Jens Kubieziel commited on 2008-05-16 11:35:44
Zeige 1 geänderte Dateien mit 938 Einfügungen und 12 Löschungen.
| ... | ... |
@@ -1,5 +1,5 @@ |
| 1 | 1 |
## translation metadata |
| 2 |
-# Based-On-Revision: 13843 |
|
| 2 |
+# Based-On-Revision: 14628 |
|
| 3 | 3 |
# Last-Translator: jens@kubieziel.de, peter@palfrader.org |
| 4 | 4 |
|
| 5 | 5 |
#include "head.wmi" TITLE="Mithelfen" |
| ... | ... |
@@ -30,7 +30,7 @@ |
| 30 | 30 |
<h2><a class="anchor" href="#Usability">unterst�tzende Anwendungen</a></h2> |
| 31 | 31 |
|
| 32 | 32 |
<ol> |
| 33 |
- <li>Wir brauchen einen guten Weg, um DNS-Abfragen abzufangen, damit diese |
|
| 33 |
+ <li>Wir brauchen gute Methoden, um DNS-Abfragen abzufangen, damit diese |
|
| 34 | 34 |
nicht an einen lokalen Beobachter dringen, w�hrend wir versuchen, anonym zu |
| 35 | 35 |
bleiben. (Dies passiert, weil die Anwendung selbst DNS-Anfragen |
| 36 | 36 |
stellt, anstatt diese �ber Tor zu leiten.). |
| ... | ... |
@@ -122,6 +122,882 @@ |
| 122 | 122 |
</ol> |
| 123 | 123 |
|
| 124 | 124 |
<a id="Coding"></a> |
| 125 |
+ <p>Die untenstehenden Angaben wurden in der Originalsprache |
|
| 126 |
+ belassen. Da diese sich ausschlie�lich auf englischsprachige |
|
| 127 |
+ Bewerber beziehen.</p> |
|
| 128 |
+ |
|
| 129 |
+ <a id="Summer"></a> |
|
| 130 |
+<a id="Projects"></a> |
|
| 131 |
+<h2><a class="anchor" href="#Projects">Good Coding Projects</a></h2> |
|
| 132 |
+ |
|
| 133 |
+<p> |
|
| 134 |
+You may find some of these projects to be good <a href="<page |
|
| 135 |
+gsoc>">Google Summer of Code 2008</a> ideas. We have labelled each idea |
|
| 136 |
+with how useful it would be to the overall Tor project |
|
| 137 |
+(priority), how much work we expect it would be (effort level), how much |
|
| 138 |
+clue you should start with (skill level), and which of our <a href="<page |
|
| 139 |
+people>#Core">core developers</a> would be good mentors. There are plenty |
|
| 140 |
+of other good ideas to work on too — see for example the <a |
|
| 141 |
+href="<svnsandbox>doc/spec/proposals/">current proposals</a> list, or |
|
| 142 |
+just make up your own ideas. |
|
| 143 |
+</p> |
|
| 144 |
+ |
|
| 145 |
+<ol> |
|
| 146 |
+ |
|
| 147 |
+<li> |
|
| 148 |
+<b>Tor Exit Scanner improvements</b> |
|
| 149 |
+<br /> |
|
| 150 |
+Priority: <i>High</i> |
|
| 151 |
+<br /> |
|
| 152 |
+Effort Level: <i>High</i> |
|
| 153 |
+<br /> |
|
| 154 |
+Skill Level: <i>High</i> |
|
| 155 |
+<br /> |
|
| 156 |
+Likely Mentors: <i>Mike</i> |
|
| 157 |
+<br /> |
|
| 158 |
+Applications as of 1 Apr 00:00 UTC: <i>5</i> |
|
| 159 |
+<br /> |
|
| 160 |
+The Tor exit node scanner 'SoaT', part of the <a |
|
| 161 |
+href="<svnsandbox>torflow/">Torflow project</a>, makes connections out |
|
| 162 |
+of each Tor exit node and compares the content it gets back with what it |
|
| 163 |
+"should" get back. The goal is to notice misconfigured, broken, and even |
|
| 164 |
+malicious exit relays. Alas, the code is |
|
| 165 |
+currently written in rather rickety perl and relies on MD5sums of |
|
| 166 |
+entire documents in order to determine if exit nodes are modifying |
|
| 167 |
+content. The problem with this is threefold: 1) Perl sucks at life. |
|
| 168 |
+2) The scanner can't verify pages that are dynamic, and attackers can |
|
| 169 |
+focus malicious content injection on only those dynamic pages. 3) |
|
| 170 |
+Pages change after a while (or based on GeoIP) and begin generating |
|
| 171 |
+false positives. |
|
| 172 |
+<br /> |
|
| 173 |
+Ideally, soat.pl would be reimplemented in a sane language with a |
|
| 174 |
+robust html parser library (since the rest of Torflow is in Python |
|
| 175 |
+that would be nice, but it is not required), and calculate signatures only for |
|
| 176 |
+tags and content likely to be targeted by a malicious attacker (script |
|
| 177 |
+tags, object links, images, css). It should also be robust in the face of |
|
| 178 |
+changes to content outside of Tor, and ultimately even GeoIP localized |
|
| 179 |
+content. |
|
| 180 |
+<br /> |
|
| 181 |
+This scanner would likely be run by the Directory Authorities and |
|
| 182 |
+report its results to the control port via the AuthDirBadExit config |
|
| 183 |
+setting. |
|
| 184 |
+<br /> |
|
| 185 |
+</li> |
|
| 186 |
+ |
|
| 187 |
+<li> |
|
| 188 |
+<b>Tor Node Scanner improvements</b> |
|
| 189 |
+<br /> |
|
| 190 |
+Priority: <i>High</i> |
|
| 191 |
+<br /> |
|
| 192 |
+Effort Level: <i>Medium to High</i> |
|
| 193 |
+<br /> |
|
| 194 |
+Skill Level: <i>Medium to High</i> |
|
| 195 |
+<br /> |
|
| 196 |
+Likely Mentors: <i>Mike</i> |
|
| 197 |
+<br /> |
|
| 198 |
+Applications as of 1 Apr 00:00 UTC: <i>1</i> |
|
| 199 |
+<br /> |
|
| 200 |
+Similar to the exit scanner (or perhaps even during exit scanning), |
|
| 201 |
+statistics can be gathered about the reliability of nodes. Nodes that |
|
| 202 |
+fail too high a percentage of their circuits should not be given |
|
| 203 |
+Guard status. Perhaps they should have their reported bandwidth |
|
| 204 |
+penalized by some ratio as well, or just get marked as Invalid. In |
|
| 205 |
+addition, nodes that exhibit a very low average stream capacity but |
|
| 206 |
+advertise a very high node bandwidth can also be marked as Invalid. |
|
| 207 |
+Much of this statistics gathering is already done, it just needs to be |
|
| 208 |
+transformed into something that can be reported to the Directory |
|
| 209 |
+Authorities to blacklist/penalize nodes in such a way that clients |
|
| 210 |
+will listen. |
|
| 211 |
+<br /> |
|
| 212 |
+In addition, these same statistics can be gathered about the traffic |
|
| 213 |
+through a node. Events can be added to the <a |
|
| 214 |
+href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Control |
|
| 215 |
+Protocol</a> to |
|
| 216 |
+report if a circuit extend attempt through the node succeeds or fails, and |
|
| 217 |
+passive statistics can be gathered on both bandwidth and reliability |
|
| 218 |
+of other nodes via a node-based monitor using these events. Such a |
|
| 219 |
+scanner would also report information on oddly-behaving nodes to |
|
| 220 |
+the Directory Authorities, but a communication channel for this |
|
| 221 |
+currently does not exist and would need to be developed as well. |
|
| 222 |
+</li> |
|
| 223 |
+ |
|
| 224 |
+<li> |
|
| 225 |
+<b>Help track the overall Tor Network status</b> |
|
| 226 |
+<br /> |
|
| 227 |
+Priority: <i>High</i> |
|
| 228 |
+<br /> |
|
| 229 |
+Effort Level: <i>Medium</i> |
|
| 230 |
+<br /> |
|
| 231 |
+Skill Level: <i>Medium</i> |
|
| 232 |
+<br /> |
|
| 233 |
+Likely Mentors: <i>Roger, Nick, Mike</i> |
|
| 234 |
+<br /> |
|
| 235 |
+It would be great to set up an automated system for tracking network |
|
| 236 |
+health over time, graphing it, etc. Part of this project would involve |
|
| 237 |
+inventing better metrics for assessing network health and growth. Is the |
|
| 238 |
+average uptime of the network increasing? How many relays are qualifying |
|
| 239 |
