Roger Dingledine commited on 2005-05-21 08:08:01
Zeige 1 geänderte Dateien mit 18 Einfügungen und 8 Löschungen.
| ... | ... |
@@ -45,8 +45,8 @@ |
| 45 | 45 |
|
| 46 | 46 |
<p>Ongoing needs:</p> |
| 47 | 47 |
<ul> |
| 48 |
-<li>Try Tor out, and let the Tor developers know about bugs you find or |
|
| 49 |
-features you don't find.</li> |
|
| 48 |
+<li>We need users like you to try Tor out, and let the Tor developers |
|
| 49 |
+know about bugs you find or features you don't find.</li> |
|
| 50 | 50 |
<li>Please consider <a |
| 51 | 51 |
href="cvs/tor/doc/tor-doc.html#server">running a |
| 52 | 52 |
server</a> to help the Tor network grow.</li> |
| ... | ... |
@@ -70,6 +70,8 @@ focusing on Tor.</p> |
| 70 | 70 |
<ul> |
| 71 | 71 |
<li>Does somebody want to help maintain this website, or help with |
| 72 | 72 |
documentation, or help with managing our TODO and handling bug reports?</li> |
| 73 |
+<li>We may have too <i>much</i> documentation. It's spread out too far |
|
| 74 |
+and duplicates itself in places. Can you help us consolidate?</li> |
|
| 73 | 75 |
<li>Please help translate the web page and documentation |
| 74 | 76 |
into other languages. See the <a href="translation.html">translation guidelines</a> |
| 75 | 77 |
if you want to help out. (Examples: |
| ... | ... |
@@ -142,12 +144,6 @@ defenses.</p> |
| 142 | 144 |
href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a> Tor. Are there |
| 143 | 145 |
good libraries out there for what we want? What are the first steps? Win |
| 144 | 146 |
fame by getting credit when we put out a new release because of you!</li> |
| 145 |
-<li>Server CPU load is high because clients keep asking to make new |
|
| 146 |
-circuits, which uses public key crypto. Possible defenses include: |
|
| 147 |
-using helper nodes (fixed entry nodes); rate limiting the number of |
|
| 148 |
-create cells handled per second; having clients retry failed extensions |
|
| 149 |
-a few times; implementing ssl sessions; and using hardware crypto when |
|
| 150 |
-available.</li> |
|
| 151 | 147 |
<li>Website volume fingerprinting attacks (<a |
| 152 | 148 |
href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a |
| 153 | 149 |
href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). |
| ... | ... |
@@ -166,6 +162,20 @@ better?</li> |
| 166 | 162 |
|
| 167 | 163 |
<p>Designer project-lets:</p> |
| 168 | 164 |
<ul> |
| 165 |
+<li>Server CPU load is high because clients keep asking to make new |
|
| 166 |
+circuits, which uses public key crypto. Possible defenses include: |
|
| 167 |
+using helper nodes (fixed entry nodes); rate limiting the number of |
|
| 168 |
+create cells handled per second; having clients retry failed extensions |
|
| 169 |
+a few times; implementing ssl sessions; and using hardware crypto when |
|
| 170 |
+available.</li> |
|
| 171 |
+<li>We fear we might not work very well when servers have asymmetric |
|
| 172 |
+bandwidth. Because Tor has separate TCP connections between each hop, |
|
| 173 |
+if the incoming bytes are arriving just fine and the outgoing bytes |
|
| 174 |
+are all getting dropped on the floor, the TCP push-back mechanisms |
|
| 175 |
+don't really transmit this information back to the incoming streams. |
|
| 176 |
+Perhaps Tor should detect when it's dropping a lot of outgoing packets, |
|
| 177 |
+and rate-limit incoming streams to regulate this itself? We need somebody |
|
| 178 |
+who's good with networks to simulate this and help design solutions.</li> |
|
| 169 | 179 |
<li>Right now the hidden service descriptors are being stored on the |
| 170 | 180 |
dirservers, but any reliable distributed storage system would do (for |
| 171 | 181 |
example, a DHT that allows authenticated updates). Can somebody figure |
| 172 | 182 |