 |
+</li> |
|
496 |
+ |
|
497 |
+<li> |
|
498 |
+<b>Simulator for slow Internet connections</b> |
|
594 | 499 |
<br /> |
595 | 500 |
Priority: <i>Medium</i> |
596 | 501 |
<br /> |
597 | 502 |
Effort Level: <i>Medium</i> |
598 | 503 |
<br /> |
504 |
+Skill Level: <i>Medium</i> |
|
505 |
+<br /> |
|
506 |
+Likely Mentors: <i>Steven</i> |
|
507 |
+<br /> |
|
508 |
+Many users of Tor have poor-quality Internet connections, giving low |
|
509 |
+bandwidth, high latency, and high packet loss/re-ordering. User |
|
510 |
+experience is that Tor reacts badly to these conditions, but it is |
|
511 |
+difficult to improve the situation without being able to repeat the |
|
512 |
+problems in the lab. |
|
513 |
+<br /> |
|
514 |
+This project would be to build a simulation environment which |
|
515 |
+replicates the poor connectivity so that the effect on Tor performance |
|
516 |
+can be measured. Other components would be a testing utility to |
|
517 |
+establish what are the properties of connections available, and to |
|
518 |
+measure the effect of performance-improving modifications to Tor. |
|
519 |
+<br /> |
|
520 |
+The tools used would be up to the student, but dummynet (for FreeBSD) |
|
521 |
+and nistnet (for Linux) are two potential components on which this |
|
522 |
+project could be built. Students should be experienced with network |
|
523 |
+programming/debugging and TCP/IP, and preferably familiar with C and a |
|
524 |
+scripting language. |
|
525 |
+</li> |
|
526 |
+ |
|
527 |
+<li> |
|
528 |
+<b>An Improved and More Usable Network Map in Vidalia</b> |
|
529 |
+<br /> |
|
530 |
+Priority: <i>Low to Medium</i> |
|
531 |
+<br /> |
|
532 |
+Effort Level: <i>Medium</i> |
|
533 |
+<br /> |
|
534 |
+Skill Level: <i>Medium</i> |
|
535 |
+<br /> |
|
536 |
+Likely Mentors: <i>Matt</i> |
|
537 |
+<br /> |
|
538 |
+One of Vidalia's existing features is a network map that shows the user |
|
539 |
+the approximate geographic location of relays in the Tor network and |
|
540 |
+plots the paths the user's traffic takes as it is tunneled through the |
|
541 |
+Tor network. The map is currently not very interactive and has rather |
|
542 |
+poor graphics. Instead, we implemented KDE's Marble widget such |
|
543 |
+that it gives us a better quality map and enables improved interactivity, |
|
544 |
+such as allowing the user to click on individual relays or circuits to |
|
545 |
+display additional information. We want to add the ability |
|
546 |
+for users to click on a particular relay or a country containing one or |
|
547 |
+more Tor exit relays and say, "I want my connections to exit |
|
548 |
+from here." |
|
549 |
+<br /> |
|
550 |
+This project will first involve getting familiar with Vidalia |
|
551 |
+and the Marble widget's API. One will then integrate the widget |
|
552 |
+into Vidalia and customize Marble to be better suited for our application, |
|
553 |
+such as making circuits clickable, storing cached map data in Vidalia's |
|
554 |
+own data directory, and customizing some of the widget's dialogs. |
|
555 |
+<br /> |
|
556 |
+A person undertaking this project should have good C++ development |
|
557 |
+experience. Previous experience with Qt and CMake is helpful, but not |
|
558 |
+required. |
|
559 |
+</li> |
|
560 |
+ |
|
561 |
+<li> |
|
562 |
+<b>Bring moniTor to life</b> |
|
563 |
+<br /> |
|
564 |
+Priority: <i>Low</i> |
|
565 |
+<br /> |
|
566 |
+Effort Level: <i>Medium</i> |
|
567 |
+<br /> |
|
599 | 568 |
Skill Level: <i>Low to Medium</i> |
600 | 569 |
<br /> |
601 | 570 |
Likely Mentors: <i>Karsten, Jacob</i> |
... | ... |
@@ -616,6 +585,285 @@ project is one part about identifying requirements to such a |
616 | 585 |
tool and designing its interface, and one part lots of coding. |
617 | 586 |
</li> |
618 | 587 |
|
588 |
+<li> |
|
589 |
+<b>Torbutton equivalent for Thunderbird</b> |
|
590 |
+<br /> |
|
591 |
+Priority: <i>Low</i> |
|
592 |
+<br /> |
|
593 |
+Effort Level: <i>High</i> |
|
594 |
+<br /> |
|
595 |
+Skill Level: <i>High</i> |
|
596 |
+<br /> |
|
597 |
+Likely Mentors: <i>Mike</i> |
|
598 |
+<br /> |
|
599 |
+We're hearing from an increasing number of users that they want to use |
|
600 |
+Thunderbird with Tor. However, there are plenty of application-level |
|
601 |
+concerns, for example, by default Thunderbird will put your hostname in |
|
602 |
