more contribute items
Roger Dingledine

Roger Dingledine commited on 2005-05-21 08:08:01
Zeige 1 geänderte Dateien mit 18 Einfügungen und 8 Löschungen.

... ...
@@ -45,8 +45,8 @@
45 45
 
46 46
 <p>Ongoing needs:</p>
47 47
 <ul>
48
-<li>Try Tor out, and let the Tor developers know about bugs you find or
49
-features you don't find.</li>
48
+<li>We need users like you to try Tor out, and let the Tor developers
49
+know about bugs you find or features you don't find.</li>
50 50
 <li>Please consider <a
51 51
 href="cvs/tor/doc/tor-doc.html#server">running a
52 52
 server</a> to help the Tor network grow.</li>
... ...
@@ -70,6 +70,8 @@ focusing on Tor.</p>
70 70
 <ul>
71 71
 <li>Does somebody want to help maintain this website, or help with
72 72
 documentation, or help with managing our TODO and handling bug reports?</li>
73
+<li>We may have too <i>much</i> documentation. It's spread out too far
74
+and duplicates itself in places. Can you help us consolidate?</li>
73 75
 <li>Please help translate the web page and documentation
74 76
 into other languages. See the <a href="translation.html">translation guidelines</a> 
75 77
 if you want to help out. (Examples:
... ...
@@ -142,12 +144,6 @@ defenses.</p>
142 144
 href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there
143 145
 good libraries out there for what we want? What are the first steps? Win
144 146
 fame by getting credit when we put out a new release because of you!</li>
145
-<li>Server CPU load is high because clients keep asking to make new
146
-circuits, which uses public key crypto. Possible defenses include:
147
-using helper nodes (fixed entry nodes); rate limiting the number of
148
-create cells handled per second; having clients retry failed extensions
149
-a few times; implementing ssl sessions; and using hardware crypto when
150
-available.</li>
151 147
 <li>Website volume fingerprinting attacks (<a
152 148
 href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a
153 149
 href="http://freehaven.net/anonbib/#hintz02">Hintz</a>).
... ...
@@ -166,6 +162,20 @@ better?</li>
166 162
 
167 163
 <p>Designer project-lets:</p>
168 164
 <ul>
165
+<li>Server CPU load is high because clients keep asking to make new
166
+circuits, which uses public key crypto. Possible defenses include:
167
+using helper nodes (fixed entry nodes); rate limiting the number of
168
+create cells handled per second; having clients retry failed extensions
169
+a few times; implementing ssl sessions; and using hardware crypto when
170
+available.</li>
171
+<li>We fear we might not work very well when servers have asymmetric
172
+bandwidth. Because Tor has separate TCP connections between each hop,
173
+if the incoming bytes are arriving just fine and the outgoing bytes
174
+are all getting dropped on the floor, the TCP push-back mechanisms
175
+don't really transmit this information back to the incoming streams.
176
+Perhaps Tor should detect when it's dropping a lot of outgoing packets,
177
+and rate-limit incoming streams to regulate this itself? We need somebody
178
+who's good with networks to simulate this and help design solutions.</li>
169 179
 <li>Right now the hidden service descriptors are being stored on the
170 180
 dirservers, but any reliable distributed storage system would do (for
171 181
 example, a DHT that allows authenticated updates). Can somebody figure
172 182