+for Guard status this month compared to last month? What's the turnover |
|
| 240 |
+in terms of new relays showing up and relays shutting off? Periodically |
|
| 241 |
+people collect brief snapshots, but where it gets really interesting is |
|
| 242 |
+when we start tracking data points over time. |
|
| 243 |
+<br /> |
|
| 244 |
+Data could be collected from the "Tor Node Scanner" item above, from |
|
| 245 |
+the server descriptors that each relay publishes, and from other |
|
| 246 |
+sources. Results over time could be integrated into one of the <a |
|
| 247 |
+href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be |
|
| 248 |
+kept separate. Speaking of the Tor Status pages, take a look at Roger's |
|
| 249 |
+<a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor |
|
| 250 |
+Status wish list</a>. |
|
| 251 |
+</li> |
|
| 252 |
+ |
|
| 253 |
+<li> |
|
| 254 |
+<b>Tor path selection improvements</b> |
|
| 255 |
+<br /> |
|
| 256 |
+Priority: <i>High</i> |
|
| 257 |
+<br /> |
|
| 258 |
+Effort Level: <i>Low to Medium</i> |
|
| 259 |
+<br /> |
|
| 260 |
+Skill Level: <i>High</i> |
|
| 261 |
+<br /> |
|
| 262 |
+Likely Mentors: <i>Roger, Nick, Mike</i> |
|
| 263 |
+<br /> |
|
| 264 |
+Applications as of 1 Apr 00:00 UTC: <i>3</i> |
|
| 265 |
+<br /> |
|
| 266 |
+Some simple improvements can be made to Tor's path selection to vastly |
|
| 267 |
+improve Tor speed. For instance, some of the (unofficial) <a |
|
| 268 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/FireFoxTorPerf">Tor |
|
| 269 |
+Performance Recommendations</a> on the wiki are to increase the number of |
|
| 270 |
+guards and decrease the CircuitBuildTimeout. Ideally, the client would |
|
| 271 |
+<a href="http://archives.seul.org/or/talk/Feb-2008/msg00012.html">learn |
|
| 272 |
+these values by gathering statistics on circuit construction |
|
| 273 |
+time</a> (and/or using values gained from Torflow), and set the timeouts |
|
| 274 |
+low enough such that some high percentile (75%, 90%, 1-stddev?) of |
|
| 275 |
+circuits succeed, yet extremely slow nodes are avoided. This would |
|
| 276 |
+involve some statistics gathering+basic research, and some changes to |
|
| 277 |
+Tor path selection code. |
|
| 278 |
+<br /> |
|
| 279 |
+In addition, to improve path security, some elements from the <a |
|
| 280 |
+href="http://www.torproject.org/svn/trunk/doc/spec/proposals/115-two-hop-paths.txt">Two |
|
| 281 |
+Hop Paths proposal</a> could be done as part of this (since it will |
|
| 282 |
+likely touch the same code anyways), regardless of the adoption of |
|
| 283 |
+that proposal. In particular, clients probably should avoid guards that |
|
| 284 |
+seem to fail an excessive percentage of their circuits through them, |
|
| 285 |
+and non-firewalled clients should issue a warning if they are only able |
|
| 286 |
+to connect to a limited set of guard nodes. See also |
|
| 287 |
+<a href="http://archives.seul.org/or/dev/Feb-2008/msg00003.html">this |
|
| 288 |
+or-dev post</a>. |
|
| 289 |
+</li> |
|
| 290 |
+ |
|
| 291 |
+<li> |
|
| 292 |
+<b>Translation Wiki</b> |
|
| 293 |
+<br /> |
|
| 294 |
+Priority: <i>High</i> |
|
| 295 |
+<br /> |
|
| 296 |
+Effort Level: <i>Medium</i> |
|
| 297 |
+<br /> |
|
| 298 |
+Skill Level: <i>Medium</i> |
|
| 299 |
+<br /> |
|
| 300 |
+Likely Mentors: <i>Jacob</i> |
|
| 301 |
+<br /> |
|
| 302 |
+We need a way to edit and translate sections of the website. Currently |
|
| 303 |
+the website is made up of a bunch of <a href="<svnwebsite>en/">wml |
|
| 304 |
+files</a>, and <a href="<page translation>">translators</a> fetch these |
|
| 305 |
+wml files, translate them in an editor, and either send us the translation |
|
| 306 |
+or use svn to commit them back. The current "cost" of publication of |
|
| 307 |
+website changes is quite high even for English language users. For a |
|
| 308 |
+single word change or any type of |
|
| 309 |
+minor change, the page may never be corrected or translated. It would |
|
| 310 |
+be nice to have a wiki that was specifically geared towards translation |
|
| 311 |
+and would somehow track the upstream (English) versions to indicate when |
|
| 312 |
+a fresh translation is needed, like our current |
|
| 313 |
+<a href="<page translation-status>">translation status page</a>. This |
|
| 314 |
+seems mostly like a job for a wiki |
|
| 315 |
+integrator or wiki software author. Certainly the person would need to |
|
| 316 |
+be interested in human languages and translation. They should at least |
|
| 317 |
+be minimally familiar with what Tor is; but they would not have to interact |
|
| 318 |
+with the software, only the documentation and the website. |
|
| 319 |
+</li> |
|
| 320 |
+ |
|
| 321 |
+<li> |
|
| 322 |
+<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b> |
|
| 323 |
+<br /> |
|
| 324 |
+Priority: <i>High</i> |
|
| 325 |
+<br /> |
|
| 326 |
+Effort Level: <i>Medium</i> |
|
| 327 |
+<br /> |
|
| 328 |
+Skill Level: <i>Medium</i> |
|
| 329 |
+<br /> |
|
| 330 |
+Likely Mentors: <i>Peter, Matt</i> |
|
| 331 |
+<br /> |
|
| 332 |
+Applications as of 1 Apr 00:00 UTC: <i>1</i> |
|
| 333 |
+<br /> |
|
| 334 |
+Vidalia currently doesn't play nicely on Debian and Ubuntu with the |
|
| 335 |
+default Tor packages. The current Tor packages automatically start Tor |
|
| 336 |
+as a daemon running as the debian-tor user and (sensibly) do not have a |
|
| 337 |
+<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined |
|
| 338 |
+in the default torrc. Consequently, Vidalia will try |
|
| 339 |
+to start its own Tor process since it could not connect to the existing |
|
| 340 |
+Tor, and Vidalia's Tor process will then exit with an error message |
|
| 341 |
+the user likely doesn't understand since Tor cannot bind its listening |
|
| 342 |
+ports — they're already in use by the original Tor daemon. |
|
| 343 |
+<br /> |
|
| 344 |
+The current solution involves either telling the user to stop the |
|
| 345 |
+existing Tor daemon and let Vidalia start its own Tor process, or |
|
| 346 |
+explaining to the user how to set a control port and password in their |
|
| 347 |
+torrc. A better solution on Debian would be to use Tor's ControlSocket, |
|
| 348 |
+which allows Vidalia to talk to Tor via a Unix domain socket, and could |
|
| 349 |
+possibly be enabled by default in Tor's Debian packages. Vidalia can |
|
| 350 |
+then authenticate to Tor using filesystem-based (cookie) authentication |
|
| 351 |
+if the user running Vidalia is also in the debian-tor group. |
|
| 352 |
+<br /> |
|
| 353 |
+This project will first involve adding support for Tor's ControlSocket |
|
| 354 |
+to Vidalia. The student will then develop and test Debian and Ubuntu |
|
| 355 |
+packages for Vidalia that conform to Debian's packaging standards and |
|
| 356 |
+make sure they work well with the existing Tor packages. We can also |
|
| 357 |
+set up an apt repository to host the new Vidalia packages. |
|
| 358 |
+<br /> |
|
| 359 |
+The next challenge would be to find an intuitive usable way for Vidalia |
|
| 360 |