+the outgoing mail that it sends. At some point we should start a new |
|
603 |
+push to build a Thunderbird extension similar to Torbutton. |
|
604 |
+</li> |
|
605 |
+ |
|
606 |
+<li> |
|
607 |
+<b>Intermediate Level Network Device Driver</b> |
|
608 |
+<br /> |
|
609 |
+Priority: <i>Low</i> |
|
610 |
+<br /> |
|
611 |
+Effort Level: <i>High</i> |
|
612 |
+<br /> |
|
613 |
+Skill Level: <i>High</i> |
|
614 |
+<br /> |
|
615 |
+Likely Mentors: <i>Martin</i> |
|
616 |
+<br /> |
|
617 |
+The WinPCAP device driver used by Tor VM for bridged networking does |
|
618 |
+not support a number of wireless and non-Ethernet network adapters. |
|
619 |
+Implementation of a intermediate level network device driver for win32 |
|
620 |
+and 64bit would provide a way to intercept and route traffic over such |
|
621 |
+networks. This project will require knowledge of and experience with |
|
622 |
+Windows kernel device driver development and testing. Familiarity with |
|
623 |
+Winsock and Qemu would also be helpful. |
|
624 |
+</li> |
|
625 |
+ |
|
626 |
+<li> |
|
627 |
+<b>Bring up new ideas!</b> |
|
628 |
+<br /> |
|
629 |
+Don't like any of these? Look at the <a |
|
630 |
+href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development |
|
631 |
+roadmap</a> for more ideas. |
|
632 |
+Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a> |
|
633 |
+might also be short on developers. |
|
634 |
+</li> |
|
635 |
+ |
|
636 |
+<!-- Mike is already working on this. |
|
637 |
+<li> |
|
638 |
+<b>Tor Node Scanner improvements</b> |
|
639 |
+<br /> |
|
640 |
+Similar to the SoaT exit scanner (or perhaps even during exit scanning), |
|
641 |
+statistics can be gathered about the reliability of nodes. Nodes that |
|
642 |
+fail too high a percentage of their circuits should not be given |
|
643 |
+Guard status. Perhaps they should have their reported bandwidth |
|
644 |
+penalized by some ratio as well, or just get marked as Invalid. In |
|
645 |
+addition, nodes that exhibit a very low average stream capacity but |
|
646 |
+advertise a very high node bandwidth can also be marked as Invalid. |
|
647 |
+Much of this statistics gathering is already done, it just needs to be |
|
648 |
+transformed into something that can be reported to the Directory |
|
649 |
+Authorities to blacklist/penalize nodes in such a way that clients |
|
650 |
+will listen. |
|
651 |
+<br /> |
|
652 |
+In addition, these same statistics can be gathered about the traffic |
|
653 |
+through a node. Events can be added to the <a |
|
654 |
+href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control |
|
655 |
+Protocol</a> to |
|
656 |
+report if a circuit extend attempt through the node succeeds or fails, and |
|
657 |
+passive statistics can be gathered on both bandwidth and reliability |
|
658 |
+of other nodes via a node-based monitor using these events. Such a |
|
659 |
+scanner would also report information on oddly-behaving nodes to |
|
660 |
+the Directory Authorities, but a communication channel for this |
|
661 |
+currently does not exist and would need to be developed as well. |
|
662 |
+</li> |
|
663 |
+--> |
|
664 |
+ |
|
665 |
+<!-- Is this still a useful project? If so, move it to another section. |
|
666 |
+<li> |
|
667 |
+<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b> |
|
668 |
+<br /> |
|
669 |
+Vidalia currently doesn't play nicely on Debian and Ubuntu with the |
|
670 |
+default Tor packages. The current Tor packages automatically start Tor |
|
671 |
+as a daemon running as the debian-tor user and (sensibly) do not have a |
|
672 |
+<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined |
|
673 |
+in the default torrc. Consequently, Vidalia will try |
|
674 |
+to start its own Tor process since it could not connect to the existing |
|
675 |
+Tor, and Vidalia's Tor process will then exit with an error message |
|
676 |
+the user likely doesn't understand since Tor cannot bind its listening |
|
677 |
+ports — they're already in use by the original Tor daemon. |
|
678 |
+<br /> |
|
679 |
+The current solution involves either telling the user to stop the |
|
680 |
+existing Tor daemon and let Vidalia start its own Tor process, or |
|
681 |
+explaining to the user how to set a control port and password in their |
|
682 |
+torrc. A better solution on Debian would be to use Tor's ControlSocket, |
