update german volunteer page - request for repeating Murdoch/Danezis attack - distinguishing SSL traffic - english version of GSoC
Jens Kubieziel

Jens Kubieziel commited on 2008-05-16 11:35:44
Zeige 1 geänderte Dateien mit 938 Einfügungen und 12 Löschungen.

... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 13843
2
+# Based-On-Revision: 14628
3 3
 # Last-Translator: jens@kubieziel.de, peter@palfrader.org
4 4
 
5 5
 #include "head.wmi" TITLE="Mithelfen" 
... ...
@@ -30,7 +30,7 @@
30 30
 <h2><a class="anchor" href="#Usability">unterst�tzende Anwendungen</a></h2>
31 31
 
32 32
 <ol>
33
-  <li>Wir brauchen einen guten Weg, um DNS-Abfragen abzufangen, damit diese
33
+  <li>Wir brauchen gute Methoden, um DNS-Abfragen abzufangen, damit diese
34 34
   nicht an einen lokalen Beobachter dringen, w�hrend wir versuchen, anonym zu
35 35
   bleiben. (Dies passiert, weil die Anwendung selbst DNS-Anfragen
36 36
   stellt, anstatt diese �ber Tor zu leiten.).
... ...
@@ -122,6 +122,882 @@
122 122
   </ol>
123 123
 
124 124
 <a id="Coding"></a>
125
+  <p>Die untenstehenden Angaben wurden in der Originalsprache
126
+  belassen. Da diese sich ausschlie�lich auf englischsprachige
127
+  Bewerber beziehen.</p>
128
+
129
+  <a id="Summer"></a>
130
+<a id="Projects"></a>
131
+<h2><a class="anchor" href="#Projects">Good Coding Projects</a></h2>
132
+
133
+<p>
134
+You may find some of these projects to be good <a href="<page
135
+gsoc>">Google Summer of Code 2008</a> ideas. We have labelled each idea
136
+with how useful it would be to the overall Tor project
137
+(priority), how much work we expect it would be (effort level), how much
138
+clue you should start with (skill level), and which of our <a href="<page
139
+people>#Core">core developers</a> would be good mentors. There are plenty
140
+of other good ideas to work on too &mdash; see for example the <a
141
+href="<svnsandbox>doc/spec/proposals/">current proposals</a> list, or
142
+just make up your own ideas.
143
+</p>
144
+
145
+<ol>
146
+
147
+<li>
148
+<b>Tor Exit Scanner improvements</b>
149
+<br />
150
+Priority: <i>High</i>
151
+<br />
152
+Effort Level: <i>High</i>
153
+<br />
154
+Skill Level: <i>High</i>
155
+<br />
156
+Likely Mentors: <i>Mike</i>
157
+<br />
158
+Applications as of 1 Apr 00:00 UTC: <i>5</i>
159
+<br />
160
+The Tor exit node scanner 'SoaT', part of the <a
161
+href="<svnsandbox>torflow/">Torflow project</a>, makes connections out
162
+of each Tor exit node and compares the content it gets back with what it
163
+"should" get back. The goal is to notice misconfigured, broken, and even
164
+malicious exit relays. Alas, the code is
165
+currently written in rather rickety perl and relies on MD5sums of
166
+entire documents in order to determine if exit nodes are modifying
167
+content. The problem with this is threefold: 1) Perl sucks at life.
168
+2) The scanner can't verify pages that are dynamic, and attackers can
169
+focus malicious content injection on only those dynamic pages. 3)
170
+Pages change after a while (or based on GeoIP) and begin generating
171
+false positives.
172
+<br />
173
+Ideally, soat.pl would be reimplemented in a sane language with a
174
+robust html parser library (since the rest of Torflow is in Python
175
+that would be nice, but it is not required), and calculate signatures only for
176
+tags and content likely to be targeted by a malicious attacker (script
177
+tags, object links, images, css). It should also be robust in the face of
178
+changes to content outside of Tor, and ultimately even GeoIP localized
179
+content.
180
+<br />
181
+This scanner would likely be run by the Directory Authorities and
182
+report its results to the control port via the AuthDirBadExit config
183
+setting.
184
+<br />
185
+</li>
186
+
187
+<li>
188
+<b>Tor Node Scanner improvements</b>
189
+<br />
190
+Priority: <i>High</i>
191
+<br />
192
+Effort Level: <i>Medium to High</i>
193
+<br />
194
+Skill Level: <i>Medium to High</i>
195
+<br />
196
+Likely Mentors: <i>Mike</i>
197
+<br />
198
+Applications as of 1 Apr 00:00 UTC: <i>1</i>
199
+<br />
200
+Similar to the exit scanner (or perhaps even during exit scanning),
201
+statistics can be gathered about the reliability of nodes. Nodes that
202
+fail too high a percentage of their circuits should not be given
203
+Guard status. Perhaps they should have their reported bandwidth
204
+penalized by some ratio as well, or just get marked as Invalid. In
205
+addition, nodes that exhibit a very low average stream capacity but
206
+advertise a very high node bandwidth can also be marked as Invalid.
207
+Much of this statistics gathering is already done, it just needs to be
208
+transformed into something that can be reported to the Directory
209
+Authorities to blacklist/penalize nodes in such a way that clients
210
+will listen.
211
+<br />
212
+In addition, these same statistics can be gathered about the traffic
213
+through a node. Events can be added to the <a
214
+href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Control
215
+Protocol</a> to
216
+report if a circuit extend attempt through the node succeeds or fails, and
217
+passive statistics can be gathered on both bandwidth and reliability
218
+of other nodes via a node-based monitor using these events. Such a
219
+scanner would also report information on oddly-behaving nodes to
220
+the Directory Authorities, but a communication channel for this
221
+currently does not exist and would need to be developed as well.
