[it] update volunteer tasks: delete and move old stuff, update GSOC2009, lots of items still in english untranslated. This is a frequently update page and most of the items require English reading after all.
Jan Reister

Jan Reister commited on 2009-05-05 16:39:08
Zeige 1 geänderte Dateien mit 567 Einfügungen und 220 Löschungen.

... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18815
2
+# Based-On-Revision: 19397
3 3
 # Last-Translator: jan at seul dot org
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: partecipa" CHARSET="UTF-8"
... ...
@@ -9,7 +9,7 @@
9 9
 <!-- PUT CONTENT AFTER THIS TAG -->
10 10
 <h2>Alcune cose che puoi fare subito:</h2>
11 11
 <ol>
12
-<li>Puoi <a href="<page docs/tor-doc-relay>">realizzare
12
+<li>Puoi <a href="<page docs/tor-doc-relay>">installare
13 13
 un relay</a> per aiutare a far crescere la rete Tor.</li>
14 14
 <li>Parla coi tuoi amici! Fagli realizzare un relay. Fagli aprire degli hidden
15 15
 services. Falli parlare di Tor coi loro amici.</li>
... ...
@@ -33,10 +33,6 @@ succede se l'applicazione esegue la risoluzione DNS prima di rivolgersi
33 33
 al proxy SOCKS.)</li>
34 34
 <li>Tsocks/dsocks:
35 35
 <ul>
36
-<li>C'&egrave; bisogno di <a
37
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TSocksPatches">applicare
38
-tutte le nostre patch a tsocks</a> e mantenerne un nuovo fork. Lo possiamo ospitare sul
39
-nostro server se vuoi.</li>
40 36
 <li>Bisognerebbe applicate le patch al programma "dsocks" di Dug Song in modo che usi
41 37
 i comandi <i>mapaddress</i> di Tor dall'interfaccia di controllo, cos&igrave;
42 38
 da non sprecare un intero ciclo in Tor per fare la risoluzione prima di
... ...
@@ -63,6 +59,15 @@ conseguenze ha per la privacy? Ci sono altre buone soluzioni?</li>
63 59
 
64 60
 </ol>
65 61
 
62
+<a id="Advocacy"></a>
63
+<h2><a class="anchor" href="#Advocacy">Divulgazione</a></h2>
64
+<ol>
65
+<li>Creare un logotipo sotto licenza Creative Commons che tutti possano usare e modificare</li>
66
+<li>Creare una presentazione utilizzabile nei vari incontri e convegni di utenti in giro per il mondo</li>
67
+<li>Creare un video sugli usi positivi di Tor. Ce ne sono gi&agrave; alcuni iniziati su Seesmic.</li>
68
+<li>Creare un poster, od una serie di posters, attorno ad un tema, come "Tor per la libert&agrave;!"</li>
69
+</ol>
70
+
66 71
 <a id="Documentation"></a>
67 72
 <h2><a class="anchor" href="#Documentation">Documentazione</a></h2>
68 73
 <ol>
... ...
@@ -93,14 +98,552 @@ Serve anche aiuto per correggere e migliorare questa traduzione italiana.</li>
93 98
 <h2><a class="anchor" href="#Projects">Progetti di siluppo software</a></h2>
94 99
 
95 100
 <p>
96
-Ecco una lista di idee proposte per il <a href="<page gsoc>">Google Summer of Code 2009</a>
97
-Anche alcuna delle <a href="<svnsandbox>doc/spec/proposals/">proposte correnti</a> 
98
-potrebbe aver bisogno di sviluppatori. Se pensi di potere dare una mano, <a href="<page contact>"> dillo!</a> 
101
+You may find some of these projects to be good <a href="<page
102
+gsoc>">Google Summer of Code 2009</a> ideas. We have labelled each idea
103
+with how useful it would be to the overall Tor project (priority), how
104
+much work we expect it would be (effort level), how much clue you should
105
+start with (skill level), and which of our <a href="<page
106
+people>#Core">core developers</a> would be good mentors.
107
+If one or more of these ideas looks promising to you, please <a
108
+href="<page contact>">contact us</a> to discuss your plans rather than
109
+sending blind applications. You may also want to propose your own project
110
+idea which often results in the best applications.
99 111
 </p>
100 112
 <p>
101 113
 (NdT: Le  schede di alcuni progetti sono in inglese e verranno tradotte man mano.)
