Roger Dingledine commited on 2008-03-04 03:27:56
Zeige 1 geänderte Dateien mit 8 Einfügungen und 76 Löschungen.
... | ... |
@@ -68,13 +68,6 @@ much does this impact privacy, and do we have any other good options?</li> |
68 | 68 |
<a id="Documentation"></a> |
69 | 69 |
<h2><a class="anchor" href="#Documentation">Documentation</a></h2> |
70 | 70 |
<ol> |
71 |
-<li>We hear that Tor users can fall victim to anonymity-breaking attacks |
|
72 |
-from javascript, java, activex, flash, etc, if they don't disable |
|
73 |
-them. Are there plugins out there (like NoScript for Firefox) that make |
|
74 |
-it easier for users to manage this risk? What is the risk exactly?</li> |
|
75 |
-<li>Is there a full suite of plugins that will replace all of Privoxy's |
|
76 |
-functionality for Firefox 1.5+? We hear Tor is much faster when you take |
|
77 |
-Privoxy out of the loop.</li> |
|
78 | 71 |
<li>Please help Matt Edman with the documentation and how-tos for his |
79 | 72 |
Tor controller, |
80 | 73 |
<a href="http://vidalia-project.net/">Vidalia</a>.</li> |
... | ... |
@@ -106,46 +99,12 @@ havoc and system crashes</a>. We should probably be using overlapped IO |
106 | 99 |
instead. One solution would be to teach <a |
107 | 100 |
href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use |
108 | 101 |
overlapped IO rather than select() on Windows, and then adapt Tor to |
109 |
-the new libevent interface.</li> |
|
110 |
-<li>Because Tor relays need to store-and-forward each cell they handle, |
|
111 |
-high-bandwidth Tor relays end up using dozens of megabytes of memory |
|
112 |
-just for buffers. We need better heuristics for when to shrink/expand |
|
113 |
-buffers. Maybe this should be modelled after the Linux kernel buffer |
|
114 |
-design, where we have many smaller buffers that link to each other, |
|
115 |
-rather than monolithic buffers?</li> |
|
116 |
-<li>We need an official central site to answer "Is this IP address a Tor |
|
117 |
-exit relay?" questions. This should provide several interfaces, including |
|
118 |
-a web interface and a DNSBL-style interface. It can provide the most |
|
119 |
-up-to-date answers by keeping a local mirror of the Tor directory |
|
120 |
-information. The tricky point is that being an exit relay is not a |
|
121 |
-boolean: so the question is actually "Is this IP address a Tor exit |
|
122 |
-relay that can exit to my IP address:port?" The DNSBL interface |
|
123 |
-will probably receive hundreds of queries a minute, so some smart |
|
124 |
-algorithms are in order. Bonus points if it does active testing through |
|
125 |
-each exit node to find out what IP address it's really exiting from. |
|
126 |
-<a href="<svnsandbox>doc/contrib/torel-design.txt">Read more here</a>.</li> |
|
127 |
-<li>Sometimes Tor relays crash, or the computers they're on fall off the |
|
128 |
-network, or other accidents happen. Some Tor operators have expressed |
|
129 |
-an interest in signing up to a "notifying" service that periodically |
|
130 |
-checks whether their Tor relay is healthy and sends them a reminder mail |
|
131 |
-when it's not. Anybody want to write a few cgi scripts, a few web pages, |
|
132 |
-and set up some sort of wget hack and/or something more complex like <a |
|
133 |
-href="http://nagios.org/">Nagios</a> to do the monitoring? The first |
|
134 |
-version could check just the directory port, e.g. looking through the |
|
135 |
-cached network-status page for the right IP address and port and then |
|
136 |
-asking for the "/tor/server/authority" page.</li> |
|
137 |
-<li>It would be great to have a LiveCD that includes the latest |
|
138 |
-versions of Tor, Polipo or Privoxy, Firefox, Gaim+OTR, etc. There are |
|
139 |
-two challenges here: first is documenting the system and choices well |
|
140 |
-enough that security people can form an opinion on whether it should be |
|
141 |
-secure, and the second is figuring out how to make it easily maintainable, |
|
142 |
-so it doesn't become quickly obsolete like AnonymOS. Bonus points if |
|
143 |
-the CD image fits on one of those small-form-factor CDs.</li> |
|
144 |
-<li>Related to the LiveCD image, we should work on an intuitively secure |
|
145 |
-and well-documented USB image for Tor and supporting applications. A |
|
146 |
-lot of the hard part here is deciding what configurations are secure, |
|
147 |
-documentating these decisions, and making something that is easy to |
|
148 |