222
+</li>
223
+
224
+<li>
225
+<b>Help track the overall Tor Network status</b>
226
+<br />
227
+Priority: <i>High</i>
228
+<br />
229
+Effort Level: <i>Medium</i>
230
+<br />
231
+Skill Level: <i>Medium</i>
232
+<br />
233
+Likely Mentors: <i>Roger, Nick, Mike</i>
234
+<br />
235
+It would be great to set up an automated system for tracking network
236
+health over time, graphing it, etc. Part of this project would involve
237
+inventing better metrics for assessing network health and growth. Is the
238
+average uptime of the network increasing? How many relays are qualifying
239
+for Guard status this month compared to last month? What's the turnover
240
+in terms of new relays showing up and relays shutting off? Periodically
241
+people collect brief snapshots, but where it gets really interesting is
242
+when we start tracking data points over time.
243
+<br />
244
+Data could be collected from the "Tor Node Scanner" item above, from
245
+the server descriptors that each relay publishes, and from other
246
+sources. Results over time could be integrated into one of the <a
247
+href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
248
+kept separate. Speaking of the Tor Status pages, take a look at Roger's
249
+<a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor
250
+Status wish list</a>.
251
+</li>
252
+
253
+<li>
254
+<b>Tor path selection improvements</b>
255
+<br />
256
+Priority: <i>High</i>
257
+<br />
258
+Effort Level: <i>Low to Medium</i>
259
+<br />
260
+Skill Level: <i>High</i>
261
+<br />
262
+Likely Mentors: <i>Roger, Nick, Mike</i>
263
+<br />
264
+Applications as of 1 Apr 00:00 UTC: <i>3</i>
265
+<br />
266
+Some simple improvements can be made to Tor's path selection to vastly
267
+improve Tor speed. For instance, some of the (unofficial) <a
268
+href="http://wiki.noreply.org/noreply/TheOnionRouter/FireFoxTorPerf">Tor
269
+Performance Recommendations</a> on the wiki are to increase the number of
270
+guards and decrease the CircuitBuildTimeout. Ideally, the client would
271
+<a href="http://archives.seul.org/or/talk/Feb-2008/msg00012.html">learn
272
+these values by gathering statistics on circuit construction
273
+time</a> (and/or using values gained from Torflow), and set the timeouts
274
+low enough such that some high percentile (75%, 90%, 1-stddev?) of
275
+circuits succeed, yet extremely slow nodes are avoided. This would
276
+involve some statistics gathering+basic research, and some changes to
277
+Tor path selection code.
278
+<br />
279
+In addition, to improve path security, some elements from the <a
280
+href="http://www.torproject.org/svn/trunk/doc/spec/proposals/115-two-hop-paths.txt">Two
281
+Hop Paths proposal</a> could be done as part of this (since it will
282
+likely touch the same code anyways), regardless of the adoption of
283
+that proposal. In particular, clients probably should avoid guards that
284
+seem to fail an excessive percentage of their circuits through them,
285
+and non-firewalled clients should issue a warning if they are only able
286
+to connect to a limited set of guard nodes. See also
287
+<a href="http://archives.seul.org/or/dev/Feb-2008/msg00003.html">this
288
+or-dev post</a>.
289
+</li>
290
+
291
+<li>
292
+<b>Translation Wiki</b>
293
+<br />
294
+Priority: <i>High</i>
295
+<br />
296
+Effort Level: <i>Medium</i>
297
+<br />
298
+Skill Level: <i>Medium</i>
299
+<br />
300
+Likely Mentors: <i>Jacob</i>
301
+<br />
302
+We need a way to edit and translate sections of the website. Currently
303
+the website is made up of a bunch of <a href="<svnwebsite>en/">wml
304
+files</a>, and <a href="<page translation>">translators</a> fetch these
305
+wml files, translate them in an editor, and either send us the translation
306
+or use svn to commit them back. The current "cost" of publication of
307
+website changes is quite high even for English language users. For a
308
+single word change or any type of
309
+minor change, the page may never be corrected or translated. It would
310
+be nice to have a wiki that was specifically geared towards translation
311
+and would somehow track the upstream (English) versions to indicate when
312
+a fresh translation is needed, like our current
313
+<a href="<page translation-status>">translation status page</a>. This
314
+seems mostly like a job for a wiki
315
+integrator or wiki software author. Certainly the person would need to
316
+be interested in human languages and translation. They should at least
317
+be minimally familiar with what Tor is; but they would not have to interact
318
+with the software, only the documentation and the website.
319
+</li>
320
+
321
+<li>
322
+<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b>
323
+<br />
324
+Priority: <i>High</i>
325
+<br />
326
+Effort Level: <i>Medium</i>
327
+<br />
328
+Skill Level: <i>Medium</i>
329
+<br />
330
+Likely Mentors: <i>Peter, Matt</i>
331
+<br />
332
+Applications as of 1 Apr 00:00 UTC: <i>1</i>
333
+<br />
334
+Vidalia currently doesn't play nicely on Debian and Ubuntu with the
335
+default Tor packages. The current Tor packages automatically start Tor
336
+as a daemon running as the debian-tor user and (sensibly) do not have a
337
+<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined
338
+in the default torrc. Consequently, Vidalia will try
339
+to start its own Tor process since it could not connect to the existing
340
+Tor, and Vidalia's Tor process will then exit with an error message
341
+the user likely doesn't understand since Tor cannot bind its listening
342
+ports &mdash; they're already in use by the original Tor daemon.
343
+<br />
344
+The current solution involves either telling the user to stop the
345
+existing Tor daemon and let Vidalia start its own Tor process, or
346
+explaining to the user how to set a control port and password in their
347
+torrc. A better solution on Debian would be to use Tor's ControlSocket,
348
+which allows Vidalia to talk to Tor via a Unix domain socket, and could
349
+possibly be enabled by default in Tor's Debian packages. Vidalia can
350
+then authenticate to Tor using filesystem-based (cookie) authentication
351
+if the user running Vidalia is also in the debian-tor group.
352
+<br />
353
+This project will first involve adding support for Tor's ControlSocket
354
+to Vidalia. The student will then develop and test Debian and Ubuntu
355
+packages for Vidalia that conform to Debian's packaging standards and
356
+make sure they work well with the existing Tor packages. We can also
357
+set up an apt repository to host the new Vidalia packages.
