a lot of the coding items on the volunteer page are done. great.
Roger Dingledine

Roger Dingledine commited on 2008-03-04 03:27:56
Zeige 1 geänderte Dateien mit 8 Einfügungen und 76 Löschungen.

... ...
@@ -68,13 +68,6 @@ much does this impact privacy, and do we have any other good options?</li>
68 68
 <a id="Documentation"></a>
69 69
 <h2><a class="anchor" href="#Documentation">Documentation</a></h2>
70 70
 <ol>
71
-<li>We hear that Tor users can fall victim to anonymity-breaking attacks
72
-from javascript, java, activex, flash, etc, if they don't disable
73
-them. Are there plugins out there (like NoScript for Firefox) that make
74
-it easier for users to manage this risk? What is the risk exactly?</li>
75
-<li>Is there a full suite of plugins that will replace all of Privoxy's
76
-functionality for Firefox 1.5+? We hear Tor is much faster when you take
77
-Privoxy out of the loop.</li>
78 71
 <li>Please help Matt Edman with the documentation and how-tos for his
79 72
 Tor controller,
80 73
 <a href="http://vidalia-project.net/">Vidalia</a>.</li>
... ...
@@ -106,46 +99,12 @@ havoc and system crashes</a>. We should probably be using overlapped IO
106 99
 instead. One solution would be to teach <a
107 100
 href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use
108 101
 overlapped IO rather than select() on Windows, and then adapt Tor to
109
-the new libevent interface.</li>
110
-<li>Because Tor relays need to store-and-forward each cell they handle,
111
-high-bandwidth Tor relays end up using dozens of megabytes of memory
112
-just for buffers. We need better heuristics for when to shrink/expand
113
-buffers. Maybe this should be modelled after the Linux kernel buffer
114
-design, where we have many smaller buffers that link to each other,
115
-rather than monolithic buffers?</li>
116
-<li>We need an official central site to answer "Is this IP address a Tor
117
-exit relay?" questions. This should provide several interfaces, including
118
-a web interface and a DNSBL-style interface. It can provide the most
119
-up-to-date answers by keeping a local mirror of the Tor directory
120
-information. The tricky point is that being an exit relay is not a
121
-boolean: so the question is actually "Is this IP address a Tor exit
122
-relay that can exit to my IP address:port?" The DNSBL interface
123
-will probably receive hundreds of queries a minute, so some smart
124
-algorithms are in order. Bonus points if it does active testing through
125
-each exit node to find out what IP address it's really exiting from.
126
-<a href="<svnsandbox>doc/contrib/torel-design.txt">Read more here</a>.</li>
127
-<li>Sometimes Tor relays crash, or the computers they're on fall off the
128
-network, or other accidents happen. Some Tor operators have expressed
129
-an interest in signing up to a "notifying" service that periodically
130
-checks whether their Tor relay is healthy and sends them a reminder mail
131
-when it's not. Anybody want to write a few cgi scripts, a few web pages,
132
-and set up some sort of wget hack and/or something more complex like <a
133
-href="http://nagios.org/">Nagios</a> to do the monitoring? The first
134
-version could check just the directory port, e.g. looking through the
135
-cached network-status page for the right IP address and port and then
136
-asking for the "/tor/server/authority" page.</li>
137
-<li>It would be great to have a LiveCD that includes the latest
138
-versions of Tor, Polipo or Privoxy, Firefox, Gaim+OTR, etc. There are
139
-two challenges here: first is documenting the system and choices well
140
-enough that security people can form an opinion on whether it should be
141
-secure, and the second is figuring out how to make it easily maintainable,
142
-so it doesn't become quickly obsolete like AnonymOS. Bonus points if
143
-the CD image fits on one of those small-form-factor CDs.</li>
144
-<li>Related to the LiveCD image, we should work on an intuitively secure
145
-and well-documented USB image for Tor and supporting applications. A
146
-lot of the hard part here is deciding what configurations are secure,
147
-documentating these decisions, and making something that is easy to
148
-maintain going forward.</li>
102
+the new libevent interface. Christian King made a
103
+<a href="https://tor-svn.freehaven.net/svn/libevent-urz/trunk/">good
104
+start</a> on this last summer.</li>
105
+<li>How can we make the <a
106
+href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a>
107
+easier to maintain, improve, and document?</li>
149 108
 <li>Our preferred graphical front-end for Tor, named
150 109
 <a href="http://vidalia-project.net/">Vidalia</a>, needs all sorts
151 110
 of development work.</li>
... ...
@@ -163,16 +122,6 @@ giving a reasonable answer? This will spur a lot of new research.
163 122
 See the entry <a href="#Research">below</a> on confirmation attacks for
164 123
 details on the research side of this task &mdash; who knows, when it's
165 124
 done maybe you can help write a paper or three also.</li>
166
-<li>We need a measurement study of <a
167
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a>
168
-vs <a href="http://www.privoxy.org/">Privoxy</a>. Is Polipo in fact
169
-significantly faster, once you factor in the slow-down from Tor? Are the
170
-results the same on both Linux and Windows? Related, does Polipo handle
171
-more web sites correctly than Privoxy, or vice versa? Are there stability
172
-issues on any common platforms, e.g. Windows?</li>
173
-<li>Related on the above, would you like to help port <a
174
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> so it
175
-runs stably and efficiently on Windows?</li>
176 125
 <li>We need a distributed testing framework. We have unit tests,
177 126
 but it would be great to have a script that starts up a Tor network, uses
178 127
 it for a while, and verifies that at least parts of it are working.</li>
... ...
@@ -183,25 +132,8 @@ it's a python library that uses the <a
183 132
 href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor controller
184 133
 protocol</a> to instruct Tor to build circuits in a variety of ways,
185 134
 and then it measures performance and tries to detect anomalies.</li>
186
-<!--
187
-<li>Right now the hidden service descriptors are being stored on just a
188
-few directory servers. This is bad for privacy and bad for robustness. To
189
-get more robustness, we're going to need to make hidden service
190
-descriptors even less private because we're going to have to mirror them
191
-onto many places. Ideally we'd like to separate the storage/lookup system
192
-from the Tor directory servers entirely. The first problem is that we need
193
-to design a new hidden service descriptor format to a) be ascii rather
194
-than binary for convenience; b) keep the list of introduction points
195
-encrypted unless you know the <tt>.onion</tt> address, so the directory
196
-can't learn them; and c) allow the directories to verify the timestamp
197
-and signature on a hidden service descriptor so they can't be tricked
198
-into giving out fake ones. Second, any reliable distributed storage
199
-system will do, as long as it allows authenticated updates, but as far
200
-as we know no implemented DHT code supports authenticated updates.</li>
201
--->
202 135
 <li>Tor 0.1.1.x and later include support for hardware crypto accelerators
203
-via
204
-OpenSSL. Nobody has ever tested it, though. Does somebody want to get
136
+via OpenSSL. Nobody has ever tested it, though. Does somebody want to get
205 137
 a card and let us know how it goes?</li>
206 138
 <li>Perform a security analysis of Tor with <a
207 139
 href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine
... ...
@@ -221,7 +153,7 @@ UDP</a> &mdash; please let us know what's wrong with it.</li>
221 153
 (at exit nodes). If you care strongly about IPv6, that's probably the
222 154
 first place to start.</li>
223 155
 <li>Don't like any of these? Look at the <a
224
-href="<svnsandbox>doc/design-paper/roadmap-2007.pdf">Tor development
156
+href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development
225 157
 roadmap</a> for more ideas.</li>
226 158
 <li>Don't see your idea here? We probably need it anyway! Contact
227 159
 us and find out.</li>
228 160