-maintain going forward.</li> |
|
102 |
+the new libevent interface. Christian King made a |
|
103 |
+<a href="https://tor-svn.freehaven.net/svn/libevent-urz/trunk/">good |
|
104 |
+start</a> on this last summer.</li> |
|
105 |
+<li>How can we make the <a |
|
106 |
+href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> |
|
107 |
+easier to maintain, improve, and document?</li> |
|
149 | 108 |
<li>Our preferred graphical front-end for Tor, named |
150 | 109 |
<a href="http://vidalia-project.net/">Vidalia</a>, needs all sorts |
151 | 110 |
of development work.</li> |
... | ... |
@@ -163,16 +122,6 @@ giving a reasonable answer? This will spur a lot of new research. |
163 | 122 |
See the entry <a href="#Research">below</a> on confirmation attacks for |
164 | 123 |
details on the research side of this task — who knows, when it's |
165 | 124 |
done maybe you can help write a paper or three also.</li> |
166 |
-<li>We need a measurement study of <a |
|
167 |
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> |
|
168 |
-vs <a href="http://www.privoxy.org/">Privoxy</a>. Is Polipo in fact |
|
169 |
-significantly faster, once you factor in the slow-down from Tor? Are the |
|
170 |
-results the same on both Linux and Windows? Related, does Polipo handle |
|
171 |
-more web sites correctly than Privoxy, or vice versa? Are there stability |
|
172 |
-issues on any common platforms, e.g. Windows?</li> |
|
173 |
-<li>Related on the above, would you like to help port <a |
|
174 |
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> so it |
|
175 |
-runs stably and efficiently on Windows?</li> |
|
176 | 125 |
<li>We need a distributed testing framework. We have unit tests, |
177 | 126 |
but it would be great to have a script that starts up a Tor network, uses |
178 | 127 |
it for a while, and verifies that at least parts of it are working.</li> |
... | ... |
@@ -183,25 +132,8 @@ it's a python library that uses the <a |
183 | 132 |
href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor controller |
184 | 133 |
protocol</a> to instruct Tor to build circuits in a variety of ways, |
185 | 134 |
and then it measures performance and tries to detect anomalies.</li> |
186 |
-<!-- |
|
187 |
-<li>Right now the hidden service descriptors are being stored on just a |
|
188 |
-few directory servers. This is bad for privacy and bad for robustness. To |
|
189 |
-get more robustness, we're going to need to make hidden service |
|
190 |
-descriptors even less private because we're going to have to mirror them |
|
191 |
-onto many places. Ideally we'd like to separate the storage/lookup system |
|
192 |
-from the Tor directory servers entirely. The first problem is that we need |
|
193 |
-to design a new hidden service descriptor format to a) be ascii rather |
|
194 |
-than binary for convenience; b) keep the list of introduction points |
|
195 |
-encrypted unless you know the <tt>.onion</tt> address, so the directory |
|
196 |
-can't learn them; and c) allow the directories to verify the timestamp |
|
197 |
-and signature on a hidden service descriptor so they can't be tricked |
|
198 |
-into giving out fake ones. Second, any reliable distributed storage |
|
199 |
-system will do, as long as it allows authenticated updates, but as far |
|
200 |
-as we know no implemented DHT code supports authenticated updates.</li> |
|
201 |
---> |
|
202 | 135 |
<li>Tor 0.1.1.x and later include support for hardware crypto accelerators |
203 |
-via |
|
204 |
-OpenSSL. Nobody has ever tested it, though. Does somebody want to get |
|
136 |
+via OpenSSL. Nobody has ever tested it, though. Does somebody want to get |
|
205 | 137 |
a card and let us know how it goes?</li> |
206 | 138 |
<li>Perform a security analysis of Tor with <a |
207 | 139 |
href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine |
... | ... |
@@ -221,7 +153,7 @@ UDP</a> — please let us know what's wrong with it.</li> |
221 | 153 |
(at exit nodes). If you care strongly about IPv6, that's probably the |
222 | 154 |
first place to start.</li> |
223 | 155 |
<li>Don't like any of these? Look at the <a |
224 |
-href="<svnsandbox>doc/design-paper/roadmap-2007.pdf">Tor development |
|
156 |
+href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development |
|
225 | 157 |
roadmap</a> for more ideas.</li> |
226 | 158 |
<li>Don't see your idea here? We probably need it anyway! Contact |
227 | 159 |
us and find out.</li> |
228 | 160 |