358
+<br />
359
+The next challenge would be to find an intuitive usable way for Vidalia
360
+to be able to change Tor's configuration (torrc) even though it is
361
+located in <code>/etc/tor/torrc</code> and thus immutable. The best
362
+idea we've come up with so far is to feed Tor a new configuration via
363
+the ControlSocket when Vidalia starts, but that's bad because Tor starts
364
+each boot with a different configuration than the user wants. The second
365
+best idea
366
+we've come up with is for Vidalia to write out a temporary torrc file
367
+and ask the user to manually move it to <code>/etc/tor/torrc</code>,
368
+but that's bad because users shouldn't have to mess with files directly.
369
+<br />
370
+A student undertaking this project should have prior knowledge of
371
+Debian package management and some C++ development experience. Previous
372
+experience with Qt is helpful, but not required.
373
+</li>
374
+
375
+<li>
376
+<b>Improving Tor's ability to resist censorship</b>
377
+<br />
378
+Priority: <i>High</i>
379
+<br />
380
+Effort Level: <i>High</i>
381
+<br />
382
+Skill Level: <i>High</i>
383
+<br />
384
+Likely Mentors: <i>Nick</i>
385
+<br />
386
+The Tor 0.2.0.x series makes <a
387
+href="<svnsandbox>doc/design-paper/blocking.html">significant
388
+improvements</a> in resisting national and organizational censorship.
389
+But Tor still needs better mechanisms for some parts of its
390
+anti-censorship design.  For example, current Tors can only listen on a
391
+single address/port combination at a time.  There's
392
+<a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a
393
+proposal to address this limitation</a> and allow clients to connect
394
+to any given Tor on multiple addresses and ports, but it needs more
395
+work.  Another anti-censorship project (far more difficult) is to try
396
+to make Tor more scanning-resistant.  Right now, an adversary can identify
397
+<a href="<svnsandbox>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
398
+just by trying to connect to them, following the Tor protocol, and
399
+seeing if they respond.  To solve this, bridges could
400
+<a href="<svnsandbox>doc/design-paper/blocking.html#tth_sEc9.3">act like
401
+webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
402
+and not act like bridges until the user provides a bridge-specific key.
403
+<br />
404
+This project involves a lot of research and design. One of the big
405
+challenges will be identifying and crafting approaches that can still
406
+resist an adversary even after the adversary knows the design, and
407
+then trading off censorship resistance with usability and robustness.
408
+</li>
409
+
410
+<li>
411
+<b>Tor/Polipo/Vidalia Auto-Update Framework</b>
412
+<br />
413
+Priority: <i>Medium</i>
414
+<br />
415
+Effort Level: <i>High</i>
416
+<br />
417
+Skill Level: <i>High</i>
418
+<br />
419
+Likely Mentors: <i>Matt, Jacob</i>
420
+<br />
421
+We're in need of a good authenticated-update framework.
422
+Vidalia already has the ability to notice when the user is running an
423
+outdated or unrecommended version of Tor, using signed statements inside
424
+the Tor directory information. Currently, Vidalia simply pops
425
+up a little message box that lets the user know they should manually
426
+upgrade. The goal of this project would be to extend Vidalia with the
427
+ability to also fetch and install the updated Tor software for the
428
+user. We should do the fetches via Tor when possible, but also fall back
429
+to direct fetches in a smart way. Time permitting, we would also like
430
+to be able to update other
431
+applications included in the bundled installers, such as Polipo and
432
+Vidalia itself.
433
+<br />
434
+To complete this project, the student will first need to first investigate
435
+the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate
436
+their strengths, weaknesses, security properties, and ability to be
437
+integrated into Vidalia. If none are found to be suitable, the student
438
+will design their own auto-update framework, document the design, and
439
+then discuss the design with other developers to assess any security
440
+issues. The student will then implement their framework (or integrate
441
+an existing one) and test it.
442
+<br />
443
+A student undertaking this project should have good C++ development
444
+experience. Previous experience with Qt is helpful, but not required. The
445
+student should also have a good understanding of common security
446
+practices, such as package signature verification. Good writing ability
447
+is also important for this project, since a vital step of the project
448
+will be producing a design document for others to review and discuss
449
+with the student prior to implementation.
450
+</li>
451
+
452
+<li>
453
+<b>An Improved and More Usable Network Map in Vidalia</b>
454
+<br />
455
+Priority: <i>Medium</i>
456
+<br />
457
+Effort Level: <i>Medium</i>
458
+<br />
459
+Skill Level: <i>Medium to High</i>
460
+<br />
461
+Likely Mentors: <i>Matt</i>
462
+<br />
463
+One of Vidalia's existing features is a network map that shows the user
464
+the approximate geographic location of relays in the Tor network and
465
+plots the paths the user's traffic takes as it is tunneled through the
466
+Tor network. The map is currently not very interactive and has rather
467
+poor graphics. Instead, we would like to leverage KDE's Marble widget
468
+that gives us a better quality map and enables improved interactivity,
469
+such as allowing the user to click on individual relays or circuits to
470
+display additional information. We might also consider adding the ability
471
+for users to click on a particular relay or a country containing one or
472
+more Tor exit relays and say, "I want my connections to foo.com to exit
473
+from here."
474
+<br />
475
+This project will first involve the student getting familiar with Vidalia
476
+and the Marble widget's API. The student will then integrate the widget
477
+into Vidalia and customize Marble to be better suited for our application,
478
+such as making circuits clickable, storing cached map data in Vidalia's
479
+own data directory, and customizing some of the widget's dialogs.
480
+<br />
481
+A student undertaking this project should have good C++ development
482
+experience. Previous experience with Qt and CMake is helpful, but not
483
+required.
