Roger Dingledine commited on 2008-03-04 03:27:56
Zeige 1 geänderte Dateien mit 8 Einfügungen und 76 Löschungen.
| ... | ... |
@@ -68,13 +68,6 @@ much does this impact privacy, and do we have any other good options?</li> |
| 68 | 68 |
<a id="Documentation"></a> |
| 69 | 69 |
<h2><a class="anchor" href="#Documentation">Documentation</a></h2> |
| 70 | 70 |
<ol> |
| 71 |
-<li>We hear that Tor users can fall victim to anonymity-breaking attacks |
|
| 72 |
-from javascript, java, activex, flash, etc, if they don't disable |
|
| 73 |
-them. Are there plugins out there (like NoScript for Firefox) that make |
|
| 74 |
-it easier for users to manage this risk? What is the risk exactly?</li> |
|
| 75 |
-<li>Is there a full suite of plugins that will replace all of Privoxy's |
|
| 76 |
-functionality for Firefox 1.5+? We hear Tor is much faster when you take |
|
| 77 |
-Privoxy out of the loop.</li> |
|
| 78 | 71 |
<li>Please help Matt Edman with the documentation and how-tos for his |
| 79 | 72 |
Tor controller, |
| 80 | 73 |
<a href="http://vidalia-project.net/">Vidalia</a>.</li> |
| ... | ... |
@@ -106,46 +99,12 @@ havoc and system crashes</a>. We should probably be using overlapped IO |
| 106 | 99 |
instead. One solution would be to teach <a |
| 107 | 100 |
href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use |
| 108 | 101 |
overlapped IO rather than select() on Windows, and then adapt Tor to |
| 109 |
-the new libevent interface.</li> |
|
| 110 |
-<li>Because Tor relays need to store-and-forward each cell they handle, |
|
| 111 |
-high-bandwidth Tor relays end up using dozens of megabytes of memory |
|
| 112 |
-just for buffers. We need better heuristics for when to shrink/expand |
|
| 113 |
-buffers. Maybe this should be modelled after the Linux kernel buffer |
|
| 114 |
-design, where we have many smaller buffers that link to each other, |
|
| 115 |
-rather than monolithic buffers?</li> |
|
| 116 |
-<li>We need an official central site to answer "Is this IP address a Tor |
|
| 117 |
-exit relay?" questions. This should provide several interfaces, including |
|
| 118 |
-a web interface and a DNSBL-style interface. It can provide the most |
|
| 119 |
-up-to-date answers by keeping a local mirror of the Tor directory |
|
| 120 |
-information. The tricky point is that being an exit relay is not a |
|
| 121 |
-boolean: so the question is actually "Is this IP address a Tor exit |
|
| 122 |
-relay that can exit to my IP address:port?" The DNSBL interface |
|
| 123 |
-will probably receive hundreds of queries a minute, so some smart |
|
| 124 |
-algorithms are in order. Bonus points if it does active testing through |
|
| 125 |
-each exit node to find out what IP address it's really exiting from. |
|
| 126 |
-<a href="<svnsandbox>doc/contrib/torel-design.txt">Read more here</a>.</li> |
|
| 127 |
-<li>Sometimes Tor relays crash, or the computers they're on fall off the |
|
| 128 |
-network, or other accidents happen. Some Tor operators have expressed |
|
| 129 |
-an interest in signing up to a "notifying" service that periodically |
|
| 130 |
-checks whether their Tor relay is healthy and sends them a reminder mail |
|
| 131 |
-when it's not. Anybody want to write a few cgi scripts, a few web pages, |
|
| 132 |
-and set up some sort of wget hack and/or something more complex like <a |
|
| 133 |
-href="http://nagios.org/">Nagios</a> to do the monitoring? The first |
|
| 134 |
-version could check just the directory port, e.g. looking through the |
|
| 135 |
-cached network-status page for the right IP address and port and then |
|
| 136 |
-asking for the "/tor/server/authority" page.</li> |
|
| 137 |
-<li>It would be great to have a LiveCD that includes the latest |
|
| 138 |
-versions of Tor, Polipo or Privoxy, Firefox, Gaim+OTR, etc. There are |
|
| 139 |
-two challenges here: first is documenting the system and choices well |
|
| 140 |
-enough that security people can form an opinion on whether it should be |
|
| 141 |
-secure, and the second is figuring out how to make it easily maintainable, |
|
| 142 |
-so it doesn't become quickly obsolete like AnonymOS. Bonus points if |
|
| 143 |
-the CD image fits on one of those small-form-factor CDs.</li> |
|
| 144 |
-<li>Related to the LiveCD image, we should work on an intuitively secure |
|
| 145 |
-and well-documented USB image for Tor and supporting applications. A |
|
| 146 |
-lot of the hard part here is deciding what configurations are secure, |
|
| 147 |
-documentating these decisions, and making something that is easy to |
|
| 148 |