102 114
 </p>
103 115
 <ol>
116
+
117
+<li>
118
+<b>Tor Browser Bundle for Linux/Mac OS X</b>
119
+<br />
120
+Priority: <i>High</i>
121
+<br />
122
+Effort Level: <i>High</i>
123
+<br />
124
+Skill Level: <i>Medium</i>
125
+<br />
126
+Likely Mentors: <i>Steven, Andrew</i>
127
+<br />
128
+The Tor Browser bundle incorporates Tor, Firefox, and the Vidalia user
129
+interface (and optionally Pidgin IM). Components are pre-configured to
130
+operate in a secure way, and it has very few dependencies on the
131
+installed operating system. It has therefore become one of the most
132
+easy to use, and popular, ways to use Tor on Windows.
133
+<br />
134
+However, there is currently no comparable package for Linux and Mac OS
135
+X, so this project would be to implement Tor Browser Bundle for these
136
+platforms. This will involve modifications to Vidalia (C++), possibly
137
+Firefox (C) then creating and testing the launcher on a range of
138
+operating system versions and configurations to verify portability.
139
+<br />
140
+Students should be familiar with application development on one or
141
+preferably both of Linux and Mac OS X, and be comfortable with C/C++
142
+and shell scripting.
143
+<br />
144
+Part of this project could be usability testing of Tor Browser Bundle,
145
+ideally amongst our target demographic.
146
+That would help a lot in knowing what needs to be done in terms of bug
147
+fixes or new features. We get this informally at the moment, but a more
148
+structured process would be better.
149
+</li>
150
+
151
+<li>
152
+<b>Translation wiki for our website</b>
153
+<br />
154
+Priority: <i>High</i>
155
+<br />
156
+Effort Level: <i>Medium</i>
157
+<br />
158
+Skill Level: <i>Medium</i>
159
+<br />
160
+Likely Mentors: <i>Jacob</i>
161
+<br />
162
+The Tor Project has been working over the past year to set up web-based
163
+tools to help volunteers translate our applications into other languages.
164
+We finally hit upon Pootle, and we have a fine web-based translation engine
165
+in place for Vidalia, Torbutton, and Torcheck. However, Pootle only
166
+translates strings that are in the "po" format, and our website uses wml
167
+files. This project is about finding a way to convert our wml files into po
168
+strings and back, so they can be handled by Pootle.
169
+</li>
170
+
171
+
172
+<li>
173
+<b>Help track the overall Tor Network status</b>
174
+<br />
175
+Priority: <i>Medium to High</i>
176
+<br />
177
+Effort Level: <i>Medium</i>
178
+<br />
179
+Skill Level: <i>Medium</i>
180
+<br />
181
+Likely Mentors: <i>Karsten, Roger</i>
182
+<br />
183
+It would be great to set up an automated system for tracking network
184
+health over time, graphing it, etc. Part of this project would involve
185
+inventing better metrics for assessing network health and growth. Is the
186
+average uptime of the network increasing? How many relays are qualifying
187
+for Guard status this month compared to last month? What's the turnover
188
+in terms of new relays showing up and relays shutting off? Periodically
189
+people collect brief snapshots, but where it gets really interesting is
190
+when we start tracking data points over time.
191
+<br />
192
+Data could be collected from the Tor Network Scanners in <a
193
+href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from
194
+the server descriptors that each relay publishes, and from other
195
+sources. Results over time could be integrated into one of the <a
196
+href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
197
+kept separate. Speaking of the Tor Status pages, take a look at Roger's
198
+<a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor
199
+Status wish list</a>.
200
+</li>
201
+
202
+<li>
203
+<b>Improving Tor's ability to resist censorship</b>
204
+<br />
205
+Priority: <i>Medium to High</i>
206
+<br />
207
+Effort Level: <i>Medium</i>
208
+<br />
209
+Skill Level: <i>High</i>
210
+<br />
211
+Likely Mentors: <i>Nick, Roger, Steven</i>
212
+<br />
213
+The Tor 0.2.0.x series makes <a
214
+href="<svnsandbox>doc/design-paper/blocking.html">significant
215
+improvements</a> in resisting national and organizational censorship.
216
+But Tor still needs better mechanisms for some parts of its
217
+anti-censorship design.  For example, current Tors can only listen on a
218
+single address/port combination at a time.  There's
219
+<a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a
220
+proposal to address this limitation</a> and allow clients to connect
221
+to any given Tor on multiple addresses and ports, but it needs more
222
+work.  Another anti-censorship project (far more difficult) is to try
223
+to make Tor more scanning-resistant.  Right now, an adversary can identify
224
+<a href="<svnsandbox>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
225
+just by trying to connect to them, following the Tor protocol, and
226
+seeing if they respond.  To solve this, bridges could
227
+<a href="<svnsandbox>doc/design-paper/blocking.html#tth_sEc9.3">act like
228
+webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
229
+and not act like bridges until the user provides a bridge-specific key.