|
683 |
+which allows Vidalia to talk to Tor via a Unix domain socket, and could |
|
684 |
+possibly be enabled by default in Tor's Debian packages. Vidalia can |
|
685 |
+then authenticate to Tor using filesystem-based (cookie) authentication |
|
686 |
+if the user running Vidalia is also in the debian-tor group. |
|
687 |
+<br /> |
|
688 |
+This project will first involve adding support for Tor's ControlSocket |
|
689 |
+to Vidalia. The student will then develop and test Debian and Ubuntu |
|
690 |
+packages for Vidalia that conform to Debian's packaging standards and |
|
691 |
+make sure they work well with the existing Tor packages. We can also |
|
692 |
+set up an apt repository to host the new Vidalia packages. |
|
693 |
+<br /> |
|
694 |
+The next challenge would be to find an intuitive usable way for Vidalia |
|
695 |
+to be able to change Tor's configuration (torrc) even though it is |
|
696 |
+located in <code>/etc/tor/torrc</code> and thus immutable. The best |
|
697 |
+idea we've come up with so far is to feed Tor a new configuration via |
|
698 |
+the ControlSocket when Vidalia starts, but that's bad because Tor starts |
|
699 |
+each boot with a different configuration than the user wants. The second |
|
700 |
+best idea |
|
701 |
+we've come up with is for Vidalia to write out a temporary torrc file |
|
702 |
+and ask the user to manually move it to <code>/etc/tor/torrc</code>, |
|
703 |
+but that's bad because users shouldn't have to mess with files directly. |
|
704 |
+<br /> |
|
705 |
+A person undertaking this project should have prior knowledge of |
|
706 |
+Debian package management and some C++ development experience. Previous |
|
707 |
+experience with Qt is helpful, but not required. |
|
708 |
+</li> |
|
709 |
+--> |
|
710 |
+ |
|
711 |
+<!-- This should be mostly done. |
|
712 |
+<li> |
|
713 |
+<b>Tor/Polipo/Vidalia Auto-Update Framework</b> |
|
714 |
+<br /> |
|
715 |
+We're in need of a good authenticated-update framework. |
|
716 |
+Vidalia already has the ability to notice when the user is running an |
|
717 |
+outdated or unrecommended version of Tor, using signed statements inside |
|
718 |
+the Tor directory information. Currently, Vidalia simply pops |
|
719 |
+up a little message box that lets the user know they should manually |
|
720 |
+upgrade. The goal of this project would be to extend Vidalia with the |
|
721 |
+ability to also fetch and install the updated Tor software for the |
|
722 |
+user. We should do the fetches via Tor when possible, but also fall back |
|
723 |
+to direct fetches in a smart way. Time permitting, we would also like |
|
724 |
+to be able to update other |
|
725 |
+applications included in the bundled installers, such as Polipo and |
|
726 |
+Vidalia itself. |
|
727 |
+<br /> |
|
728 |
+To complete this project, the student will first need to first investigate |
|
729 |
+the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate |
|
730 |
+their strengths, weaknesses, security properties, and ability to be |
|
731 |
+integrated into Vidalia. If none are found to be suitable, the student |
|
732 |
+will design their own auto-update framework, document the design, and |
|
733 |
+then discuss the design with other developers to assess any security |
|
734 |
+issues. The student will then implement their framework (or integrate |
|
735 |
+an existing one) and test it. |
|
736 |
+<br /> |
|
737 |
+A person undertaking this project should have good C++ development |
|
738 |
+experience. Previous experience with Qt is helpful, but not required. One |
|
739 |
+should also have a good understanding of common security |
|
740 |
+practices, such as package signature verification. Good writing ability |
|
741 |
+is also important for this project, since a vital step of the project |
|
742 |
+will be producing a design document to review and discuss |
|
743 |
+with others prior to implementation. |
|
744 |
+</li> |
|
745 |
+--> |
|
746 |
+ |
|
747 |
+<!-- Jake already did most of this. |
|
748 |
+<li> |
|
749 |
+<b>Improvements on our active browser configuration tester</b> - |
|
750 |
+<a href="https://check.torproject.org/">https://check.torproject.org/</a> |
|
751 |
+<br /> |
|
752 |
+We currently have a functional web page to detect if Tor is working. It |
|
753 |
+has a few places where it falls short. It requires improvements with |