484
+</li>
485
+
486
+<li>
487
+<b>Tor Controller Status Event Interface</b>
488
+<br />
489
+Priority: <i>Medium</i>
490
+<br />
491
+Effort Level: <i>Medium</i>
492
+<br />
493
+Skill Level: <i>Medium</i>
494
+<br />
495
+Likely Mentors: <i>Matt, Roger</i>
496
+<br />
497
+There are a number of status changes inside Tor of which the user may need
498
+to be informed. For example, if the user is trying to set up his Tor as a
499
+relay and Tor decides that its ports are not reachable from outside
500
+the user's network, we should alert the user. Currently, all the user
501
+gets is a couple log messages in Vidalia's 'message log' window, which they
502
+likely never see since they don't receive a notification that something
503
+has gone wrong. Even if the user does actually look at the message log,
504
+most of the messages make little sense to the novice user.
505
+<br />
506
+Tor has the ability to inform Vidalia of many such status changes, and
507
+we recently implemented support for a couple of these events. Still,
508
+there are many more status events the user should be informed of and we
509
+need a better UI for actually displaying them to the user.
510
+<br />
511
+The goal of this project then is to design and implement a UI for
512
+displaying Tor status events to the user. For example, we might put a
513
+little badge on Vidalia's tray icon that alerts the user to new status
514
+events they should look at. Double-clicking the icon could bring up a
515
+dialog that summarizes recent status events in simple terms and maybe
516
+suggests a remedy for any negative events if they can be corrected by
517
+the user. Of course, this is just an example and the student is free to
518
+suggest another approach.
519
+<br />
520
+A student undertaking this project should have good UI design and layout
521
+and some C++ development experience. Previous experience with Qt and
522
+Qt's Designer will be very helpful, but are not required. Some
523
+English writing ability will also be useful, since this project will
524
+likely involve writing small amounts of help documentation that should
525
+be understandable by non-technical users. Bonus points for some graphic
526
+design/Photoshop fu, since we might want/need some shiny new icons too.
527
+</li>
528
+
529
+<li>
530
+<b>Improvements on our active browser configuration tester</b> -
531
+<a href="https://check.torproject.org/">https://check.torproject.org/</a>
532
+<br />
533
+Priority: <i>Medium</i>
534
+<br />
535
+Effort Level: <i>Low</i>
536
+<br />
537
+Skill Level: <i>Low to Medium</i>
538
+<br />
539
+Likely Mentors: <i>Jacob, Steven</i>
540
+<br />
541
+Applications as of 1 Apr 00:00 UTC: <i>1</i>
542
+<br />
543
+We currently have a functional web page to detect if Tor is working. It
544
+has a few places where it falls short. It requires improvements with
545
+regard to default languages and functionality. It currently only responds
546
+in English. In addition, it is a hack of a perl script that should have
547
+never seen the light of day. It should probably be rewritten in python
548
+with multi-lingual support in mind. It currently uses the <a
549
+href="http://exitlist.torproject.org/">Tor DNS exit list</a>
550
+and should continue to do so in the future. It currently result in certain
551
+false positives and these should be discovered, documented, and fixed
552
+where possible. Anyone working on this project should be interested in
553
+DNS, basic perl or preferably python programming skills, and will have
554
+to interact minimally with Tor to test their code.
555
+<br />
556
+If you want to make the project more exciting
557
+and involve more design and coding, take a look at <a
558
+href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal
559
+131-verify-tor-usage.txt</a>.
560
+</li>
561
+
562
+<li>
563
+<b>Improvements on our DNS Exit List service</b> -
564
+<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a>
565
+<br />
566
+Priority: <i>Medium</i>
567
+<br />
568
+Effort Level: <i>Low</i>
569
+<br />
570
+Skill Level: <i>Low</i>
571
+<br />
572
+Likely Mentors: <i>Jacob, Tup</i>
573
+<br />
574
+The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a>
575
+is written by our fabulous anonymous
576
+contributer Tup. It's a DNS server written in Haskell that supports part of our <a
577
+href="https://www.torproject.org/svn/trunk/doc/contrib/torel-design.txt">exitlist
578
+design document</a>. Currently, it is functional and it is used by
579
+check.torproject.org and other users. The issues that are outstanding
580
+are mostly aesthetic. This wonderful service could use a much better
581
+website using the common Tor theme. It would be best served with better
582
+documentation for common services that use an RBL. It could use more
583
+publicity. A person working on this project should be interested in DNS,
584
+basic RBL configuration for popular services, and writing documentation.
585
+The person would require minimal Tor interaction &mdash; testing their
586
+own documentation at the very least. Furthermore, it would be useful
587
+if they were interested in Haskell and wanted to implement more of the
588
+torel-design.txt suggestions.
589
+</li>
590
+
591
+<li>
592
+<b>Testing integration of Tor with web browsers for our end users</b>
593
+<br />
594
+Priority: <i>Medium</i>
595
+<br />
596
+Effort Level: <i>Medium</i>
597
+<br />
598
+Skill Level: <i>Medium</i>
599
+<br />
600
+Likely Mentors: <i>Jacob, Mike, Greg</i>
601
+<br />
602
+Applications as of 1 Apr 00:00 UTC: <i>1</i>
603
+<br />
604
+The Tor project currently lacks a solid test suite to ensure that a
605
+user has a properly and safely configured web browser. It should test for as
606
+many known issues as possible. It should attempt to decloak the
607
+user in any way possible. Two current webpages that track these
608
+kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a
609
+href="http://pseudo-flaw.net/tor/torbutton/">list of issues along
610
+with their proof of concept code, bug issues, etc</a>. HD Moore runs
611
+the <a href="http://metasploit.com/research/projects/decloak/">metasploit
612
+decloak website</a>. A student interested in defending Tor could start
613
+by collecting as many workable and known methods for decloaking a
614
+Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may
615
+be helpful as a start.) The student should be familiar with the common
616
+pitfalls but
617
+possibly have new methods in mind for implementing decloaking issues. The
618
+website should ensure that it tells a user what their problem is. It
619
+should help them to fix the problem or direct them to the proper support
620
+channels. The student should be closely familiar with using Tor and how
621
+to prevent Tor information leakage.