230
+<br />
231
+This project involves a lot of research and design. One of the big
232
+challenges will be identifying and crafting approaches that can still
233
+resist an adversary even after the adversary knows the design, and
234
+then trading off censorship resistance with usability and robustness.
235
+</li>
236
+
237
+<li>
238
+<b>Tuneup Tor!</b>
239
+<br />
240
+Priority: <i>Medium to High</i>
241
+<br />
242
+Effort Level: <i>Medium to High</i>
243
+<br />
244
+Skill Level: <i>High</i>
245
+<br />
246
+Likely Mentors: <i>Nick, Roger, Mike, Karsten</i>
247
+<br />
248
+Right now, Tor relays measure and report their own bandwidth, and Tor
249
+clients choose which relays to use in part based on that bandwidth.
250
+This approach is vulnerable to
251
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
252
+relays lie about their bandwidth</a>;
253
+to address this, Tor currently caps the maximum bandwidth
254
+it's willing to believe any relay provides.  This is a limited fix, and
255
+a waste of bandwidth capacity to boot.  Instead,
256
+Tor should possibly measure bandwidth in a more distributed way, perhaps
257
+as described in the
258
+<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for
259
+Tor"</a> paper
260
+by Snader and Borisov. One could use current testing code to
261
+double-check this paper's findings and verify the extent to which they
262
+dovetail with Tor as deployed in the wild, and determine good ways to
263
+incorporate them into their suggestions Tor network without adding too
264
+much communications overhead between relays and directory
265
+authorities.
266
+</li>
267
+ 
268
+<li>
269
+<b>Improving Polipo on Windows</b>
270
+<br />
271
+Priority: <i>Medium to High</i>
272
+<br />
273
+Effort Level: <i>Medium</i>
274
+<br />
275
+Skill Level: <i>Medium</i>
276
+<br />
277
+Likely Mentors: <i>Martin</i>
278
+<br />
279
+Help port <a
280
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to
281
+Windows. Example topics to tackle include:
282
+1) the ability to asynchronously
283
+query name servers, find the system nameservers, and manage netbios
284
+and dns queries.
285
+2) manage events and buffers
286
+natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in
287
+Windows it's whatever the config specifies). 3) some sort of GUI config
288
+and reporting tool, bonus if it has a systray icon with right clickable
289
+menu options. Double bonus if it's cross-platform compatible.
290
+4) allow the software to use the Windows Registry and handle proper
291
+Windows directory locations, such as "C:\Program Files\Polipo"
292
+</li>
293
+
294
+<li>
295
+<b>Implement a torrent-based scheme for downloading Thandy packages</b>
296
+<br />
297
+Priority: <i>Medium to High</i>
298
+<br />
299
+Effort Level: <i>High</i>
300
+<br />
301
+Skill Level: <i>Medium to High</i>
302
+<br />
303
+Likely Mentors: <i>Martin, Nick</i>
304
+<br />
305
+<a
306
+href="http://git.torproject.org/checkout/thandy/master/specs/thandy-spec.txt">Thandy</a>
307
+is a relatively new software to allow assisted updates of Tor and related
308
+software. Currently, there are very few users, but we expect Thandy to be
309
+used by almost every Tor user in the future. To avoid crashing servers on
310
+the day of a Tor update, we need new ways to distribute new packages
311
+efficiently, and using libtorrent seems to be a possible solution. If you
312
+think of other good ideas, great - please do let us know!<br />
313
+We also need to investigate how to include our mirrors better. If possible,
314
+there should be an easy way for them to help distributing the packages.
315
+</li>
316
+
317
+<li>
318
+<b>Tor Controller Status Event Interface</b>
319
+<br />
320
+Priority: <i>Medium</i>
321
+<br />
322
+Effort Level: <i>Medium</i>
323
+<br />
324
+Skill Level: <i>Low to Medium</i>
325
+<br />
326
+Likely Mentors: <i>Matt</i>
327
+<br />
328
+There are a number of status changes inside Tor of which the user may need
329
+to be informed. For example, if the user is trying to set up his Tor as a
330
+relay and Tor decides that its ports are not reachable from outside
331
+the user's network, we should alert the user. Currently, all the user
332
+gets is a couple log messages in Vidalia's 'message log' window, which they
333
+likely never see since they don't receive a notification that something
334
+has gone wrong. Even if the user does actually look at the message log,
335
+most of the messages make little sense to the novice user.
336
+<br />
337
+Tor has the ability to inform Vidalia of many such status changes, and
338
+we recently implemented support for a couple of these events. Still,
339
+there are many more status events the user should be informed of and we
340
+need a better UI for actually displaying them to the user.