|
754 |
+regard to default languages and functionality. It currently only responds |
|
755 |
+in English. In addition, it is a hack of a perl script that should have |
|
756 |
+never seen the light of day. It should probably be rewritten in python |
|
757 |
+with multi-lingual support in mind. It currently uses the <a |
|
758 |
+href="http://exitlist.torproject.org/">Tor DNS exit list</a> |
|
759 |
+and should continue to do so in the future. It currently result in certain |
|
760 |
+false positives and these should be discovered, documented, and fixed |
|
761 |
+where possible. Anyone working on this project should be interested in |
|
762 |
+DNS, basic perl or preferably python programming skills, and will have |
|
763 |
+to interact minimally with Tor to test their code. |
|
764 |
+<br /> |
|
765 |
+If you want to make the project more exciting |
|
766 |
+and involve more design and coding, take a look at <a |
|
767 |
+href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal |
|
768 |
+131-verify-tor-usage.txt</a>. |
|
769 |
+</li> |
|
770 |
+--> |
|
771 |
+ |
|
772 |
+<!-- If we decide to switch to the exit list in TorStatus, this is obsolete. |
|
773 |
+<li> |
|
774 |
+<b>Improvements on our DNS Exit List service</b> - |
|
775 |
+<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a> |
|
776 |
+<br /> |
|
777 |
+The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a> |
|
778 |
+is written by our fabulous anonymous |
|
779 |
+contributer Tup. It's a DNS server written in Haskell that supports part of our <a |
|
780 |
+href="<svnsandbox>doc/contrib/torel-design.txt">exitlist |
|
781 |
+design document</a>. Currently, it is functional and it is used by |
|
782 |
+check.torproject.org and other users. The issues that are outstanding |
|
783 |
+are mostly aesthetic. This wonderful service could use a much better |
|
784 |
+website using the common Tor theme. It would be best served with better |
|
785 |
+documentation for common services that use an RBL. It could use more |
|
786 |
+publicity. A person working on this project should be interested in DNS, |
|
787 |
+basic RBL configuration for popular services, and writing documentation. |
|
788 |
+The person would require minimal Tor interaction — testing their |
|
789 |
+own documentation at the very least. Furthermore, it would be useful |
|
790 |
+if they were interested in Haskell and wanted to implement more of the |
|
791 |
+torel-design.txt suggestions. |
|
792 |
+</li> |
|
793 |
+--> |
|
794 |
+ |
|
795 |
+<!-- Nobody wanted to keep this. |
|
796 |
+<li> |
|
797 |
+<b>Testing integration of Tor with web browsers for our end users</b> |
|
798 |
+<br /> |
|
799 |
+The Tor project currently lacks a solid test suite to ensure that a |
|
800 |
+user has a properly and safely configured web browser. It should test for as |
|
801 |
+many known issues as possible. It should attempt to decloak the |
|
802 |
+user in any way possible. Two current webpages that track these |
|
803 |
+kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a |
|
804 |
+href="http://pseudo-flaw.net/tor/torbutton/">list of issues along |
|
805 |
+with their proof of concept code, bug issues, etc</a>. HD Moore runs |
|
806 |
+the <a href="http://www.decloak.net/">metasploit |
|
807 |
+decloak website</a>. A person interested in defending Tor could start |
|
808 |
+by collecting as many workable and known methods for decloaking a |
|
809 |
+Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may |
|
810 |
+be helpful as a start.) One should be familiar with the common pitfalls but |
|
811 |
+possibly have new methods in mind for implementing decloaking issues. The |
|
812 |
+website should ensure that it tells a user what their problem is. It |
|
813 |
+should help them to fix the problem or direct them to the proper support |
|
814 |
+channels. The person should also be closely familiar with using Tor and how |
|
815 |
+to prevent Tor information leakage. |
|
816 |
+</li> |
|
817 |
+--> |
|
818 |
+ |
|
819 |
+<!-- Nick did quite some work here. Is this project still required then? |
|
820 |
+<li> |
|
821 |
+<b>Libevent and Tor integration improvements</b> |
|
822 |
+<br /> |
|
823 |
+Tor should make better use of the more recent features of Niels |
|
824 |
+Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a> |
|
825 |