622
+</li>
623
+
624
+<li>
625
+<b>Libevent and Tor integration improvements</b>
626
+<br />
627
+Priority: <i>Medium</i>
628
+<br />
629
+Effort Level: <i>High</i>
630
+<br />
631
+Skill Level: <i>Medium to High</i>
632
+<br />
633
+Likely Mentors: <i>Nick</i>
634
+<br />
635
+Tor should make better use of the more recent features of Niels
636
+Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a>
637
+library.  Tor already uses Libevent for its low-level asynchronous IO
638
+calls, and could also use Libevent's increasingly good implementations
639
+of network buffers and of HTTP.  This wouldn't be simply a matter of
640
+replacing Tor's internal calls with calls to Libevent: instead, we'll
641
+need to refactor Tor to use Libevent calls that do not follow the
642
+same models as Tor's existing backends. Also, we'll need to add
643
+missing functionality to Libevent as needed &mdash; most difficult likely
644
+will be adding OpenSSL support on top of Libevent's buffer abstraction.
645
+Also tricky will be adding rate-limiting to Libevent.
646
+</li>
647
+
648
+<li>
649
+<b>Tuneup Tor!</b>
650
+<br />
651
+Priority: <i>Medium</i>
652
+<br />
653
+Effort Level: <i>Medium</i>
654
+<br />
655
+Skill Level: <i>Medium to High</i>
656
+<br />
657
+Likely Mentors: <i>Nick, Roger, Mike</i>
658
+<br />
659
+Right now, Tor relays measure and report their own bandwidth, and Tor
660
+clients choose which relays to use in part based on that bandwidth.
661
+This approach is vulnerable to
662
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
663
+relays lie about their bandwidth</a>;
664
+to address this, Tor currently caps the maximum bandwidth
665
+it's willing to believe any relay provides.  This is a limited fix, and
666
+a waste of bandwidth capacity to boot.  Instead,
667
+Tor should possibly measure bandwidth in a more distributed way, perhaps
668
+as described in the
669
+<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for
670
+Tor"</a> paper
671
+by Snader and Borisov. A student could use current testing code to
672
+double-check this paper's findings and verify the extent to which they
673
+dovetail with Tor as deployed in the wild, and determine good ways to
674
+incorporate them into their suggestions Tor network without adding too
675
+much communications overhead between relays and directory
676
+authorities.
677
+</li>
678
+
679
+<!--
680
+<li>
681
+<b>Improving the Tor QA process: Continuous Integration for Windows builds</b>
682
+<br />
683
+Priority: <i>High</i>
684
+<br />
685
+Effort Level: <i>Medium</i>
686
+<br />
687
+Skill Level: <i>Medium</i>
688
+<br />
689
+Likely Mentors: <i>Jacob, Andrew</i>
690
+<br />
691
+It would be useful to have automated build processes for Windows and
692
+probably other platforms. The purpose of having a continuous integration
693
+build environment is to ensure that Windows isn't left behind for any of
694
+the software projects used in the Tor project or its accompanying.<br />
695
+Buildbot may be a good choice for this as it appears to support all of
696
+the platforms Tor does. See the
697
+<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for
698
+buildbot</a>.<br />
699
+There may be better options and the person undertaking this task should
700
+evaluate other options. Any person working on this automatic build
701
+process should have experience or be willing to learn how to build all
702
+of the respective Tor related code bases from scratch. Furthermore, the
703
+person should have some experience building software in Windows
704
+environments as this is the target audience we want to ensure we do not
705
+leave behind. It would require close work with the Tor source code but
706
+probably only in the form of building, not authoring.<br />
707
+Additionally, we need to automate our performance testing for all platforms.
708
+We've got buildbot (except on Windows &mdash; as noted above) to automate
709
+our regular integration and compile testing already,
710
+but we need to get our network simulation tests (as built in torflow)
711
+updated for more recent versions of Tor, and designed to launch a test
712
+network either on a single machine, or across several, so we can test
713
+changes in performance on machines in different roles automatically.
714
+</li>
715
+-->
716
+
717
+<li>
718
+<b>Improve our unit testing process</b>
719
+<br />
720
+Priority: <i>Medium</i>
721
+<br />
722
+Effort Level: <i>Medium</i>
723
+<br />
724
+Skill Level: <i>Medium</i>
725
+<br />
726
+Likely Mentors: <i>Nick</i>
727
+<br />
728
+Tor needs to be far more tested. This is a multi-part effort. To start
729
+with, our unit test coverage should rise substantially, especially in
730
+the areas outside the utility functions. This will require significant
731
+refactoring of some parts of Tor, in order to dissociate as much logic
732
+as possible from globals.
733
+<br />
734
+Additionally, we need to automate our performance testing. We've got
735
+buildbot to automate our regular integration and compile testing already
736
+(though we need somebody to set it up on Windows),
737
+but we need to get our network simulation tests (as built in TorFlow: see
738
+the "Tor Node Scanner improvements" item)
739
+updated for more recent versions of Tor, and designed to launch a test
740
+network either on a single machine, or across several, so we can test
741
+changes in performance on machines in different roles automatically.
742
+</li>
743
+
744
+<li>
745
+<b>Help revive an independent Tor client implementation</b>
746
+<br />
747
+Priority: <i>Medium</i>
748
+<br />
749
+Effort Level: <i>High</i>
750
+<br />
751
+Skill Level: <i>Medium to High</i>
752
+<br />
753
+Likely Mentors: <i>Karsten, Nick</i>
754
+<br />
755
+Applications as of 1 Apr 00::00 UTC: <i>4</i>
756
+<br />
757
+Reanimate one of the approaches to implement a Tor client in Java,
758
+e.g. the <a href="http://onioncoffee.sourceforge.net/">OnionCoffee
759
+project</a>, and make it run on <a
760
+href="http://code.google.com/android/">Android</a>. The first step
761
+would be to port the existing code and execute it in an Android
762
+environment. Next, the code should be updated to support the newer Tor
763
+protocol versions like the <a href="<svnsandbox>doc/spec/dir-spec.txt">v3
764
+directory protocol</a>. Further, support for requesting or even
765
+providing Tor hidden services would be neat, but not required.