341
+<br />
342
+The goal of this project then is to design and implement a UI for
343
+displaying Tor status events to the user. For example, we might put a
344
+little badge on Vidalia's tray icon that alerts the user to new status
345
+events they should look at. Double-clicking the icon could bring up a
346
+dialog that summarizes recent status events in simple terms and maybe
347
+suggests a remedy for any negative events if they can be corrected by
348
+the user. Of course, this is just an example and one is free to
349
+suggest another approach.
350
+<br />
351
+A person undertaking this project should have good UI design and layout
352
+and some C++ development experience. Previous experience with Qt and
353
+Qt's Designer will be very helpful, but are not required. Some
354
+English writing ability will also be useful, since this project will
355
+likely involve writing small amounts of help documentation that should
356
+be understandable by non-technical users. Bonus points for some graphic
357
+design/Photoshop fu, since we might want/need some shiny new icons too.
358
+</li>
359
+ 
360
+<li>
361
+<b>Improve our unit testing process</b>
362
+<br />
363
+Priority: <i>Medium</i>
364
+<br />
365
+Effort Level: <i>Medium</i>
366
+<br />
367
+Skill Level: <i>Medium</i>
368
+<br />
369
+Likely Mentors: <i>Nick, Roger</i>
370
+<br />
371
+Tor needs to be far more tested. This is a multi-part effort. To start
372
+with, our unit test coverage should rise substantially, especially in
373
+the areas outside the utility functions. This will require significant
374
+refactoring of some parts of Tor, in order to dissociate as much logic
375
+as possible from globals.
376
+<br />
377
+Additionally, we need to automate our performance testing. We've got
378
+buildbot to automate our regular integration and compile testing already
379
+(though we need somebody to set it up on Windows),
380
+but we need to get our network simulation tests (as built in <a
381
+href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>)
382
+updated for more recent versions of Tor, and designed to launch a test
383
+network either on a single machine, or across several, so we can test
384
+changes in performance on machines in different roles automatically.
385
+</li>
386
+
387
+<li>
388
+<b>Help revive an independent Tor client implementation</b>
389
+<br />
390
+Priority: <i>Medium</i>
391
+<br />
392
+Effort Level: <i>High</i>
393
+<br />
394
+Skill Level: <i>Medium to High</i>
395
+<br />
396
+Likely Mentors: <i>Karsten, Nick</i>
397
+<br />
398
+Reanimate one of the approaches to implement a Tor client in Java,
399
+e.g. the <a href="http://onioncoffee.sourceforge.net/">OnionCoffee
400
+project</a>, and make it run on <a
401
+href="http://code.google.com/android/">Android</a>. The first step
402
+would be to port the existing code and execute it in an Android
403
+environment. Next, the code should be updated to support the newer Tor
404
+protocol versions like the <a href="<svnsandbox>doc/spec/dir-spec.txt">v3
405
+directory protocol</a>. Further, support for requesting or even
406
+providing Tor hidden services would be neat, but not required.
407
+<br />
408
+A prospective developer should be able to understand and write new Java
409
+code, including
410
+a Java cryptography API. Being able to read C code would be helpful,
411
+too. One should be willing to read the existing documentation,
412
+implement code based on it, and refine the documentation
413
+when things are underdocumented. This project is mostly about coding and
414
+to a small degree about design.
415
+</li>
416
+
417
+<li>
418
+<b>New Torbutton Features</b>
419
+<br />
420
+Priority: <i>Medium</i>
421
+<br />
422
+Effort Level: <i>High</i>
423
+<br />
424
+Skill Level: <i>High</i>
425
+<br />
426
+Likely Mentors: <i>Mike</i>
427
+<br/>
428
+There are several <a
429
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5&amp;type=2">good
430
+feature requests</a> on the Torbutton Flyspray section. In particular, <a
431
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=523">Integrating
432
+'New Identity' with Vidalia</a>,
433
+<a href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=940">ways of
434
+managing multiple cookie jars/identities</a>, <a
435
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=637">preserving
436
+specific cookies</a> when cookies are cleared,
437
+<a
438
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=524">better
439
+referrer spoofing</a>, <a
440
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=564">correct
441
+Tor status reporting</a>, and <a
442
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=462">"tor://"
443
+and "tors://" urls</a> are all interesting
444
+features that could be added.
445
+<br />
446
+This work would be independent coding in Javascript and the fun world of <a
447
+href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>,
448
+with not too much involvement in the Tor internals.