+to be able to change Tor's configuration (torrc) even though it is |
|
| 361 |
+located in <code>/etc/tor/torrc</code> and thus immutable. The best |
|
| 362 |
+idea we've come up with so far is to feed Tor a new configuration via |
|
| 363 |
+the ControlSocket when Vidalia starts, but that's bad because Tor starts |
|
| 364 |
+each boot with a different configuration than the user wants. The second |
|
| 365 |
+best idea |
|
| 366 |
+we've come up with is for Vidalia to write out a temporary torrc file |
|
| 367 |
+and ask the user to manually move it to <code>/etc/tor/torrc</code>, |
|
| 368 |
+but that's bad because users shouldn't have to mess with files directly. |
|
| 369 |
+<br /> |
|
| 370 |
+A student undertaking this project should have prior knowledge of |
|
| 371 |
+Debian package management and some C++ development experience. Previous |
|
| 372 |
+experience with Qt is helpful, but not required. |
|
| 373 |
+</li> |
|
| 374 |
+ |
|
| 375 |
+<li> |
|
| 376 |
+<b>Improving Tor's ability to resist censorship</b> |
|
| 377 |
+<br /> |
|
| 378 |
+Priority: <i>High</i> |
|
| 379 |
+<br /> |
|
| 380 |
+Effort Level: <i>High</i> |
|
| 381 |
+<br /> |
|
| 382 |
+Skill Level: <i>High</i> |
|
| 383 |
+<br /> |
|
| 384 |
+Likely Mentors: <i>Nick</i> |
|
| 385 |
+<br /> |
|
| 386 |
+The Tor 0.2.0.x series makes <a |
|
| 387 |
+href="<svnsandbox>doc/design-paper/blocking.html">significant |
|
| 388 |
+improvements</a> in resisting national and organizational censorship. |
|
| 389 |
+But Tor still needs better mechanisms for some parts of its |
|
| 390 |
+anti-censorship design. For example, current Tors can only listen on a |
|
| 391 |
+single address/port combination at a time. There's |
|
| 392 |
+<a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a |
|
| 393 |
+proposal to address this limitation</a> and allow clients to connect |
|
| 394 |
+to any given Tor on multiple addresses and ports, but it needs more |
|
| 395 |
+work. Another anti-censorship project (far more difficult) is to try |
|
| 396 |
+to make Tor more scanning-resistant. Right now, an adversary can identify |
|
| 397 |
+<a href="<svnsandbox>doc/spec/proposals/125-bridges.txt">Tor bridges</a> |
|
| 398 |
+just by trying to connect to them, following the Tor protocol, and |
|
| 399 |
+seeing if they respond. To solve this, bridges could |
|
| 400 |
+<a href="<svnsandbox>doc/design-paper/blocking.html#tth_sEc9.3">act like |
|
| 401 |
+webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools, |
|
| 402 |
+and not act like bridges until the user provides a bridge-specific key. |
|
| 403 |
+<br /> |
|
| 404 |
+This project involves a lot of research and design. One of the big |
|
| 405 |
+challenges will be identifying and crafting approaches that can still |
|
| 406 |
+resist an adversary even after the adversary knows the design, and |
|
| 407 |
+then trading off censorship resistance with usability and robustness. |
|
| 408 |
+</li> |
|
| 409 |
+ |
|
| 410 |
+<li> |
|
| 411 |
+<b>Tor/Polipo/Vidalia Auto-Update Framework</b> |
|
| 412 |
+<br /> |
|
| 413 |
+Priority: <i>Medium</i> |
|
| 414 |
+<br /> |
|
| 415 |
+Effort Level: <i>High</i> |
|
| 416 |
+<br /> |
|
| 417 |
+Skill Level: <i>High</i> |
|
| 418 |
+<br /> |
|
| 419 |
+Likely Mentors: <i>Matt, Jacob</i> |
|
| 420 |
+<br /> |
|
| 421 |
+We're in need of a good authenticated-update framework. |
|
| 422 |
+Vidalia already has the ability to notice when the user is running an |
|
| 423 |
+outdated or unrecommended version of Tor, using signed statements inside |
|
| 424 |
+the Tor directory information. Currently, Vidalia simply pops |
|
| 425 |
+up a little message box that lets the user know they should manually |
|
| 426 |
+upgrade. The goal of this project would be to extend Vidalia with the |
|
| 427 |
+ability to also fetch and install the updated Tor software for the |
|
| 428 |
+user. We should do the fetches via Tor when possible, but also fall back |
|
| 429 |
+to direct fetches in a smart way. Time permitting, we would also like |
|
| 430 |
+to be able to update other |
|
| 431 |
+applications included in the bundled installers, such as Polipo and |
|
| 432 |
+Vidalia itself. |
|
| 433 |
+<br /> |
|
| 434 |
+To complete this project, the student will first need to first investigate |
|
| 435 |
+the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate |
|
| 436 |
+their strengths, weaknesses, security properties, and ability to be |
|
| 437 |
+integrated into Vidalia. If none are found to be suitable, the student |
|
| 438 |
+will design their own auto-update framework, document the design, and |
|
| 439 |
+then discuss the design with other developers to assess any security |
|
| 440 |
+issues. The student will then implement their framework (or integrate |
|
| 441 |
+an existing one) and test it. |
|
| 442 |
+<br /> |
|
| 443 |
+A student undertaking this project should have good C++ development |
|
| 444 |
+experience. Previous experience with Qt is helpful, but not required. The |
|
| 445 |
+student should also have a good understanding of common security |
|
| 446 |
+practices, such as package signature verification. Good writing ability |
|
| 447 |
+is also important for this project, since a vital step of the project |
|
| 448 |
+will be producing a design document for others to review and discuss |
|
| 449 |
+with the student prior to implementation. |
|
| 450 |
+</li> |
|
| 451 |
+ |
|
| 452 |
+<li> |
|
| 453 |
+<b>An Improved and More Usable Network Map in Vidalia</b> |
|
| 454 |
+<br /> |
|
| 455 |
+Priority: <i>Medium</i> |
|
| 456 |
+<br /> |
|
| 457 |
+Effort Level: <i>Medium</i> |
|
| 458 |
+<br /> |
|
| 459 |
+Skill Level: <i>Medium to High</i> |
|
| 460 |
+<br /> |
|
| 461 |
+Likely Mentors: <i>Matt</i> |
|
| 462 |
+<br /> |
|
| 463 |
+One of Vidalia's existing features is a network map that shows the user |
|
| 464 |
+the approximate geographic location of relays in the Tor network and |
|
| 465 |
+plots the paths the user's traffic takes as it is tunneled through the |
|
| 466 |
+Tor network. The map is currently not very interactive and has rather |
|
| 467 |
+poor graphics. Instead, we would like to leverage KDE's Marble widget |
|
| 468 |
+that gives us a better quality map and enables improved interactivity, |
|
| 469 |
+such as allowing the user to click on individual relays or circuits to |
|
| 470 |
+display additional information. We might also consider adding the ability |
|
| 471 |
+for users to click on a particular relay or a country containing one or |
|
| 472 |
+more Tor exit relays and say, "I want my connections to foo.com to exit |
|
| 473 |
+from here." |
|
| 474 |
+<br /> |
|
| 475 |
+This project will first involve the student getting familiar with Vidalia |
|
| 476 |
+and the Marble widget's API. The student will then integrate the widget |
|
| 477 |
+into Vidalia and customize Marble to be better suited for our application, |
|
| 478 |
+such as making circuits clickable, storing cached map data in Vidalia's |
|
| 479 |
