Roger Dingledine commited on 2005-05-21 08:08:01
Zeige 1 geänderte Dateien mit 18 Einfügungen und 8 Löschungen.
... | ... |
@@ -45,8 +45,8 @@ |
45 | 45 |
|
46 | 46 |
<p>Ongoing needs:</p> |
47 | 47 |
<ul> |
48 |
-<li>Try Tor out, and let the Tor developers know about bugs you find or |
|
49 |
-features you don't find.</li> |
|
48 |
+<li>We need users like you to try Tor out, and let the Tor developers |
|
49 |
+know about bugs you find or features you don't find.</li> |
|
50 | 50 |
<li>Please consider <a |
51 | 51 |
href="cvs/tor/doc/tor-doc.html#server">running a |
52 | 52 |
server</a> to help the Tor network grow.</li> |
... | ... |
@@ -70,6 +70,8 @@ focusing on Tor.</p> |
70 | 70 |
<ul> |
71 | 71 |
<li>Does somebody want to help maintain this website, or help with |
72 | 72 |
documentation, or help with managing our TODO and handling bug reports?</li> |
73 |
+<li>We may have too <i>much</i> documentation. It's spread out too far |
|
74 |
+and duplicates itself in places. Can you help us consolidate?</li> |
|
73 | 75 |
<li>Please help translate the web page and documentation |
74 | 76 |
into other languages. See the <a href="translation.html">translation guidelines</a> |
75 | 77 |
if you want to help out. (Examples: |
... | ... |
@@ -142,12 +144,6 @@ defenses.</p> |
142 | 144 |
href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there |
143 | 145 |
good libraries out there for what we want? What are the first steps? Win |
144 | 146 |
fame by getting credit when we put out a new release because of you!</li> |
145 |
-<li>Server CPU load is high because clients keep asking to make new |
|
146 |
-circuits, which uses public key crypto. Possible defenses include: |
|
147 |
-using helper nodes (fixed entry nodes); rate limiting the number of |
|
148 |
-create cells handled per second; having clients retry failed extensions |
|
149 |
-a few times; implementing ssl sessions; and using hardware crypto when |
|
150 |
-available.</li> |
|
151 | 147 |
<li>Website volume fingerprinting attacks (<a |
152 | 148 |
href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a |
153 | 149 |
href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). |
... | ... |
@@ -166,6 +162,20 @@ better?</li> |
166 | 162 |
|
167 | 163 |
<p>Designer project-lets:</p> |
168 | 164 |
<ul> |
165 |
+<li>Server CPU load is high because clients keep asking to make new |
|
166 |
+circuits, which uses public key crypto. Possible defenses include: |
|
167 |
+using helper nodes (fixed entry nodes); rate limiting the number of |
|
168 |
+create cells handled per second; having clients retry failed extensions |
|
169 |
+a few times; implementing ssl sessions; and using hardware crypto when |
|
170 |
+available.</li> |
|
171 |
+<li>We fear we might not work very well when servers have asymmetric |
|
172 |
+bandwidth. Because Tor has separate TCP connections between each hop, |
|
173 |
+if the incoming bytes are arriving just fine and the outgoing bytes |
|
174 |
+are all getting dropped on the floor, the TCP push-back mechanisms |
|
175 |
+don't really transmit this information back to the incoming streams. |
|
176 |
+Perhaps Tor should detect when it's dropping a lot of outgoing packets, |
|
177 |
+and rate-limit incoming streams to regulate this itself? We need somebody |
|
178 |
+who's good with networks to simulate this and help design solutions.</li> |
|
169 | 179 |
<li>Right now the hidden service descriptors are being stored on the |
170 | 180 |
dirservers, but any reliable distributed storage system would do (for |
171 | 181 |
example, a DHT that allows authenticated updates). Can somebody figure |
172 | 182 |