449
+</li>
450
+
451
+<li>
452
+<b>New Thandy Features</b>
453
+<br />
454
+Priority: <i>Medium</i>
455
+<br />
456
+Effort Level: <i>Medium</i>
457
+<br />
458
+Skill Level: <i>Medium to High</i>
459
+<br />
460
+Likely Mentors: <i>Martin</i>
461
+<br />
462
+Additional capabilities are needed for assisted updates of all the Tor
463
+related software for Windows and other operating systems. Some of the
464
+features to consider include:
465
+1) Integration of the <a
466
+href="http://chandlerproject.org/Projects/MeTooCrypto">MeTooCrypto
467
+Python library</a>
468
+for authenticated HTTPS downloads. 2) Adding a level of indirection
469
+between the timestamp signatures and the package files included in an
470
+update. See the "Thandy attacks / suggestions" thread on or-dev.
471
+3) Support locale specific installation and configuration of assisted
472
+updates based on preference, host, or user account language settings.
473
+Familiarity with Windows codepages, unicode, and other character sets
474
+is helpful in addition to general win32 and posix API experience and
475
+Python proficiency.
476
+</li>
477
+
478
+<li>
479
+<b>Simulator for slow Internet connections</b>
480
+<br />
481
+Priority: <i>Medium</i>
482
+<br />
483
+Effort Level: <i>Medium</i>
484
+<br />
485
+Skill Level: <i>Medium</i>
486
+<br />
487
+Likely Mentors: <i>Steven</i>
488
+<br />
489
+Many users of Tor have poor-quality Internet connections, giving low
490
+bandwidth, high latency, and high packet loss/re-ordering. User
491
+experience is that Tor reacts badly to these conditions, but it is
492
+difficult to improve the situation without being able to repeat the
493
+problems in the lab.
494
+<br />
495
+This project would be to build a simulation environment which
496
+replicates the poor connectivity so that the effect on Tor performance
497
+can be measured. Other components would be a testing utility to
498
+establish what are the properties of connections available, and to
499
+measure the effect of performance-improving modifications to Tor.
500
+<br />
501
+The tools used would be up to the student, but dummynet (for FreeBSD)
502
+and nistnet (for Linux) are two potential components on which this
503
+project could be built. Students should be experienced with network
504
+programming/debugging and TCP/IP, and preferably familiar with C and a
505
+scripting language.
506
+</li>
507
+ 
508
+<li>
509
+<b>An Improved and More Usable Network Map in Vidalia</b>
510
+<br />
511
+Priority: <i>Low to Medium</i>
512
+<br />
513
+Effort Level: <i>Medium</i>
514
+<br />
515
+Skill Level: <i>Medium</i>
516
+<br />
517
+Likely Mentors: <i>Matt</i>
518
+<br />
519
+One of Vidalia's existing features is a network map that shows the user
520
+the approximate geographic location of relays in the Tor network and
521
+plots the paths the user's traffic takes as it is tunneled through the
522
+Tor network. The map is currently not very interactive and has rather
523
+poor graphics. Instead, we implemented KDE's Marble widget such
524
+that it gives us a better quality map and enables improved interactivity,
525
+such as allowing the user to click on individual relays or circuits to
526
+display additional information. We want to add the ability
527
+for users to click on a particular relay or a country containing one or
528
+more Tor exit relays and say, "I want my connections to exit
529
+from here."
530
+<br />
531
+This project will first involve getting familiar with Vidalia
532
+and the Marble widget's API. One will then integrate the widget
533
+into Vidalia and customize Marble to be better suited for our application,
534
+such as making circuits clickable, storing cached map data in Vidalia's
535
+own data directory, and customizing some of the widget's dialogs.
536
+<br />
537
+A person undertaking this project should have good C++ development
538
+experience. Previous experience with Qt and CMake is helpful, but not
539
+required.
540
+</li>
541
+
542
+<li>
543
+<b>Bring moniTor to life</b>
544
+<br />
545
+Priority: <i>Low</i>
546
+<br />
547
+Effort Level: <i>Medium</i>
548
+<br />
549
+Skill Level: <i>Low to Medium</i>
550
+<br />
551
+Likely Mentors: <i>Karsten, Jacob</i>
552
+<br />
553
+Implement a <a href="http://www.ss64.com/bash/top.html">top-like</a>
554
+management tool for Tor relays. The purpose of such a tool would be
555
+to monitor a local Tor relay via its control port and include useful
556
+system information of the underlying machine. When running this tool, it
557
+would dynamically update its content like top does for Linux processes.
558
+<a href="http://archives.seul.org/or/dev/Jan-2008/msg00005.html">This
559
+or-dev post</a> might be a good first read.
560
+<br />
561
+A person interested in this should be familiar
562
+with or willing to learn about administering a Tor relay and configuring
563
+it via its control port. As an initial prototype is written in Python,
564
+some knowledge about writing Python code would be helpful, too. This
565
+project is one part about identifying requirements to such a
566
+tool and designing its interface, and one part lots of coding.