+own data directory, and customizing some of the widget's dialogs. |
|
| 480 |
+<br /> |
|
| 481 |
+A student undertaking this project should have good C++ development |
|
| 482 |
+experience. Previous experience with Qt and CMake is helpful, but not |
|
| 483 |
+required. |
|
| 484 |
+</li> |
|
| 485 |
+ |
|
| 486 |
+<li> |
|
| 487 |
+<b>Tor Controller Status Event Interface</b> |
|
| 488 |
+<br /> |
|
| 489 |
+Priority: <i>Medium</i> |
|
| 490 |
+<br /> |
|
| 491 |
+Effort Level: <i>Medium</i> |
|
| 492 |
+<br /> |
|
| 493 |
+Skill Level: <i>Medium</i> |
|
| 494 |
+<br /> |
|
| 495 |
+Likely Mentors: <i>Matt, Roger</i> |
|
| 496 |
+<br /> |
|
| 497 |
+There are a number of status changes inside Tor of which the user may need |
|
| 498 |
+to be informed. For example, if the user is trying to set up his Tor as a |
|
| 499 |
+relay and Tor decides that its ports are not reachable from outside |
|
| 500 |
+the user's network, we should alert the user. Currently, all the user |
|
| 501 |
+gets is a couple log messages in Vidalia's 'message log' window, which they |
|
| 502 |
+likely never see since they don't receive a notification that something |
|
| 503 |
+has gone wrong. Even if the user does actually look at the message log, |
|
| 504 |
+most of the messages make little sense to the novice user. |
|
| 505 |
+<br /> |
|
| 506 |
+Tor has the ability to inform Vidalia of many such status changes, and |
|
| 507 |
+we recently implemented support for a couple of these events. Still, |
|
| 508 |
+there are many more status events the user should be informed of and we |
|
| 509 |
+need a better UI for actually displaying them to the user. |
|
| 510 |
+<br /> |
|
| 511 |
+The goal of this project then is to design and implement a UI for |
|
| 512 |
+displaying Tor status events to the user. For example, we might put a |
|
| 513 |
+little badge on Vidalia's tray icon that alerts the user to new status |
|
| 514 |
+events they should look at. Double-clicking the icon could bring up a |
|
| 515 |
+dialog that summarizes recent status events in simple terms and maybe |
|
| 516 |
+suggests a remedy for any negative events if they can be corrected by |
|
| 517 |
+the user. Of course, this is just an example and the student is free to |
|
| 518 |
+suggest another approach. |
|
| 519 |
+<br /> |
|
| 520 |
+A student undertaking this project should have good UI design and layout |
|
| 521 |
+and some C++ development experience. Previous experience with Qt and |
|
| 522 |
+Qt's Designer will be very helpful, but are not required. Some |
|
| 523 |
+English writing ability will also be useful, since this project will |
|
| 524 |
+likely involve writing small amounts of help documentation that should |
|
| 525 |
+be understandable by non-technical users. Bonus points for some graphic |
|
| 526 |
+design/Photoshop fu, since we might want/need some shiny new icons too. |
|
| 527 |
+</li> |
|
| 528 |
+ |
|
| 529 |
+<li> |
|
| 530 |
+<b>Improvements on our active browser configuration tester</b> - |
|
| 531 |
+<a href="https://check.torproject.org/">https://check.torproject.org/</a> |
|
| 532 |
+<br /> |
|
| 533 |
+Priority: <i>Medium</i> |
|
| 534 |
+<br /> |
|
| 535 |
+Effort Level: <i>Low</i> |
|
| 536 |
+<br /> |
|
| 537 |
+Skill Level: <i>Low to Medium</i> |
|
| 538 |
+<br /> |
|
| 539 |
+Likely Mentors: <i>Jacob, Steven</i> |
|
| 540 |
+<br /> |
|
| 541 |
+Applications as of 1 Apr 00:00 UTC: <i>1</i> |
|
| 542 |
+<br /> |
|
| 543 |
+We currently have a functional web page to detect if Tor is working. It |
|
| 544 |
+has a few places where it falls short. It requires improvements with |
|
| 545 |
+regard to default languages and functionality. It currently only responds |
|
| 546 |
+in English. In addition, it is a hack of a perl script that should have |
|
| 547 |
+never seen the light of day. It should probably be rewritten in python |
|
| 548 |
+with multi-lingual support in mind. It currently uses the <a |
|
| 549 |
+href="http://exitlist.torproject.org/">Tor DNS exit list</a> |
|
| 550 |
+and should continue to do so in the future. It currently result in certain |
|
| 551 |
+false positives and these should be discovered, documented, and fixed |
|
| 552 |
+where possible. Anyone working on this project should be interested in |
|
| 553 |
+DNS, basic perl or preferably python programming skills, and will have |
|
| 554 |
+to interact minimally with Tor to test their code. |
|
| 555 |
+<br /> |
|
| 556 |
+If you want to make the project more exciting |
|
| 557 |
+and involve more design and coding, take a look at <a |
|
| 558 |
+href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal |
|
| 559 |
+131-verify-tor-usage.txt</a>. |
|
| 560 |
+</li> |
|
| 561 |
+ |
|
| 562 |
+<li> |
|
| 563 |
+<b>Improvements on our DNS Exit List service</b> - |
|
| 564 |
+<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a> |
|
| 565 |
+<br /> |
|
| 566 |
+Priority: <i>Medium</i> |
|
| 567 |
+<br /> |
|
| 568 |
+Effort Level: <i>Low</i> |
|
| 569 |
+<br /> |
|
| 570 |
+Skill Level: <i>Low</i> |
|
| 571 |
+<br /> |
|
| 572 |
+Likely Mentors: <i>Jacob, Tup</i> |
|
| 573 |
+<br /> |
|
| 574 |
+The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a> |
|
| 575 |
+is written by our fabulous anonymous |
|
| 576 |
+contributer Tup. It's a DNS server written in Haskell that supports part of our <a |
|
| 577 |
+href="https://www.torproject.org/svn/trunk/doc/contrib/torel-design.txt">exitlist |
|
| 578 |
+design document</a>. Currently, it is functional and it is used by |
|
| 579 |
+check.torproject.org and other users. The issues that are outstanding |
|
| 580 |
+are mostly aesthetic. This wonderful service could use a much better |
|
| 581 |
+website using the common Tor theme. It would be best served with better |
|
| 582 |
+documentation for common services that use an RBL. It could use more |
|
| 583 |
+publicity. A person working on this project should be interested in DNS, |
|
| 584 |
+basic RBL configuration for popular services, and writing documentation. |
|
| 585 |
+The person would require minimal Tor interaction — testing their |
|
| 586 |
+own documentation at the very least. Furthermore, it would be useful |
|
| 587 |
+if they were interested in Haskell and wanted to implement more of the |
|
| 588 |
+torel-design.txt suggestions. |
|
| 589 |
+</li> |
|
| 590 |
+ |
|
| 591 |
+<li> |
|
| 592 |
+<b>Testing integration of Tor with web browsers for our end users</b> |
|
| 593 |
+<br /> |
|
| 594 |
+Priority: <i>Medium</i> |
|
| 595 |
+<br /> |
|
| 596 |
+Effort Level: <i>Medium</i> |
|
| 597 |
+<br /> |
|
| 598 |
+Skill Level: <i>Medium</i> |
|
| 599 |
+<br /> |
|
| 600 |
+Likely Mentors: <i>Jacob, Mike, Greg</i> |
|
| 601 |
+<br /> |
|
| 602 |
+Applications as of 1 Apr 00:00 UTC: <i>1</i> |
|
| 603 |
+<br /> |
|
| 604 |
+The Tor project currently lacks a solid test suite to ensure that a |
|
| 605 |
+user has a properly and safely configured web browser. It should test for as |
|
| 606 |
+many known issues as possible. It should attempt to decloak the |