766
+<br />
767
+The student should be able to understand and write new Java code, including
768
+a Java cryptography API. Being able to read C code would be helpful,
769
+too. The student should be willing to read the existing documentation,
770
+implement code based on it, and refine the documentation
771
+when things are underdocumented. This project is mostly about coding and
772
+to a small degree about design.
773
+</li>
774
+
775
+<li>
776
+<b>Automatic system tests and automatically starting private Tor networks</b>
777
+<br />
778
+Priority: <i>Medium</i>
779
+<br />
780
+Effort Level: <i>Medium</i>
781
+<br />
782
+Skill Level: <i>Medium</i>
783
+<br />
784
+Likely Mentors: <i>Karsten, Nick, Roger</i>
785
+<br />
786
+Applications as of 1 Apr 00:00 UTC: <i>2</i>
787
+<br />
788
+Write a tool that runs automatic system tests in addition
789
+to the existing unit tests. The Java-based Tor simulator <a
790
+href="https://tor-svn.freehaven.net/svn/puppetor/trunk/">PuppeTor</a>
791
+might be a good start for starting up a private Tor network, using it
792
+for a while, and verifying that at least parts of it are working. This
793
+project requires to conceive a blueprint for performing system tests
794
+of private Tor networks, before starting to code. Typical types of
795
+tests range from performing single requests over the private network to
796
+manipulating exchanged messages and see if nodes handle corrupt messages
797
+appropriately.
798
+<br />
799
+The student should be able to obtain a good understanding
800
+of how Tor works and what problems and bugs could arise to design good
801
+test cases. Understanding the existing Tor code structure and documentation is
802
+vital. If PuppeTor is used, the student should also be able to understand
803
+and possibly extend an existing Java application. This project is partly
804
+about design and partly about coding.
805
+</li>
806
+
807
+<li>
808
+<b>Bring moniTor to life</b>
809
+<br />
810
+Priority: <i>Medium</i>
811
+<br />
812
+Effort Level: <i>Medium</i>
813
+<br />
814
+Skill Level: <i>Low to Medium</i>
815
+<br />
816
+Likely Mentors: <i>Karsten, Jacob</i>
817
+<br />
818
+Applications as of 1 Apr 00::00 UTC: <i>2</i>
819
+<br />
820
+Implement a <a href="http://www.ss64.com/bash/top.html">top-like</a>
821
+management tool for Tor relays. The purpose of such a tool would be
822
+to monitor a local Tor relay via its control port and include useful
823
+system information of the underlying machine. When running this tool, it
824
+would dynamically update its content like top does for Linux processes.
825
+<a href="http://archives.seul.org/or/dev/Jan-2008/msg00005.html">This
826
+or-dev post</a> might be a good first read.
827
+<br />
828
+The student should be familiar
829
+with or willing to learn about administering a Tor relay and configuring
830
+it via its control port. As an initial prototype is written in Python,
831
+some knowledge about writing Python code would be helpful, too. This
832
+project is one part about identifying requirements to such a
833
+tool and designing its interface, and one part lots of coding.
834
+</li>
835
+
836
+<li>
837
+<b>Torbutton improvements</b>
838
+<br />
839
+Priority: <i>Medium</i>
840
+<br />
841
+Effort Level: <i>High</i>
842
+<br />
843
+Skill Level: <i>High</i>
844
+<br />
845
+Likely Mentors: <i>Mike</i>
846
+<br/>
847
+Torbutton has a number of improvements that can be made in the post-1.2
848
+timeframe. Most of these are documented as feature requests in the <a
849
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5">Torbutton
850
+flyspray section</a>. Good examples include: stripping off node.exit on http
851
+headers, more fine-grained control over formfill blocking, improved referrer
852
+spoofing based on the domain of the site (a-la <a
853
+href="https://addons.mozilla.org/en-US/firefox/addon/953">refcontrol extension</a>),
854
+tighter integration with Vidalia for reporting Tor status, a New Identity
855
+button with Tor integration and multiple identity management, and anything
856
+else you might think of.
857
+<br />
858
+This work would be independent coding in Javascript and the fun world of <a
859
+href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>,
860
+with not too much involvement in the Tor internals.
861
+</li>
862
+
863
+<li>
864
+<b>Porting Polipo to Windows</b>
865
+<br />
866
+Priority: <i>Medium</i>
867
+<br />
868
+Effort Level: <i>Medium</i>
869
+<br />
870
+Skill Level: <i>Medium to High</i>
871
+<br />
872
+Likely Mentors: <i>Andrew, Steven, Roger</i>
873
+<br />
874
+Help port <a
875
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to
876
+Windows. Example topics to tackle include:
877
+1) handle spaces in path names and understand the filesystem
878
+namespace &mdash; that is, where application data, personal data,
879
+and program data typically reside in various versions of Windows. 2) the
880
+ability to handle ipv6 communications. 3) the ability to asynchronously
881
+query name servers, find the system nameservers, and manage netbios
882
+and dns queries. 4) use native regex capabilities of Windows, rather
883
+than using 3rd party GNU regex libraries. 5) manage events and buffers
884
+natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in
885
+Windows it's whatever the config specifies). 6) some sort of GUI config
886
+and reporting tool, bonus if it has a systray icon with right clickable
887
+menu options. Double bonus if it's cross-platform compatible.
888
+</li>
889
+
890
+<li>
891
+<b>Make our diagrams beautiful and automated</b>
892
+<br />
893
+Priority: <i>Medium</i>
894
+<br />
895
+Effort Level: <i>Low</i>
896
+<br />
897
+Skill Level: <i>Low</i>
898
+<br />
899
+Likely Mentors: <i>Andrew</i>
900
+<br />
901
+We need a way to generate the website diagrams (for example, the "How
902
+Tor Works" pictures on the <a href="<page overview>">overview page</a>
903
+from source, so we can translate them as UTF-8 text rather than edit
904
+them by hand with Gimp. We might want to
905
+integrate this as an wml file so translations are easy and images are
906
+generated in multiple languages whenever we build the website. See the
907
+"Translation Wiki" idea above.