+library. Tor already uses Libevent for its low-level asynchronous IO |
|
826 |
+calls, and could also use Libevent's increasingly good implementations |
|
827 |
+of network buffers and of HTTP. This wouldn't be simply a matter of |
|
828 |
+replacing Tor's internal calls with calls to Libevent: instead, we'll |
|
829 |
+need to refactor Tor to use Libevent calls that do not follow the |
|
830 |
+same models as Tor's existing backends. Also, we'll need to add |
|
831 |
+missing functionality to Libevent as needed — most difficult likely |
|
832 |
+will be adding OpenSSL support on top of Libevent's buffer abstraction. |
|
833 |
+Also tricky will be adding rate-limiting to Libevent. |
|
834 |
+</li> |
|
835 |
+--> |
|
836 |
+ |
|
837 |
+<!-- |
|
838 |
+<li> |
|
839 |
+<b>Improving the Tor QA process: Continuous Integration for Windows builds</b> |
|
840 |
+<br /> |
|
841 |
+It would be useful to have automated build processes for Windows and |
|
842 |
+probably other platforms. The purpose of having a continuous integration |
|
843 |
+build environment is to ensure that Windows isn't left behind for any of |
|
844 |
+the software projects used in the Tor project or its accompanying.<br /> |
|
845 |
+Buildbot may be a good choice for this as it appears to support all of |
|
846 |
+the platforms Tor does. See the |
|
847 |
+<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for |
|
848 |
+buildbot</a>.<br /> |
|
849 |
+There may be better options and the person undertaking this task should |
|
850 |
+evaluate other options. Any person working on this automatic build |
|
851 |
+process should have experience or be willing to learn how to build all |
|
852 |
+of the respective Tor related code bases from scratch. Furthermore, the |
|
853 |
+person should have some experience building software in Windows |
|
854 |
+environments as this is the target audience we want to ensure we do not |
|
855 |
+leave behind. It would require close work with the Tor source code but |
|
856 |
+probably only in the form of building, not authoring.<br /> |
|
857 |
+Additionally, we need to automate our performance testing for all platforms. |
|
858 |
+We've got buildbot (except on Windows — as noted above) to automate |
|
859 |
+our regular integration and compile testing already, |
|
860 |
+but we need to get our network simulation tests (as built in torflow) |
|
861 |
+updated for more recent versions of Tor, and designed to launch a test |
|
862 |
+network either on a single machine, or across several, so we can test |
|
863 |
+changes in performance on machines in different roles automatically. |
|
864 |
+</li> |
|
865 |
+--> |
|
866 |
+ |
|
619 | 867 |
<!-- Removed, unless Mike still wants this to be in. |
620 | 868 |
<li> |
621 | 869 |
<b>Torbutton improvements</b> |
... | ... |
@@ -637,31 +885,6 @@ with not too much involvement in the Tor internals. |
637 | 885 |
</li> |
638 | 886 |
--> |
639 | 887 |
|
640 |
-<li> |
|
641 |
-<b>Improving Polipo on Windows</b> |
|
642 |
-<br /> |
|
643 |
-Priority: <i>Medium</i> |
|
644 |
-<br /> |
|
645 |
-Effort Level: <i>Low</i> |
|
646 |
-<br /> |
|
647 |
-Skill Level: <i>Medium</i> |
|
648 |
-<br /> |
|
649 |
-Likely Mentors: <i>Martin</i> |
|
650 |
-<br /> |
|
651 |
-Help port <a |
|
652 |
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to |
|
653 |
-Windows. Example topics to tackle include: |
|
654 |
-1) the ability to asynchronously |
|
655 |
-query name servers, find the system nameservers, and manage netbios |
|
656 |
-and dns queries. |
|
657 |
-2) manage events and buffers |
|
658 |
-natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in |
|
659 |
-Windows it's whatever the config specifies). 3) some sort of GUI config |
|
660 |
-and reporting tool, bonus if it has a systray icon with right clickable |
|
661 |
-menu options. Double bonus if it's cross-platform compatible. |
|
662 |
-3) allow the software to use the Windows Registry and handle proper Windows directory locations, such as "C:\Program Files\Polipo" |
|
663 |
-</li> |
|
664 |
- |
|
665 | 888 |
<!-- Is Blossom development still happening? |
666 | 889 |
<li> |
667 | 890 |
<b>Rework and extend Blossom</b> |
... | ... |
@@ -713,81 +936,7 @@ the core of the Blossom effort. |
713 | 936 |
</li> |
714 | 937 |
--> |
715 | 938 |
|
716 |
-<li> |
|
717 |
-<b>Implement a torrent-based scheme for downloading Thandy packages</b> |