|
| 607 |
+user in any way possible. Two current webpages that track these |
|
| 608 |
+kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a |
|
| 609 |
+href="http://pseudo-flaw.net/tor/torbutton/">list of issues along |
|
| 610 |
+with their proof of concept code, bug issues, etc</a>. HD Moore runs |
|
| 611 |
+the <a href="http://metasploit.com/research/projects/decloak/">metasploit |
|
| 612 |
+decloak website</a>. A student interested in defending Tor could start |
|
| 613 |
+by collecting as many workable and known methods for decloaking a |
|
| 614 |
+Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may |
|
| 615 |
+be helpful as a start.) The student should be familiar with the common |
|
| 616 |
+pitfalls but |
|
| 617 |
+possibly have new methods in mind for implementing decloaking issues. The |
|
| 618 |
+website should ensure that it tells a user what their problem is. It |
|
| 619 |
+should help them to fix the problem or direct them to the proper support |
|
| 620 |
+channels. The student should be closely familiar with using Tor and how |
|
| 621 |
+to prevent Tor information leakage. |
|
| 622 |
+</li> |
|
| 623 |
+ |
|
| 624 |
+<li> |
|
| 625 |
+<b>Libevent and Tor integration improvements</b> |
|
| 626 |
+<br /> |
|
| 627 |
+Priority: <i>Medium</i> |
|
| 628 |
+<br /> |
|
| 629 |
+Effort Level: <i>High</i> |
|
| 630 |
+<br /> |
|
| 631 |
+Skill Level: <i>Medium to High</i> |
|
| 632 |
+<br /> |
|
| 633 |
+Likely Mentors: <i>Nick</i> |
|
| 634 |
+<br /> |
|
| 635 |
+Tor should make better use of the more recent features of Niels |
|
| 636 |
+Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a> |
|
| 637 |
+library. Tor already uses Libevent for its low-level asynchronous IO |
|
| 638 |
+calls, and could also use Libevent's increasingly good implementations |
|
| 639 |
+of network buffers and of HTTP. This wouldn't be simply a matter of |
|
| 640 |
+replacing Tor's internal calls with calls to Libevent: instead, we'll |
|
| 641 |
+need to refactor Tor to use Libevent calls that do not follow the |
|
| 642 |
+same models as Tor's existing backends. Also, we'll need to add |
|
| 643 |
+missing functionality to Libevent as needed — most difficult likely |
|
| 644 |
+will be adding OpenSSL support on top of Libevent's buffer abstraction. |
|
| 645 |
+Also tricky will be adding rate-limiting to Libevent. |
|
| 646 |
+</li> |
|
| 647 |
+ |
|
| 648 |
+<li> |
|
| 649 |
+<b>Tuneup Tor!</b> |
|
| 650 |
+<br /> |
|
| 651 |
+Priority: <i>Medium</i> |
|
| 652 |
+<br /> |
|
| 653 |
+Effort Level: <i>Medium</i> |
|
| 654 |
+<br /> |
|
| 655 |
+Skill Level: <i>Medium to High</i> |
|
| 656 |
+<br /> |
|
| 657 |
+Likely Mentors: <i>Nick, Roger, Mike</i> |
|
| 658 |
+<br /> |
|
| 659 |
+Right now, Tor relays measure and report their own bandwidth, and Tor |
|
| 660 |
+clients choose which relays to use in part based on that bandwidth. |
|
| 661 |
+This approach is vulnerable to |
|
| 662 |
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where |
|
| 663 |
+relays lie about their bandwidth</a>; |
|
| 664 |
+to address this, Tor currently caps the maximum bandwidth |
|
| 665 |
+it's willing to believe any relay provides. This is a limited fix, and |
|
| 666 |
+a waste of bandwidth capacity to boot. Instead, |
|
| 667 |
+Tor should possibly measure bandwidth in a more distributed way, perhaps |
|
| 668 |
+as described in the |
|
| 669 |
+<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for |
|
| 670 |
+Tor"</a> paper |
|
| 671 |
+by Snader and Borisov. A student could use current testing code to |
|
| 672 |
+double-check this paper's findings and verify the extent to which they |
|
| 673 |
+dovetail with Tor as deployed in the wild, and determine good ways to |
|
| 674 |
+incorporate them into their suggestions Tor network without adding too |
|
| 675 |
+much communications overhead between relays and directory |
|
| 676 |
+authorities. |
|
| 677 |
+</li> |
|
| 678 |
+ |
|
| 679 |
+<!-- |
|
| 680 |
+<li> |
|
| 681 |
+<b>Improving the Tor QA process: Continuous Integration for Windows builds</b> |
|
| 682 |
+<br /> |
|
| 683 |
+Priority: <i>High</i> |
|
| 684 |
+<br /> |
|
| 685 |
+Effort Level: <i>Medium</i> |
|
| 686 |
+<br /> |
|
| 687 |
+Skill Level: <i>Medium</i> |
|
| 688 |
+<br /> |
|
| 689 |
+Likely Mentors: <i>Jacob, Andrew</i> |
|
| 690 |
+<br /> |
|
| 691 |
+It would be useful to have automated build processes for Windows and |
|
| 692 |
+probably other platforms. The purpose of having a continuous integration |
|
| 693 |
+build environment is to ensure that Windows isn't left behind for any of |
|
| 694 |
+the software projects used in the Tor project or its accompanying.<br /> |
|
| 695 |
+Buildbot may be a good choice for this as it appears to support all of |
|
| 696 |
+the platforms Tor does. See the |
|
| 697 |
+<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for |
|
| 698 |
+buildbot</a>.<br /> |
|
| 699 |
+There may be better options and the person undertaking this task should |
|
| 700 |
+evaluate other options. Any person working on this automatic build |
|
| 701 |
+process should have experience or be willing to learn how to build all |
|
| 702 |
+of the respective Tor related code bases from scratch. Furthermore, the |
|
| 703 |
+person should have some experience building software in Windows |
|
| 704 |
+environments as this is the target audience we want to ensure we do not |
|
| 705 |
+leave behind. It would require close work with the Tor source code but |
|
| 706 |
+probably only in the form of building, not authoring.<br /> |
|
| 707 |
+Additionally, we need to automate our performance testing for all platforms. |
|
| 708 |
+We've got buildbot (except on Windows — as noted above) to automate |
|
| 709 |
+our regular integration and compile testing already, |
|
| 710 |
+but we need to get our network simulation tests (as built in torflow) |
|
| 711 |
+updated for more recent versions of Tor, and designed to launch a test |
|
| 712 |
+network either on a single machine, or across several, so we can test |
|
| 713 |
+changes in performance on machines in different roles automatically. |
|
| 714 |
+</li> |
|
| 715 |
+--> |
|
| 716 |
+ |
|
| 717 |
+<li> |
|
| 718 |
+<b>Improve our unit testing process</b> |
|
| 719 |
+<br /> |
|
| 720 |
+Priority: <i>Medium</i> |
|
| 721 |
+<br /> |
|
| 722 |
+Effort Level: <i>Medium</i> |
|
| 723 |
+<br /> |
|
| 724 |
+Skill Level: <i>Medium</i> |
|
| 725 |
+<br /> |
|
| 726 |
+Likely Mentors: <i>Nick</i> |
|
| 727 |
+<br /> |
|
| 728 |
+Tor needs to be far more tested. This is a multi-part effort. To start |
|
| 729 |
+with, our unit test coverage should rise substantially, especially in |
|
| 730 |
+the areas outside the utility functions. This will require significant |
|
| 731 |
+refactoring of some parts of Tor, in order to dissociate as much logic |
|
| 732 |
+as possible from globals. |
|
| 733 |
+<br /> |
|
| 734 |
+Additionally, we need to automate our performance testing. We've got |
|
| 735 |