567
+</li>
568
+
569
+<li>
570
+<b>Torbutton equivalent for Thunderbird</b>
571
+<br />
572
+Priority: <i>Low</i>
573
+<br />
574
+Effort Level: <i>High</i>
575
+<br />
576
+Skill Level: <i>High</i>
577
+<br />
578
+Likely Mentors: <i>Mike</i>
579
+<br />
580
+We're hearing from an increasing number of users that they want to use
581
+Thunderbird with Tor. However, there are plenty of application-level
582
+concerns, for example, by default Thunderbird will put your hostname in
583
+the outgoing mail that it sends. At some point we should start a new
584
+push to build a Thunderbird extension similar to Torbutton.
585
+</li>
586
+
587
+<li>
588
+<b>Intermediate Level Network Device Driver</b>
589
+<br />
590
+Priority: <i>Low</i>
591
+<br />
592
+Effort Level: <i>High</i>
593
+<br />
594
+Skill Level: <i>High</i>
595
+<br />
596
+Likely Mentors: <i>Martin</i>
597
+<br />
598
+The WinPCAP device driver used by Tor VM for bridged networking does
599
+not support a number of wireless and non-Ethernet network adapters.
600
+Implementation of a intermediate level network device driver for win32
601
+and 64bit would provide a way to intercept and route traffic over such
602
+networks. This project will require knowledge of and experience with
603
+Windows kernel device driver development and testing. Familiarity with
604
+Winsock and Qemu would also be helpful.
605
+</li>
606
+
607
+<li>
608
+<b>Improve Tor Weather</b>
609
+<br />
610
+Priority: <i>Medium</i>
611
+<br />
612
+Effort Level: <i>Medium</i>
613
+<br />
614
+Skill Level: <i>Medium</i>
615
+<br />
616
+Likely Mentors: <i>Jake, Roger</i>
617
+<br />
618
+<a href="https://weather.torproject.org/">Tor weather</a> is a tool
619
+that allows signing up to receive notifications via email when the
620
+tracked Tor relay is down. Currently, it isn't really useful for
621
+people who use the hibernation feature of Tor, or for those who
622
+have to shut down their relay regularly. During the project, Tor
623
+weather could be extended to allow more flexible configurations.
624
+Other enhancements are also possible: Weather could send out warnings
625
+when your relay runs an out-of-date version of Tor, or when its
626
+observed bandwith drops below a certain value. It might also be a
627
+nice tool that allows for checking whether your relay has earned
628
+you a <a href="<page tshirt>">T-Shirt</a>, or sending reminders to
629
+directory authorities that
630
+their keys are about to expire. Be creative, and consider how the
631
+above project to track overall network status can help you get your job
632
+done more quickly! See also its
633
+<a href="https://svn.torproject.org/svn/weather/trunk/README">README</a>
634
+and <a href="https://svn.torproject.org/svn/weather/trunk/TODO">TODO</a>.
635
+</li>
636
+
637
+<li>
638
+<b>Bring up new ideas!</b>
639
+<br />
640
+Don't like any of these? Look at the <a
641
+href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
642
+roadmap</a> for more ideas.
643
+Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a>
644
+might also be short on developers.
645
+</li>
646
+
104 647
 <!-- Mike is already working on this.
105 648
 <li>Tor Node Scanner improvements</b>
106 649
 <br />
... ...
@@ -128,26 +671,6 @@ the Directory Authorities, but a communication channel for this
128 671
 currently does not exist and would need to be developed as well.
129 672
 </li>
130 673
 -->
131
-<li>
132
-<b>Help track the overall Tor Network status</b>
133
-<br />
134
-It would be great to set up an automated system for tracking network
135
-health over time, graphing it, etc. Part of this project would involve
136
-inventing better metrics for assessing network health and growth. Is the
137
-average uptime of the network increasing? How many relays are qualifying
138
-for Guard status this month compared to last month? What's the turnover
139
-in terms of new relays showing up and relays shutting off? Periodically
140
-people collect brief snapshots, but where it gets really interesting is
141
-when we start tracking data points over time.
142
-<br />
143
-Data could be collected from the "Tor Node Scanner" item above, from
144
-the server descriptors that each relay publishes, and from other
145
-sources. Results over time could be integrated into one of the <a
146
-href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
147
-kept separate. Speaking of the Tor Status pages, take a look at Roger's
148
-<a href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">Tor
149
-Status wish list</a>.
150
-</li>
151 674
 
152 675
 <!-- Is this still a useful project? If so, move it to another section.
153 676
 <li>
... ...
@@ -195,32 +718,6 @@ ma non obbligatoria, dell'esperienza con Qt.