|
718 |
-<br /> |
|
719 |
-Priority: <i>Medium</i> |
|
720 |
-<br /> |
|
721 |
-Effort Level: <i>High</i> |
|
722 |
-<br /> |
|
723 |
-Skill Level: <i>Medium to High</i> |
|
724 |
-<br /> |
|
725 |
-Likely Mentors: <i>Martin, Nick</i> |
|
726 |
-<br /> |
|
727 |
-<a |
|
728 |
-href="http://git.torproject.org/checkout/thandy/master/specs/thandy-spec.txt">Thandy</a> |
|
729 |
-is a relatively new software to allow assisted updates of Tor and related |
|
730 |
-software. Currently, there are very few users, but we expect Thandy to be |
|
731 |
-used by almost every Tor user in the future. To avoid crashing servers on |
|
732 |
-the day of a Tor update, we need new ways to distribute new packages |
|
733 |
-efficiently, and using libtorrent seems to be a possible solution. If you |
|
734 |
-think of other good ideas, great - please do let us know!<br /> |
|
735 |
-We also need to investigate how to include our mirrors better. If possible, |
|
736 |
-there should be an easy way for them to help distributing the packages. |
|
737 |
-</li> |
|
738 |
- |
|
739 |
-<li> |
|
740 |
-<b>Torbutton equivalent for Thunderbird</b> |
|
741 |
-<br /> |
|
742 |
-Priority: <i>Medium</i> |
|
743 |
-<br /> |
|
744 |
-Effort Level: <i>High</i> |
|
745 |
-<br /> |
|
746 |
-Skill Level: <i>High</i> |
|
747 |
-<br /> |
|
748 |
-Likely Mentors: <i>Mike</i> |
|
749 |
-<br /> |
|
750 |
-We're hearing from an increasing number of users that they want to use |
|
751 |
-Thunderbird with Tor. However, there are plenty of application-level |
|
752 |
-concerns, for example, by default Thunderbird will put your hostname in |
|
753 |
-the outgoing mail that it sends. At some point we should start a new |
|
754 |
-push to build a Thunderbird extension similar to Torbutton. |
|
755 |
-</li> |
|
756 |
- |
|
757 |
-<li> |
|
758 |
-<b>New Torbutton Features</b> |
|
759 |
-<br /> |
|
760 |
-Priority: <i>Medium</i> |
|
761 |
-<br /> |
|
762 |
-Effort Level: <i>High</i> |
|
763 |
-<br /> |
|
764 |
-Skill Level: <i>High</i> |
|
765 |
-<br /> |
|
766 |
-Likely Mentors: <i>Mike</i> |
|
767 |
-<br/> |
|
768 |
-There are several <a |
|
769 |
-href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5&type=2">good |
|
770 |
-feature requests</a> on the Torbutton Flyspray section. In particular, <a |
|
771 |
-href="https://bugs.torproject.org/flyspray/index.php?do=details&id=523">Integrating |
|
772 |
-'New Identity' with Vidalia</a>, |
|
773 |
-<a href="https://bugs.torproject.org/flyspray/index.php?do=details&id=940">ways of |
|
774 |
-managing multiple cookie jars/identities</a>, <a |
|
775 |
-href="https://bugs.torproject.org/flyspray/index.php?do=details&id=637">preserving |
|
776 |
-specific cookies</a> when cookies are cleared, |
|
777 |
-<a |
|
778 |
-href="https://bugs.torproject.org/flyspray/index.php?do=details&id=524">better |
|
779 |
-referrer spoofing</a>, <a |
|
780 |
-href="https://bugs.torproject.org/flyspray/index.php?do=details&id=564">correct |
|
781 |
-Tor status reporting</a>, and <a |
|
782 |
-href="https://bugs.torproject.org/flyspray/index.php?do=details&id=462">"tor://" |
|
783 |
-and "tors://" urls</a> are all interesting |
|
784 |
-features that could be added. |
|
785 |
-<br /> |
|
786 |
-This work would be independent coding in Javascript and the fun world of <a |
|
787 |
-href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>, |
|
788 |
-with not too much involvement in the Tor internals. |
|
789 |
-</li> |
|
790 |
- |
|
939 |
+<!-- not really suited for GSoC; integrated into TBB for Linux/Mac OS X |
|
791 | 940 |
<li> |
792 | 941 |
<b>Usability testing of Tor</b> |
793 | 942 |
<br /> |
... | ... |
@@ -804,141 +953,7 @@ That would help a lot in knowing what needs to be done in terms of bug |
804 | 953 |
fixes or new features. We get this informally at the moment, but a more |
805 | 954 |
structured process would be better. |
806 | 955 |
</li> |
807 |
- |
|
808 |
-<li> |
|
809 |
-<b>Translation wiki for our website</b> |
|
810 |
-<br /> |
|
811 |
-Priority: <i>High</i> |
|
812 |
-<br /> |
|
813 |
-Effort Level: <i>Medium</i> |
|
814 |
-<br /> |
|
815 |
-Skill Level: <i>Medium</i> |
|
816 |
-<br /> |
|
817 |
-Likely Mentors: <i>Jacob</i> |
|
818 |
-<br /> |
|
819 |
-The Tor Project has been working over the past year to set up web-based |
|
820 |