908
+</li>
909
+
910
+<li>
911
+<b>Improve the LiveCD offerings for the Tor community</b>
912
+<br />
913
+Priority: <i>Low</i>
914
+<br />
915
+Effort Level: <i>Low</i>
916
+<br />
917
+Skill Level: <i>Medium to High</i>
918
+<br />
919
+Likely Mentors: <i>Anonym, Jacob, Roger</i>
920
+<br />
921
+How can we make the <a
922
+href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a>
923
+easier to maintain, improve, and document?
924
+</li>
925
+
926
+<li>
927
+<b>Rework and extend Blossom</b>
928
+<br />
929
+Priority: <i>Medium</i>
930
+<br />
931
+Effort Level: <i>Medium to High</i>
932
+<br />
933
+Skill Level: <i>Medium to High</i>
934
+<br />
935
+Likely Mentors: <i>Goodell</i>
936
+<br />
937
+Rework and extend Blossom (a tool for monitoring and
938
+selecting appropriate Tor circuits based upon exit node requirements
939
+specified by the user) to gather data in a self-contained way, with
940
+parameters easily configurable by the user.  Blossom is presently
941
+implemented as a single Python script that interfaces with Tor using the
942
+Controller interface and depends upon metadata about Tor nodes obtained
943
+via external processes, such as a webpage indicating status of the nodes
944
+plus publically available data from DNS, whois, etc.  This project has
945
+two parts: (1) Determine which additional metadata may be useful and
946
+rework Blossom so that it cleanly obtains the metadata on its own rather
947
+than depend upon external scripts (this may, for example, involve
948
+additional threads or inter-process communication), and (2) develop a
949
+means by which the user can easily configure Blossom, starting with a
950
+configuration file and possibly working up to a web configuration engine.
951
+Knowledge of Tor and Python are important; knowledge of
952
+TCP, interprocess communication, and Perl will also be helpful.  An
953
+interest in network neutrality is important as well, since the
954
+principles of evaluating and understanding internet inconsistency are at
955
+the core of the Blossom effort.
956
+</li>
957
+
958
+<li>
959
+<b>Improve Blossom: Allow users to qualitatively describe exit nodes they desire</b>
960
+<br />
961
+Priority: <i>Low</i>
962
+<br />
963
+Effort Level: <i>Medium</i>
964
+<br />
965
+Skill Level: <i>Medium</i>
966
+<br />
967
+Likely Mentors: <i>Goodell</i>
968
+<br />
969
+Develop and implement a means of affording Blossom
970
+users the ability to qualitatively describe the exit node that they
971
+want.  The Internet is an inconsistent place: some Tor exit nodes see
972
+the world differently than others.  As presently implemented, Blossom (a
973
+tool for monitoring and selecting appropriate Tor circuits based upon
974
+exit node requirements specified by the user) lacks a sufficiently rich
975
+language to describe how the different vantage points are different.
976
+For example, some exit nodes may have an upstream network that filters
977
+certain kinds of traffic or certain websites.  Other exit nodes may
978
+provide access to special content as a result of their location, perhaps
979
+as a result of discrimination on the part of the content providers
980
+themselves.  This project has two parts: (1) develop a language for
981
+describing characteristics of networks in which exit nodes reside, and
982
+(2) incorporate this language into Blossom so that users can select Tor
983
+paths based upon the description.
984
+Knowledge of Tor and Python are important; knowledge of
985
+TCP, interprocess communication, and Perl will also be helpful.  An
986
+interest in network neutrality is important as well, since the
987
+principles of evaluating and understanding internet inconsistency are at
988
+the core of the Blossom effort.
989
+</li>
990
+
991
+<li>
992
+<b>Bring up new ideas!</b>
993
+<br />
994
+Don't like any of these? Look at the <a
995
+href="<svnsandbox>doc/design-paper/roadmap-future.pdf">Tor development
996
+roadmap</a> for more ideas.
997
+</li>
998
+
999
+</ol>
1000
+
125 1001
 <h2><a class="anchor" href="#Coding">Programmierung und Design</a></h2>
126 1002
 
127 1003
 <ol>
... ...
@@ -138,16 +1014,6 @@
138 1014
   <li>Wie k�nnen wir die <a
139 1015
   href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> leichter
140 1016
   zu warten, verbessern und zu dokumentieren machen?</li>
141
-  <li>Wir brauchen ein verteiltes Testger�st. Bisher haben wir Unittests. Es
142
-  w�re gro�artig, ein Skript zu haben, welches ein Tornetzwerk startet und dort
143
-  f�r einige Zeit testet, ob die Erneuerungen funktionieren.</li>
144
-  <li>Hilf Mike Perry bei der <a
145
-r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a
146
-  href="https://www.torproject.org/svn/torflow/TODO">TODO</a>). Es ist eine
147
-  Pythonbibliothek, die das <a
148
-  href="https://www.torproject.org/svn/torctl/doc/howto.txt">Tor Controller Protokoll
149
-  </a> nutzt, um mit Tor eine Vielzahl von Verbindungen zu schaffen, diese zu
150
-  messen und Anomalien festzustellen.</li>
151 1017
   <li>Wir sollten damit anfangen unser <a href="<page
152 1018
   documentation>#DesignDoc">gegen Blockierungen gesch�tztes Design</a> zu
153 1019
   implementieren. Dies beinhaltet die Ausarbeitung des Designs, die
... ...
@@ -230,6 +1096,39 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a
230 1096
     wahr? Wieviel Verkehr von welcher Sorte braucht man, um sicher zu
231 1097
     sicher, dass es funktioniert? Gibt es Szenarien, die die Attacke
232 1098
     ausbremsen? Funktioniert Padding besser als anderes?</li>
1099
+    <li>Eine verwandte Frage: Bringt der Betrieb eines Relays oder
1100
+  eines Br�ckenservers zus�tzlichen Schutz gegen Timingangriffe? Kann
1101
+  ein externer Angreifer individuelle Str�me erkennen, obwohl er nicht
1102
+  in die TLS-Str�me sehen kann? Hat die H�he des durchgeleiteten
1103
+  Verkehrs Einfluss? Was w�re, wenn der Client anderen Verkehr
1104
+  verlangsamt, um es so aussehen zu lassen, dass er auch
1105
+  weitergeleitet wird? Die selbe Queue k�nnte auch zur Maskierung der
1106
+  Timings mit Techniken von <a
1107
+  href="http://www.freehaven.net/anonbib/#ShWa-Timing06" >adaptivem
1108
+  Padding</a> genutzt werden, aber ohne zus�tzlich Traffic zu
1109
+  erzeugen. W�rde das das Timing f�r externe Angreifer verschleiern?