+buildbot to automate our regular integration and compile testing already |
|
| 736 |
+(though we need somebody to set it up on Windows), |
|
| 737 |
+but we need to get our network simulation tests (as built in TorFlow: see |
|
| 738 |
+the "Tor Node Scanner improvements" item) |
|
| 739 |
+updated for more recent versions of Tor, and designed to launch a test |
|
| 740 |
+network either on a single machine, or across several, so we can test |
|
| 741 |
+changes in performance on machines in different roles automatically. |
|
| 742 |
+</li> |
|
| 743 |
+ |
|
| 744 |
+<li> |
|
| 745 |
+<b>Help revive an independent Tor client implementation</b> |
|
| 746 |
+<br /> |
|
| 747 |
+Priority: <i>Medium</i> |
|
| 748 |
+<br /> |
|
| 749 |
+Effort Level: <i>High</i> |
|
| 750 |
+<br /> |
|
| 751 |
+Skill Level: <i>Medium to High</i> |
|
| 752 |
+<br /> |
|
| 753 |
+Likely Mentors: <i>Karsten, Nick</i> |
|
| 754 |
+<br /> |
|
| 755 |
+Applications as of 1 Apr 00::00 UTC: <i>4</i> |
|
| 756 |
+<br /> |
|
| 757 |
+Reanimate one of the approaches to implement a Tor client in Java, |
|
| 758 |
+e.g. the <a href="http://onioncoffee.sourceforge.net/">OnionCoffee |
|
| 759 |
+project</a>, and make it run on <a |
|
| 760 |
+href="http://code.google.com/android/">Android</a>. The first step |
|
| 761 |
+would be to port the existing code and execute it in an Android |
|
| 762 |
+environment. Next, the code should be updated to support the newer Tor |
|
| 763 |
+protocol versions like the <a href="<svnsandbox>doc/spec/dir-spec.txt">v3 |
|
| 764 |
+directory protocol</a>. Further, support for requesting or even |
|
| 765 |
+providing Tor hidden services would be neat, but not required. |
|
| 766 |
+<br /> |
|
| 767 |
+The student should be able to understand and write new Java code, including |
|
| 768 |
+a Java cryptography API. Being able to read C code would be helpful, |
|
| 769 |
+too. The student should be willing to read the existing documentation, |
|
| 770 |
+implement code based on it, and refine the documentation |
|
| 771 |
+when things are underdocumented. This project is mostly about coding and |
|
| 772 |
+to a small degree about design. |
|
| 773 |
+</li> |
|
| 774 |
+ |
|
| 775 |
+<li> |
|
| 776 |
+<b>Automatic system tests and automatically starting private Tor networks</b> |
|
| 777 |
+<br /> |
|
| 778 |
+Priority: <i>Medium</i> |
|
| 779 |
+<br /> |
|
| 780 |
+Effort Level: <i>Medium</i> |
|
| 781 |
+<br /> |
|
| 782 |
+Skill Level: <i>Medium</i> |
|
| 783 |
+<br /> |
|
| 784 |
+Likely Mentors: <i>Karsten, Nick, Roger</i> |
|
| 785 |
+<br /> |
|
| 786 |
+Applications as of 1 Apr 00:00 UTC: <i>2</i> |
|
| 787 |
+<br /> |
|
| 788 |
+Write a tool that runs automatic system tests in addition |
|
| 789 |
+to the existing unit tests. The Java-based Tor simulator <a |
|
| 790 |
+href="https://tor-svn.freehaven.net/svn/puppetor/trunk/">PuppeTor</a> |
|
| 791 |
+might be a good start for starting up a private Tor network, using it |
|
| 792 |
+for a while, and verifying that at least parts of it are working. This |
|
| 793 |
+project requires to conceive a blueprint for performing system tests |
|
| 794 |
+of private Tor networks, before starting to code. Typical types of |
|
| 795 |
+tests range from performing single requests over the private network to |
|
| 796 |
+manipulating exchanged messages and see if nodes handle corrupt messages |
|
| 797 |
+appropriately. |
|
| 798 |
+<br /> |
|
| 799 |
+The student should be able to obtain a good understanding |
|
| 800 |
+of how Tor works and what problems and bugs could arise to design good |
|
| 801 |
+test cases. Understanding the existing Tor code structure and documentation is |
|
| 802 |
+vital. If PuppeTor is used, the student should also be able to understand |
|
| 803 |
+and possibly extend an existing Java application. This project is partly |
|
| 804 |
+about design and partly about coding. |
|
| 805 |
+</li> |
|
| 806 |
+ |
|
| 807 |
+<li> |
|
| 808 |
+<b>Bring moniTor to life</b> |
|
| 809 |
+<br /> |
|
| 810 |
+Priority: <i>Medium</i> |
|
| 811 |
+<br /> |
|
| 812 |
+Effort Level: <i>Medium</i> |
|
| 813 |
+<br /> |
|
| 814 |
+Skill Level: <i>Low to Medium</i> |
|
| 815 |
+<br /> |
|
| 816 |
+Likely Mentors: <i>Karsten, Jacob</i> |
|
| 817 |
+<br /> |
|
| 818 |
+Applications as of 1 Apr 00::00 UTC: <i>2</i> |
|
| 819 |
+<br /> |
|
| 820 |
+Implement a <a href="http://www.ss64.com/bash/top.html">top-like</a> |
|
| 821 |
+management tool for Tor relays. The purpose of such a tool would be |
|
| 822 |
+to monitor a local Tor relay via its control port and include useful |
|
| 823 |
+system information of the underlying machine. When running this tool, it |
|
| 824 |
+would dynamically update its content like top does for Linux processes. |
|
| 825 |
+<a href="http://archives.seul.org/or/dev/Jan-2008/msg00005.html">This |
|
| 826 |
+or-dev post</a> might be a good first read. |
|
| 827 |
+<br /> |
|
| 828 |
+The student should be familiar |
|
| 829 |
+with or willing to learn about administering a Tor relay and configuring |
|
| 830 |
+it via its control port. As an initial prototype is written in Python, |
|
| 831 |
+some knowledge about writing Python code would be helpful, too. This |
|
| 832 |
+project is one part about identifying requirements to such a |
|
| 833 |
+tool and designing its interface, and one part lots of coding. |
|
| 834 |
+</li> |
|
| 835 |
+ |
|
| 836 |
+<li> |
|
| 837 |
+<b>Torbutton improvements</b> |
|
| 838 |
+<br /> |
|
| 839 |
+Priority: <i>Medium</i> |
|
| 840 |
+<br /> |
|
| 841 |
+Effort Level: <i>High</i> |
|
| 842 |
+<br /> |
|
| 843 |
+Skill Level: <i>High</i> |
|
| 844 |
+<br /> |
|
| 845 |
+Likely Mentors: <i>Mike</i> |
|
| 846 |
+<br/> |
|
| 847 |
+Torbutton has a number of improvements that can be made in the post-1.2 |
|
| 848 |
+timeframe. Most of these are documented as feature requests in the <a |
|
| 849 |
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">Torbutton |
|
| 850 |
+flyspray section</a>. Good examples include: stripping off node.exit on http |
|
| 851 |
+headers, more fine-grained control over formfill blocking, improved referrer |
|
| 852 |
+spoofing based on the domain of the site (a-la <a |
|
| 853 |
+href="https://addons.mozilla.org/en-US/firefox/addon/953">refcontrol extension</a>), |
|
| 854 |
+tighter integration with Vidalia for reporting Tor status, a New Identity |
|
| 855 |
+button with Tor integration and multiple identity management, and anything |
|
| 856 |
+else you might think of. |
|
| 857 |
+<br /> |
|
| 858 |
+This work would be independent coding in Javascript and the fun world of <a |
|
| 859 |
+href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>, |
|
| 860 |
+with not too much involvement in the Tor internals. |
|
| 861 |
+</li> |
|
| 862 |
+ |
|
| 863 |
+<li> |
|
| 864 |
+<b>Porting Polipo to Windows</b> |
|
| 865 |
+<br /> |
|
| 866 |
+Priority: <i>Medium</i> |
|
| 867 |
+<br /> |
|
| 868 |
+Effort Level: <i>Medium</i> |
|
| 869 |
+<br /> |
|
| 870 |
+Skill Level: <i>Medium to High</i> |