-tools to help volunteers translate our applications into other languages. |
|
821 |
-We finally hit upon Pootle, and we have a fine web-based translation engine |
|
822 |
-in place for Vidalia, Torbutton, and Torcheck. However, Pootle only |
|
823 |
-translates strings that are in the "po" format, and our website uses wml |
|
824 |
-files. This project is about finding a way to convert our wml files into po |
|
825 |
-strings and back, so they can be handled by Pootle. |
|
826 |
-</li> |
|
827 |
- |
|
828 |
-<li> |
|
829 |
-<b>New Thandy Features</b> |
|
830 |
-<br /> |
|
831 |
-Priority: <i>Medium</i> |
|
832 |
-<br /> |
|
833 |
-Effort Level: <i>Medium</i> |
|
834 |
-<br /> |
|
835 |
-Skill Level: <i>Medium to High</i> |
|
836 |
-<br /> |
|
837 |
-Likely Mentors: <i>Martin</i> |
|
838 |
-<br /> |
|
839 |
-Additional capabilities are needed for assisted updates of all the Tor |
|
840 |
-related software for Windows and other operating systems. Some of the |
|
841 |
-features to consider include: |
|
842 |
-1) Integration of the <a |
|
843 |
-href="http://chandlerproject.org/Projects/MeTooCrypto">MeTooCrypto |
|
844 |
-Python library</a> |
|
845 |
-for authenticated HTTPS downloads. 2) Adding a level of indirection |
|
846 |
-between the timestamp signatures and the package files included in an |
|
847 |
-update. See the "Thandy attacks / suggestions" thread on or-dev. |
|
848 |
-3) Support locale specific installation and configuration of assisted |
|
849 |
-updates based on preference, host, or user account language settings. |
|
850 |
-Familiarity with Windows codepages, unicode, and other character sets |
|
851 |
-is helpful in addition to general win32 and posix API experience and |
|
852 |
-Python proficiency. |
|
853 |
-</li> |
|
854 |
- |
|
855 |
-<li> |
|
856 |
-<b>Intermediate Level Network Device Driver</b> |
|
857 |
-<br /> |
|
858 |
-Priority: <i>Low</i> |
|
859 |
-<br /> |
|
860 |
-Effort Level: <i>High</i> |
|
861 |
-<br /> |
|
862 |
-Skill Level: <i>High</i> |
|
863 |
-<br /> |
|
864 |
-Likely Mentors: <i>Martin</i> |
|
865 |
-<br /> |
|
866 |
-The WinPCAP device driver used by Tor VM for bridged networking does |
|
867 |
-not support a number of wireless and non-Ethernet network adapters. |
|
868 |
-Implementation of a intermediate level network device driver for win32 |
|
869 |
-and 64bit would provide a way to intercept and route traffic over such |
|
870 |
-networks. This project will require knowledge of and experience with |
|
871 |
-Windows kernel device driver development and testing. Familiarity with |
|
872 |
-Winsock and Qemu would also be helpful. |
|
873 |
-</li> |
|
874 |
- |
|
875 |
-<li> |
|
876 |
-<b>Tor Browser Bundle for Linux/Mac OS X</b> |
|
877 |
-<br /> |
|
878 |
-Priority: <i>High</i> |
|
879 |
-<br /> |
|
880 |
-Effort Level: <i>High</i> |
|
881 |
-<br /> |
|
882 |
-Skill Level: <i>Medium</i> |
|
883 |
-<br /> |
|
884 |
-Likely Mentors: <i>Steven</i> |
|
885 |
-<br /> |
|
886 |
-The Tor Browser bundle incorporates Tor, Firefox, and the Vidalia user |
|
887 |
-interface (and optionally Pidgin IM). Components are pre-configured to |
|
888 |
-operate in a secure way, and it has very few dependencies on the |
|
889 |
-installed operating system. It has therefore become one of the most |
|
890 |
-easy to use, and popular, ways to use Tor on Windows. |
|
891 |
-<br /> |
|
892 |
-However, there is currently no comparable package for Linux and Mac OS |
|
893 |
-X, so this project would be to implement Tor Browser Bundle for these |
|
894 |
-platforms. This will involve modifications to Vidalia (C++), possibly |
|
895 |
-Firefox (C) then creating and testing the launcher on a range of |
|
896 |
-operating system versions and configurations to verify portability. |
|
897 |
-<br /> |
|
898 |
-Students should be familiar with application development on one or |
|
899 |
-preferably both of Linux and Mac OS X, and be comfortable with C/C++ |
|
900 |
-and shell scripting. |
|
901 |
-</li> |
|
902 |
- |
|
903 |
-<li> |
|
904 |
-<b>Simulator for slow Internet connections</b> |
|
905 |
-<br /> |
|
906 |
-Priority: <i>Medium</i> |
|
907 |
-<br /> |
|
908 |
-Effort Level: <i>Medium</i> |
|
909 |
-<br /> |
|
910 |
-Skill Level: <i>Medium</i> |
|
911 |
-<br /> |
|
912 |
-Likely Mentors: <i>Steven</i> |
|
913 |
-<br /> |
|
914 |
-Many users of Tor have poor-quality Internet connections, giving low |