-maintain going forward.</li> |
|
| 102 |
+the new libevent interface. Christian King made a |
|
| 103 |
+<a href="https://tor-svn.freehaven.net/svn/libevent-urz/trunk/">good |
|
| 104 |
+start</a> on this last summer.</li> |
|
| 105 |
+<li>How can we make the <a |
|
| 106 |
+href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> |
|
| 107 |
+easier to maintain, improve, and document?</li> |
|
| 149 | 108 |
<li>Our preferred graphical front-end for Tor, named |
| 150 | 109 |
<a href="http://vidalia-project.net/">Vidalia</a>, needs all sorts |
| 151 | 110 |
of development work.</li> |
| ... | ... |
@@ -163,16 +122,6 @@ giving a reasonable answer? This will spur a lot of new research. |
| 163 | 122 |
See the entry <a href="#Research">below</a> on confirmation attacks for |
| 164 | 123 |
details on the research side of this task — who knows, when it's |
| 165 | 124 |
done maybe you can help write a paper or three also.</li> |
| 166 |
-<li>We need a measurement study of <a |
|
| 167 |
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> |
|
| 168 |
-vs <a href="http://www.privoxy.org/">Privoxy</a>. Is Polipo in fact |
|
| 169 |
-significantly faster, once you factor in the slow-down from Tor? Are the |
|
| 170 |
-results the same on both Linux and Windows? Related, does Polipo handle |
|
| 171 |
-more web sites correctly than Privoxy, or vice versa? Are there stability |
|
| 172 |
-issues on any common platforms, e.g. Windows?</li> |
|
| 173 |
-<li>Related on the above, would you like to help port <a |
|
| 174 |
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> so it |
|
| 175 |
-runs stably and efficiently on Windows?</li> |
|
| 176 | 125 |
<li>We need a distributed testing framework. We have unit tests, |
| 177 | 126 |
but it would be great to have a script that starts up a Tor network, uses |
| 178 | 127 |
it for a while, and verifies that at least parts of it are working.</li> |
| ... | ... |
@@ -183,25 +132,8 @@ it's a python library that uses the <a |
| 183 | 132 |
href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor controller |
| 184 | 133 |
protocol</a> to instruct Tor to build circuits in a variety of ways, |
| 185 | 134 |
and then it measures performance and tries to detect anomalies.</li> |
| 186 |
-<!-- |
|
| 187 |
-<li>Right now the hidden service descriptors are being stored on just a |
|
| 188 |
-few directory servers. This is bad for privacy and bad for robustness. To |
|
| 189 |
-get more robustness, we're going to need to make hidden service |
|
| 190 |
-descriptors even less private because we're going to have to mirror them |
|
| 191 |
-onto many places. Ideally we'd like to separate the storage/lookup system |
|
| 192 |
-from the Tor directory servers entirely. The first problem is that we need |
|
| 193 |
-to design a new hidden service descriptor format to a) be ascii rather |
|
| 194 |
-than binary for convenience; b) keep the list of introduction points |
|
| 195 |
-encrypted unless you know the <tt>.onion</tt> address, so the directory |
|
| 196 |
-can't learn them; and c) allow the directories to verify the timestamp |
|
| 197 |
-and signature on a hidden service descriptor so they can't be tricked |
|
| 198 |
-into giving out fake ones. Second, any reliable distributed storage |
|
| 199 |
-system will do, as long as it allows authenticated updates, but as far |
|
| 200 |
-as we know no implemented DHT code supports authenticated updates.</li> |
|
| 201 |
---> |
|
| 202 | 135 |
<li>Tor 0.1.1.x and later include support for hardware crypto accelerators |
| 203 |
-via |
|
| 204 |
-OpenSSL. Nobody has ever tested it, though. Does somebody want to get |
|
| 136 |
+via OpenSSL. Nobody has ever tested it, though. Does somebody want to get |
|
| 205 | 137 |
a card and let us know how it goes?</li> |
| 206 | 138 |
<li>Perform a security analysis of Tor with <a |
| 207 | 139 |
href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine |
| ... | ... |
@@ -221,7 +153,7 @@ UDP</a> — please let us know what's wrong with it.</li> |
| 221 | 153 |
(at exit nodes). If you care strongly about IPv6, that's probably the |
| 222 | 154 |
first place to start.</li> |
| 223 | 155 |
<li>Don't like any of these? Look at the <a |
| 224 |
-href="<svnsandbox>doc/design-paper/roadmap-2007.pdf">Tor development |
|
| 156 |
+href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development |
|
| 225 | 157 |
roadmap</a> for more ideas.</li> |
| 226 | 158 |
<li>Don't see your idea here? We probably need it anyway! Contact |
| 227 | 159 |
us and find out.</li> |
| 228 | 160 |