195 718
 </li>
196 719
 
197 720
 -->
198
-<li>
199
-<b>Improving Tor's ability to resist censorship</b>
200
-<br />
201
-The Tor 0.2.0.x series makes <a
202
-href="<svnsandbox>doc/design-paper/blocking.html">significant
203
-improvements</a> in resisting national and organizational censorship.
204
-But Tor still needs better mechanisms for some parts of its
205
-anti-censorship design.  For example, current Tors can only listen on a
206
-single address/port combination at a time.  There's
207
-<a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a
208
-proposal to address this limitation</a> and allow clients to connect
209
-to any given Tor on multiple addresses and ports, but it needs more
210
-work.  Another anti-censorship project (far more difficult) is to try
211
-to make Tor more scanning-resistant.  Right now, an adversary can identify
212
-<a href="<svnsandbox>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
213
-just by trying to connect to them, following the Tor protocol, and 
214
-seeing if they respond.  To solve this, bridges could
215
-<a href="<svnsandbox>doc/design-paper/blocking.html#tth_sEc9.3">act like
216
-webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
217
-and not act like bridges until the user provides a bridge-specific key.
218
-<br />
219
-This project involves a lot of research and design. One of the big
220
-challenges will be identifying and crafting approaches that can still
221
-resist an adversary even after the adversary knows the design, and
222
-then trading off censorship resistance with usability and robustness.
223
-</li>
224 721
 
225 722
 <!-- This should be mostly done.
226 723
 <li>
... ...
@@ -258,68 +755,7 @@ prima della realizzazione.
258 755
 </li>
259 756
 -->
260 757
 
261
-<!-- Matt already made good progress on this.
262
-<li>
263
-<b>Una Network Map per Vidalia migliore e pi&ugrave; usabile</b>
264
-<br />
265
-Vidalia ha una carta della rete che mostra all'utente la posizione
266
-geografica approssimata dei nodi nella rete Tor e che
267
-disegna il percorso del traffico dell'utente attraverso i tunnel stabiliti nella
268
-rete Tor. The mappa per ora non &egrave; molto interattiva ed ha una grafica
269
-spartana. Ci piacerebbe usare il widget KDE Marble che
270
-crea mappe di miglior qualit&agrave; ed offre maggior einterattivit&agrave;,
271
-permettendo all'utente di fare clic su singoli nodi o circuiti per ottenere
272
-maggiori informazioni. Potremmo anche permettere all'utente di fare
273
-clic su un particolare nodo o su un paese contenente uno o pi&ugrave;
274
-Tor exit relay e dire, ad esempio: "Voglio che le mie connessioni a pippo.com
275
-escano da qui."
276
-<br />
277
-Questo progetto richiede anzitutto di familiarizzarsi con Vidalia
278
-e le API del widget Marble. Si integrer&agrave; poi il widget
279
-in Vidalia e personalizzer&agrave; Marble per adattarlo meglio ai nostri bisogni,
280
-ad esempio rendendo cliccabili i circuiti, memorizzando i dati di cache nella
281
-data directory di Vidalia, e personalizzando alcuni messaggi di dialogo del widget.
282
-<br />
283
-Le persone impegnate in questo progettp devono avere una buona esperienza
284
-di sviluppo C++. Utile, ma non obbligatorio, avere avuto esperienza con Qt e
285
-Cmake.
286
-</li>
287
--->
288 758
 
289
-<li>
290
-<b>Tor Controller Status Event Interface</b>
291
-<br />
292
-Vi sono numerosi cambiamenti di stato in Tor, di cui l'utente dovrebbe venire
293
-informato. Ad esempio, se l'utente vuol trasformare Tor in un
294
-relay e Tor decide che le sue porte non sono raggiungibili dall'esterno
295
-della rete dell'utente, l'utente dovrebbe venire avvertito. Adesso tutto quello che l'utente
296
-riceve sono un paio di messaggi nella finestra'message log' di Vidalia, che 
297
-probabilmente non viene mai letta dato che non viene mai ricevuta un avviso
298
-che qualcosa &egrave; andato storto. Anche se l'utente si leggesse il message log,
299
-la maggior parte dei messaggi sarebbe poco utile ad un utente inesperto.
300
-<br />
301
-Tor pu&ograve; informare Vidalia di vari cambiamenti di stato e da poco
302
-abbiamo realizzato il supporto per alcuni di questi eventi. Rimangono ancora
303
-molti altri eventi di stato di cui si dovrebbe informare l'utente e serve
304
-una interfaccia utente migliore per mostrarli.