|
915 |
-bandwidth, high latency, and high packet loss/re-ordering. User |
|
916 |
-experience is that Tor reacts badly to these conditions, but it is |
|
917 |
-difficult to improve the situation without being able to repeat the |
|
918 |
-problems in the lab. |
|
919 |
-<br /> |
|
920 |
-This project would be to build a simulation environment which |
|
921 |
-replicates the poor connectivity so that the effect on Tor performance |
|
922 |
-can be measured. Other components would be a testing utility to |
|
923 |
-establish what are the properties of connections available, and to |
|
924 |
-measure the effect of performance-improving modifications to Tor. |
|
925 |
-<br /> |
|
926 |
-The tools used would be up to the student, but dummynet (for FreeBSD) |
|
927 |
-and nistnet (for Linux) are two potential components on which this |
|
928 |
-project could be built. Students should be experienced with network |
|
929 |
-programming/debugging and TCP/IP, and preferably familiar with C and a |
|
930 |
-scripting language. |
|
931 |
-</li> |
|
932 |
- |
|
933 |
-<li> |
|
934 |
-<b>Bring up new ideas!</b> |
|
935 |
-<br /> |
|
936 |
-Don't like any of these? Look at the <a |
|
937 |
-href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development |
|
938 |
-roadmap</a> for more ideas. |
|
939 |
-Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a> |
|
940 |
-might also be short on developers. |
|
941 |
-</li> |
|
956 |
+--> |
|
942 | 957 |
|
943 | 958 |
</ol> |
944 | 959 |
|
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18524 |
|
2 |
+# Based-On-Revision: 19005 |
|
3 | 3 |
# Last-Translator: mail (a.t) oliverknapp. de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Pressemitteilungen" CHARSET="UTF-8" |
... | ... |
@@ -15,7 +15,7 @@ |
15 | 15 |
|
16 | 16 |
<p><strong>DEDHAM, |
17 | 17 |
MA, USA</strong> - Das Tor Projekt hat seinen 3-Jahres Entwicklungsplan <a |
18 |
-href="https://svn.torproject.org/svn/tor/trunk/doc/roadmaps/2008-12-19-roadmap-full.pdf"> |
|
18 |
+href="/press/presskit/2008-12-19-roadmap-full.pdf"> |
|
19 | 19 |
3-Jahres Entwicklungsplan</a> veröffentlicht, welcher den Fokus insbesondere |
20 | 20 |
auf die Verbreitung von Anti-Zensur Werkzeugen und Diensten für die Stärkung |
21 | 21 |
der Freiheit des Internets in geschlossenen Gesellschaften richtet.</p> |
... | ... |
@@ -1,5 +1,5 @@ |
1 | 1 |
## translation metadata |
2 |
-# Based-On-Revision: 18245 |
|
2 |
+# Based-On-Revision: 19005 |
|
3 | 3 |
# Last-Translator: mail (a.t) oliverknapp. de |
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Tor: Presseinformationen" CHARSET="UTF-8" |
... | ... |
@@ -19,11 +19,18 @@ |
19 | 19 |
execdir@torproject.org |
20 | 20 |
+1-781-424-9877 |
21 | 21 |
</address> |
22 |
+ <hr /> |
|
23 |
+ <h3>Presse-Kit</h3> |
|
24 |
+ <a href="/press/presskit/2009-General-Background-on-Tor-Project-Inc.pdf">Wer ist Tor? (Engl.)</a><br /> |
|
25 |
+ <a href="/press/presskit/2009-General-Online-Anonymity-with-Tor.pdf">Warum Anonymität im Internet? (Engl.)</a> |
|
22 | 26 |
</div> |
23 | 27 |
<!-- END SIDEBAR --> |
24 | 28 |
|
25 | 29 |
<ul> |
26 |
-<li>19 Dezember 2008. Tor veröffentlicht einen <a href="<page |
|
30 |
+<li>12. März 2009. Tor startet den <a href="<page |
|
31 |
+press/2009-03-12-performance-roadmap-press-release>">Plan und die Kampagne für |
|
32 |
+Geschwindigkeitsverbesserungen</a>.</li> |
|
33 |
+<li>19. Dezember 2008. Tor veröffentlicht einen <a href="<page |
|
27 | 34 |
press/2008-12-19-roadmap-press-release>">3-Jahres-Entwicklungsplan</a>.</li> |
28 | 35 |
</ul> |
29 | 36 |
|
... | ... |
@@ -1,6 +1,6 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Based-On-Revision: 15880 |
3 |
-#Last-Translator: jens@kubieziel.de |
|
3 |
+#Last-Translator: jens§kubieziel.de, mail?oliverknapp.de |
|
4 | 4 |
|
5 | 5 |
#include "head.wmi" TITLE="Projektseite von Tor" CHARSET="UTF-8" |
6 | 6 |
|
... | ... |
@@ -16,6 +16,7 @@ |
16 | 16 |
versteckten Dienste</a></li> |
17 | 17 |
<li>NLnet <a href="<page projects/lowbandwidth>">Tor für Programme mit niedriger Bandbreite</a></li> |
18 | 18 |
<li>Google <a href="<page projects/google>">Auto-update für Tor</a></li> |
19 |
+<li><a href="<page projects/metrics>">Das Projekt zum Finden von Maßstäben: Ausmessen des Tor Netzwerks</a></li> |
|
19 | 20 |
</ul> |
20 | 21 |
|
21 | 22 |
</div><!-- #main --> |
22 | 23 |