|
| 871 |
+<br /> |
|
| 872 |
+Likely Mentors: <i>Andrew, Steven, Roger</i> |
|
| 873 |
+<br /> |
|
| 874 |
+Help port <a |
|
| 875 |
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to |
|
| 876 |
+Windows. Example topics to tackle include: |
|
| 877 |
+1) handle spaces in path names and understand the filesystem |
|
| 878 |
+namespace — that is, where application data, personal data, |
|
| 879 |
+and program data typically reside in various versions of Windows. 2) the |
|
| 880 |
+ability to handle ipv6 communications. 3) the ability to asynchronously |
|
| 881 |
+query name servers, find the system nameservers, and manage netbios |
|
| 882 |
+and dns queries. 4) use native regex capabilities of Windows, rather |
|
| 883 |
+than using 3rd party GNU regex libraries. 5) manage events and buffers |
|
| 884 |
+natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in |
|
| 885 |
+Windows it's whatever the config specifies). 6) some sort of GUI config |
|
| 886 |
+and reporting tool, bonus if it has a systray icon with right clickable |
|
| 887 |
+menu options. Double bonus if it's cross-platform compatible. |
|
| 888 |
+</li> |
|
| 889 |
+ |
|
| 890 |
+<li> |
|
| 891 |
+<b>Make our diagrams beautiful and automated</b> |
|
| 892 |
+<br /> |
|
| 893 |
+Priority: <i>Medium</i> |
|
| 894 |
+<br /> |
|
| 895 |
+Effort Level: <i>Low</i> |
|
| 896 |
+<br /> |
|
| 897 |
+Skill Level: <i>Low</i> |
|
| 898 |
+<br /> |
|
| 899 |
+Likely Mentors: <i>Andrew</i> |
|
| 900 |
+<br /> |
|
| 901 |
+We need a way to generate the website diagrams (for example, the "How |
|
| 902 |
+Tor Works" pictures on the <a href="<page overview>">overview page</a> |
|
| 903 |
+from source, so we can translate them as UTF-8 text rather than edit |
|
| 904 |
+them by hand with Gimp. We might want to |
|
| 905 |
+integrate this as an wml file so translations are easy and images are |
|
| 906 |
+generated in multiple languages whenever we build the website. See the |
|
| 907 |
+"Translation Wiki" idea above. |
|
| 908 |
+</li> |
|
| 909 |
+ |
|
| 910 |
+<li> |
|
| 911 |
+<b>Improve the LiveCD offerings for the Tor community</b> |
|
| 912 |
+<br /> |
|
| 913 |
+Priority: <i>Low</i> |
|
| 914 |
+<br /> |
|
| 915 |
+Effort Level: <i>Low</i> |
|
| 916 |
+<br /> |
|
| 917 |
+Skill Level: <i>Medium to High</i> |
|
| 918 |
+<br /> |
|
| 919 |
+Likely Mentors: <i>Anonym, Jacob, Roger</i> |
|
| 920 |
+<br /> |
|
| 921 |
+How can we make the <a |
|
| 922 |
+href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> |
|
| 923 |
+easier to maintain, improve, and document? |
|
| 924 |
+</li> |
|
| 925 |
+ |
|
| 926 |
+<li> |
|
| 927 |
+<b>Rework and extend Blossom</b> |
|
| 928 |
+<br /> |
|
| 929 |
+Priority: <i>Medium</i> |
|
| 930 |
+<br /> |
|
| 931 |
+Effort Level: <i>Medium to High</i> |
|
| 932 |
+<br /> |
|
| 933 |
+Skill Level: <i>Medium to High</i> |
|
| 934 |
+<br /> |
|
| 935 |
+Likely Mentors: <i>Goodell</i> |
|
| 936 |
+<br /> |
|
| 937 |
+Rework and extend Blossom (a tool for monitoring and |
|
| 938 |
+selecting appropriate Tor circuits based upon exit node requirements |
|
| 939 |
+specified by the user) to gather data in a self-contained way, with |
|
| 940 |
+parameters easily configurable by the user. Blossom is presently |
|
| 941 |
+implemented as a single Python script that interfaces with Tor using the |
|
| 942 |
+Controller interface and depends upon metadata about Tor nodes obtained |
|
| 943 |
+via external processes, such as a webpage indicating status of the nodes |
|
| 944 |
+plus publically available data from DNS, whois, etc. This project has |
|
| 945 |
+two parts: (1) Determine which additional metadata may be useful and |
|
| 946 |
+rework Blossom so that it cleanly obtains the metadata on its own rather |
|
| 947 |
+than depend upon external scripts (this may, for example, involve |
|
| 948 |
+additional threads or inter-process communication), and (2) develop a |
|
| 949 |
+means by which the user can easily configure Blossom, starting with a |
|
| 950 |
+configuration file and possibly working up to a web configuration engine. |
|
| 951 |
+Knowledge of Tor and Python are important; knowledge of |
|
| 952 |
+TCP, interprocess communication, and Perl will also be helpful. An |
|
| 953 |
+interest in network neutrality is important as well, since the |
|
| 954 |
+principles of evaluating and understanding internet inconsistency are at |
|
| 955 |
+the core of the Blossom effort. |
|
| 956 |
+</li> |
|
| 957 |
+ |
|
| 958 |
+<li> |
|
| 959 |
+<b>Improve Blossom: Allow users to qualitatively describe exit nodes they desire</b> |
|
| 960 |
+<br /> |
|
| 961 |
+Priority: <i>Low</i> |
|
| 962 |
+<br /> |
|
| 963 |
+Effort Level: <i>Medium</i> |
|
| 964 |
+<br /> |
|
| 965 |
+Skill Level: <i>Medium</i> |
|
| 966 |
+<br /> |
|
| 967 |
+Likely Mentors: <i>Goodell</i> |
|
| 968 |
+<br /> |
|
| 969 |
+Develop and implement a means of affording Blossom |
|
| 970 |
+users the ability to qualitatively describe the exit node that they |
|
| 971 |
+want. The Internet is an inconsistent place: some Tor exit nodes see |
|
| 972 |
+the world differently than others. As presently implemented, Blossom (a |
|
| 973 |
+tool for monitoring and selecting appropriate Tor circuits based upon |
|
| 974 |
+exit node requirements specified by the user) lacks a sufficiently rich |
|
| 975 |
+language to describe how the different vantage points are different. |
|
| 976 |
+For example, some exit nodes may have an upstream network that filters |
|
| 977 |
+certain kinds of traffic or certain websites. Other exit nodes may |
|
| 978 |
+provide access to special content as a result of their location, perhaps |
|
| 979 |
+as a result of discrimination on the part of the content providers |
|
| 980 |
+themselves. This project has two parts: (1) develop a language for |
|
| 981 |
+describing characteristics of networks in which exit nodes reside, and |
|
| 982 |
+(2) incorporate this language into Blossom so that users can select Tor |
|
| 983 |
+paths based upon the description. |
|
| 984 |
+Knowledge of Tor and Python are important; knowledge of |
|
| 985 |
+TCP, interprocess communication, and Perl will also be helpful. An |
|
| 986 |
+interest in network neutrality is important as well, since the |
|
| 987 |
+principles of evaluating and understanding internet inconsistency are at |
|
| 988 |
+the core of the Blossom effort. |
|
| 989 |
+</li> |
|
| 990 |
+ |
|
| 991 |
+<li> |
|
| 992 |
+<b>Bring up new ideas!</b> |
|
| 993 |
+<br /> |
|
| 994 |
+Don't like any of these? Look at the <a |
|
| 995 |
+href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development |
|
| 996 |
+roadmap</a> for more ideas. |
|
| 997 |
+</li> |
|
| 998 |
+ |
|
| 999 |
+</ol> |
|
| 1000 |
+ |
|
| 125 | 1001 |
<h2><a class="anchor" href="#Coding">Programmierung und Design</a></h2> |
| 126 | 1002 |
|
| 127 | 1003 |
<ol> |
| ... | ... |
@@ -138,16 +1014,6 @@ |
| 138 | 1014 |
<li>Wie k�nnen wir die <a |
| 139 | 1015 |
href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> leichter |