1110
+  M�ssten die Strategien f�r assymetrische Knoten angepasst werden?
1111
+  W�re es dort beispielsweise m�glich, den Clienttraffic von anderem
1112
+  zu unterscheiden? Oder ist das vielleicht f�r symmetrische
1113
+  Verbindungen leichter?</li>
1114
+  <li>Wiederhole die <a
1115
+  href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta"
1116
+  >Angriffe von Murdoch und Danezis von der Oakland 05</a> im
1117
+  aktuellen Tor-Netzwerk. Schaue, ob du herausfinden kannst, warum das
1118
+  bei einigen gut und bei anderen schlecht funktioniert. (Meine
1119
+  Theorie ist, dass schnelle Knoten mit Restkapazit�t dem Angriff
1120
+  besser widerstehen.) Wenn das wahr ist, experimentiere mit
1121
+  <var>RelayBandwidthRate</var> und
1122
+  <var>RelayBandwidthBurst</var>. Dabei betreibst du ein Relay,
1123
+  welches als Client genutzt wird, um den Verkehr des Angreifers
1124
+  weiterzuleiten. Was ist das richtige Verh�ltnis von
1125
+  <var>RelayBandwidthRate</var> zu aktueller Kapazit�t? Gibt es
1126
+  �berhaupt ein Verh�ltnis? Wenn wir dabei sind, erh�ht eine gro�e
1127
+  Zahl von Relays die Fehlerrate des Angriffs? (Das Tor-Netzwerk ist
1128
+  nun fast zwei Gr��enordnungen gewachsen, seit die Ver�ffentlichung
1129
+  geschrieben wurde.) Lies auf jeden Fall auch <a
1130
+  href="http://freehaven.net/anonbib/#clog-the-queue">Don't Clog the
1131
+  Queue</a>.</li>
233 1132
   <li>Die Attacke auf die Routingzonen ist der Netzpfad zwischen
234 1133
     Alice und dem Eingangsknoten (bzw. zwischen dem Exitknoten und
235 1134
     Bob). In der Literatur wird dies als einfache Verbindung auf
... ...
@@ -289,6 +1188,16 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a
289 1188
     href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship"
290 1189
     >die Zensurwiderstandssektion der AnonBib</a>.
291 1190
     </li>
1191
+    <li>Unsere Ziele zum Schutz vor Zensur schlie�en ein, dass ein
1192
+  Angreifer Tor-Verkehr von <a
1193
+  href="https://www.torproject.org/svn/trunk/doc/design-paper/blocking.html#sec:network-fingerprint">normalem
1194
+  SSL-Verkehr unterscheiden</a> kann. Offensichtlich k�nnen wir keine
1195
+  perfekte Steganographie erreichen und dabei benutzbar bleiben. Aber
1196
+  wir m�chten gern Angriffen, die nur wenige Pakete betrachten,
1197
+  �berwinden. Eine der verbliebenen Angriffe, die wir nicht sehr gepr�ft
1198
+  haben, ist das Verh�ltnis von der Gr��e der Tor-Zellen (512 Byte)
1199
+  zum restlichen Verkehr. Wieviel erkennt man davon, haben die
1200
+  Leerungsmechanismen der Buffer einen Einfluss, k�nnte Padding helfen?</li>
292 1201
   <li>Tor-Verbindungen werden schrittweise aufgebaut, ein Knoten nach
293 1202
     dem anderen.  Also haben wir theoretisch die M�glichkeit, manche
294 1203
     Str�me schon nach dem zweiten Knoten die Tor-Wolke verlassen zu
... ...
@@ -303,6 +1212,23 @@ r href="https://www.torproject.org/svn/torflow/">TorFlow</a>-Bibliothek (<a
303 1212
     richtige Anwort?  Welche anderen praktischen Herangehensweisen gibt es?
304 1213
     Bonuspunkte, wenn diese mit dem aktuellen Tor-Protokoll abw�rtskompatibel
305 1214
     sind.</li>
1215
+    <li>Programme, wie <a
1216
+  href="https://torbutton.torproject.org/dev/">Torbutton</a>,
1217
+  versuchen den User-Agent des Browsers zu verstecken, indem sie
1218
+  diesen durch eine gew�hnliche Angabe ersetzen. Dadurch kann ein
1219
+  Angreifer Tor-Nutzer nicht durch einen Blick auf die
1220
+  Nachrichtenk�pfe erkennen. Die Software versucht einen, allgemein
1221
+  genutzten Wert zu nehmen. Frage 1: Wie sehr schaden wir uns, wenn
1222
+  wir die Firefox-Version periodisch anpassen? Wenn wir zu oft
1223
+  updaten, kann man es unterscheiden. Machen wir es nicht, findet man
1224
+  Tor-Nutzer heraus, da sie sehr alte Versionen nutzen. Die Antwort
1225
+  h�ngt wahrscheinlich von den Firefox-Versionen, die es gibt,
1226
+  ab. Frage 2: Die Leute fragen immer wieder, zwischen n verschiedenen
1227
+  User-Agents zu wechseln. Hilft der Ansatz oder macht das keinen
1228
+  Unterschied? Betrachte dabei Cookies und Tor-Nutzer, die periodisch
1229
+  den User-Agent wechseln. B�sartige Webseiten greifen nur bestimmte
1230
+  Browser an. Wie beeinflussen die Antworten auf diese Fragen diese
1231
+  Antwort.</li>
306 1232
   </ol>
307 1233
 
308 1234
 <p><a href="<page contact>">Lass uns wissen</a>, wenn du bei einem
309 1235