| 140 | 1016 |
zu warten, verbessern und zu dokumentieren machen?</li> |
| 141 |
- <li>Wir brauchen ein verteiltes Testger�st. Bisher haben wir Unittests. Es |
|
| 142 |
- w�re gro�artig, ein Skript zu haben, welches ein Tornetzwerk startet und dort |
|
| 143 |
- f�r einige Zeit testet, ob die Erneuerungen funktionieren.</li> |
|
| 144 |
- <li>Hilf Mike Perry bei der <a |
|
| 145 |
-r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a |
|
| 146 |
- href="https://www.torproject.org/svn/torflow/TODO">TODO</a>). Es ist eine |
|
| 147 |
- Pythonbibliothek, die das <a |
|
| 148 |
- href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Controller Protokoll |
|
| 149 |
- </a> nutzt, um mit Tor eine Vielzahl von Verbindungen zu schaffen, diese zu |
|
| 150 |
- messen und Anomalien festzustellen.</li> |
|
| 151 | 1017 |
<li>Wir sollten damit anfangen unser <a href="<page |
| 152 | 1018 |
documentation>#DesignDoc">gegen Blockierungen gesch�tztes Design</a> zu |
| 153 | 1019 |
implementieren. Dies beinhaltet die Ausarbeitung des Designs, die |
| ... | ... |
@@ -230,6 +1096,39 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a |
| 230 | 1096 |
wahr? Wieviel Verkehr von welcher Sorte braucht man, um sicher zu |
| 231 | 1097 |
sicher, dass es funktioniert? Gibt es Szenarien, die die Attacke |
| 232 | 1098 |
ausbremsen? Funktioniert Padding besser als anderes?</li> |
| 1099 |
+ <li>Eine verwandte Frage: Bringt der Betrieb eines Relays oder |
|
| 1100 |
+ eines Br�ckenservers zus�tzlichen Schutz gegen Timingangriffe? Kann |
|
| 1101 |
+ ein externer Angreifer individuelle Str�me erkennen, obwohl er nicht |
|
| 1102 |
+ in die TLS-Str�me sehen kann? Hat die H�he des durchgeleiteten |
|
| 1103 |
+ Verkehrs Einfluss? Was w�re, wenn der Client anderen Verkehr |
|
| 1104 |
+ verlangsamt, um es so aussehen zu lassen, dass er auch |
|
| 1105 |
+ weitergeleitet wird? Die selbe Queue k�nnte auch zur Maskierung der |
|
| 1106 |
+ Timings mit Techniken von <a |
|
| 1107 |
+ href="http://www.freehaven.net/anonbib/#ShWa-Timing06" >adaptivem |
|
| 1108 |
+ Padding</a> genutzt werden, aber ohne zus�tzlich Traffic zu |
|
| 1109 |
+ erzeugen. W�rde das das Timing f�r externe Angreifer verschleiern? |
|
| 1110 |
+ M�ssten die Strategien f�r assymetrische Knoten angepasst werden? |
|
| 1111 |
+ W�re es dort beispielsweise m�glich, den Clienttraffic von anderem |
|
| 1112 |
+ zu unterscheiden? Oder ist das vielleicht f�r symmetrische |
|
| 1113 |
+ Verbindungen leichter?</li> |
|
| 1114 |
+ <li>Wiederhole die <a |
|
| 1115 |
+ href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta" |
|
| 1116 |
+ >Angriffe von Murdoch und Danezis von der Oakland 05</a> im |
|
| 1117 |
+ aktuellen Tor-Netzwerk. Schaue, ob du herausfinden kannst, warum das |
|
| 1118 |
+ bei einigen gut und bei anderen schlecht funktioniert. (Meine |
|
| 1119 |
+ Theorie ist, dass schnelle Knoten mit Restkapazit�t dem Angriff |
|
| 1120 |
+ besser widerstehen.) Wenn das wahr ist, experimentiere mit |
|
| 1121 |
+ <var>RelayBandwidthRate</var> und |
|
| 1122 |
+ <var>RelayBandwidthBurst</var>. Dabei betreibst du ein Relay, |
|
| 1123 |
+ welches als Client genutzt wird, um den Verkehr des Angreifers |
|
| 1124 |
+ weiterzuleiten. Was ist das richtige Verh�ltnis von |
|
| 1125 |
+ <var>RelayBandwidthRate</var> zu aktueller Kapazit�t? Gibt es |
|
| 1126 |
+ �berhaupt ein Verh�ltnis? Wenn wir dabei sind, erh�ht eine gro�e |
|
| 1127 |
+ Zahl von Relays die Fehlerrate des Angriffs? (Das Tor-Netzwerk ist |
|
| 1128 |
+ nun fast zwei Gr��enordnungen gewachsen, seit die Ver�ffentlichung |
|
| 1129 |
+ geschrieben wurde.) Lies auf jeden Fall auch <a |
|
| 1130 |
+ href="http://freehaven.net/anonbib/#clog-the-queue">Don't Clog the |
|
| 1131 |
+ Queue</a>.</li> |
|
| 233 | 1132 |
<li>Die Attacke auf die Routingzonen ist der Netzpfad zwischen |
| 234 | 1133 |
Alice und dem Eingangsknoten (bzw. zwischen dem Exitknoten und |
| 235 | 1134 |
Bob). In der Literatur wird dies als einfache Verbindung auf |
| ... | ... |
@@ -289,6 +1188,16 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a |
| 289 | 1188 |
href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship" |
| 290 | 1189 |
>die Zensurwiderstandssektion der AnonBib</a>. |
| 291 | 1190 |
</li> |
| 1191 |
+ <li>Unsere Ziele zum Schutz vor Zensur schlie�en ein, dass ein |
|
| 1192 |
+ Angreifer Tor-Verkehr von <a |
|
| 1193 |
+ href="https://www.torproject.org/svn/trunk/doc/design-paper/blocking.html#sec:network-fingerprint">normalem |
|
| 1194 |
+ SSL-Verkehr unterscheiden</a> kann. Offensichtlich k�nnen wir keine |
|
| 1195 |
+ perfekte Steganographie erreichen und dabei benutzbar bleiben. Aber |
|
| 1196 |
+ wir m�chten gern Angriffen, die nur wenige Pakete betrachten, |
|
| 1197 |
+ �berwinden. Eine der verbliebenen Angriffe, die wir nicht sehr gepr�ft |
|
| 1198 |
+ haben, ist das Verh�ltnis von der Gr��e der Tor-Zellen (512 Byte) |
|
| 1199 |
+ zum restlichen Verkehr. Wieviel erkennt man davon, haben die |
|
| 1200 |
+ Leerungsmechanismen der Buffer einen Einfluss, k�nnte Padding helfen?</li> |
|
| 292 | 1201 |
<li>Tor-Verbindungen werden schrittweise aufgebaut, ein Knoten nach |
| 293 | 1202 |
dem anderen. Also haben wir theoretisch die M�glichkeit, manche |
| 294 | 1203 |
Str�me schon nach dem zweiten Knoten die Tor-Wolke verlassen zu |
| ... | ... |
@@ -303,6 +1212,23 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a |
| 303 | 1212 |
richtige Anwort? Welche anderen praktischen Herangehensweisen gibt es? |
| 304 | 1213 |
Bonuspunkte, wenn diese mit dem aktuellen Tor-Protokoll abw�rtskompatibel |
| 305 | 1214 |
sind.</li> |
| 1215 |
+ <li>Programme, wie <a |
|
| 1216 |
+ href="https://torbutton.torproject.org/dev/">Torbutton</a>, |
|
| 1217 |
+ versuchen den User-Agent des Browsers zu verstecken, indem sie |
|
| 1218 |
+ diesen durch eine gew�hnliche Angabe ersetzen. Dadurch kann ein |
|
| 1219 |
+ Angreifer Tor-Nutzer nicht durch einen Blick auf die |
|
| 1220 |
+ Nachrichtenk�pfe erkennen. Die Software versucht einen, allgemein |
|
| 1221 |
+ genutzten Wert zu nehmen. Frage 1: Wie sehr schaden wir uns, wenn |
|
| 1222 |
+ wir die Firefox-Version periodisch anpassen? Wenn wir zu oft |
|
| 1223 |
+ updaten, kann man es unterscheiden. Machen wir es nicht, findet man |
|
| 1224 |
+ Tor-Nutzer heraus, da sie sehr alte Versionen nutzen. Die Antwort |
|
| 1225 |
+ h�ngt wahrscheinlich von den Firefox-Versionen, die es gibt, |
|
| 1226 |
+ ab. Frage 2: Die Leute fragen immer wieder, zwischen n verschiedenen |
|
| 1227 |
+ User-Agents zu wechseln. Hilft der Ansatz oder macht das keinen |
|
| 1228 |
+ Unterschied? Betrachte dabei Cookies und Tor-Nutzer, die periodisch |
|
| 1229 |
+ den User-Agent wechseln. B�sartige Webseiten greifen nur bestimmte |
|
| 1230 |
+ Browser an. Wie beeinflussen die Antworten auf diese Fragen diese |
|
| 1231 |
+ Antwort.</li> |
|
| 306 | 1232 |
</ol> |
| 307 | 1233 |
|
| 308 | 1234 |
<p><a href="<page contact>">Lass uns wissen</a>, wenn du bei einem |
| 309 | 1235 |