305
-<br />
306
-Lo scopo di questo progetto &egrave; quindi il disegno e la realizzazione di una interfaccia utente
307
-per mostrare gli eventi di stato Tor all'utente. Ad esempio con una piccola
308
-etichetta sull'icona di stato di Vidalia, per avvertire l'utente di nuovi
309
-eventi di stato da controllare. Un doppio clic sull'icona dovrebbe far comparire 
310
-una finsetra di dialogo con un sommario in termini comprensibili degli eventi recenti
311
-e magari con un suggerimento per risolvere gli eventi negativi su cui l'utente
312
-pu&ograve; intervenire. Questo &egrave; comunque solo un esempio e si &egrave;
313
-completamente liberi di suggerire un approccio differente.
314
-<br />
315
-Le persone interessate a questo progetto dovrebbero avere una buona esperienza nel design e layout di interfacce utente
316
-e qualche esperienza di programmazione in C++. Esperienze con Qt e con
317
-il designer di Qt sono utilissime, ma non obbligatorie. Utile anche
318
-la capaciti&agrave; di comunicazione scritta in inglese, dato che il progetto
319
-probabilmente implicher&agrave; di scrivere una documentazione minima di aiuto
320
-comprensibile per degli utenti non tecnici. Molto apprezzate le capacit&agrave; di
321
-design, grafica, Photoshop dato che potremmo anche avere bisogno di nuove icone.
322
-</li>
323 759
 
324 760
 <!-- Jake already did most of this.
325 761
 <li>
... ...
@@ -412,28 +848,6 @@ Also tricky will be adding rate-limiting to Libevent.
412 848
 </li>
413 849
 -->
414 850
 
415
-<li>
416
-<b>Tuneup Tor!</b>
417
-<br />
418
-Right now, Tor relays measure and report their own bandwidth, and Tor
419
-clients choose which relays to use in part based on that bandwidth.
420
-This approach is vulnerable to
421
-<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
422
-relays lie about their bandwidth</a>;
423
-to address this, Tor currently caps the maximum bandwidth
424
-it's willing to believe any relay provides.  This is a limited fix, and
425
-a waste of bandwidth capacity to boot.  Instead,
426
-Tor should possibly measure bandwidth in a more distributed way, perhaps
427
-as described in the
428
-<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for
429
-Tor"</a> paper
430
-by Snader and Borisov. One could use current testing code to
431
-double-check this paper's findings and verify the extent to which they
432
-dovetail with Tor as deployed in the wild, and determine good ways to
433
-incorporate them into their suggestions Tor network without adding too
434
-much communications overhead between relays and directory
435
-authorities.
436
-</li>
437 851
 
438 852
 <!--
439 853
 <li>
... ...
@@ -465,64 +879,6 @@ changes in performance on machines in different roles automatically.
465 879
 </li>
466 880
 -->
467 881
 
468
-<li>
469
-<b>Improve our unit testing process</b>
470
-<br />
471
-Tor needs to be far more tested. This is a multi-part effort. To start
472
-with, our unit test coverage should rise substantially, especially in
473
-the areas outside the utility functions. This will require significant
474
-refactoring of some parts of Tor, in order to dissociate as much logic
475
-as possible from globals.
476
-<br />
477
-Additionally, we need to automate our performance testing. We've got
478
-buildbot to automate our regular integration and compile testing already
479
-(though we need somebody to set it up on Windows),
480
-but we need to get our network simulation tests (as built in TorFlow: see
481
-the "Tor Node Scanner improvements" item)
482
-updated for more recent versions of Tor, and designed to launch a test
483
-network either on a single machine, or across several, so we can test
484
-changes in performance on machines in different roles automatically.
485
-</li>
486
- 
487
-<li>
488
-<b>Help revive an independent Tor client implementation</b>
489
-<br />
490
-Reanimate one of the approaches to implement a Tor client in Java,
491
-e.g. the <a href="http://onioncoffee.sourceforge.net/">OnionCoffee
492
-project</a>, and make it run on <a
493
-href="http://code.google.com/android/">Android</a>. The first step
494
-would be to port the existing code and execute it in an Android
495
-environment. Next, the code should be updated to support the newer Tor
496
-protocol versions like the <a href="<svnsandbox>doc/spec/dir-spec.txt">v3
497
-directory protocol</a>. Further, support for requesting or even
498
-providing Tor hidden services would be neat, but not required.
499
-<br />
500
-A prospective developer should be able to understand and write new Java code, including
501
-a Java cryptography API. Being able to read C code would be helpful,
502
-too. One should be willing to read the existing documentation,
503
-implement code based on it, and refine the documentation
504
-when things are underdocumented. This project is mostly about coding and
505
-to a small degree about design.
506
-</li>
507
-
508
-<li>
509
-<b>Bring moniTor to life</b>
510
-<br />
511
-Implement a <a href="http://www.ss64.com/bash/top.html">top-like</a>
512
-management tool for Tor relays. The purpose of such a tool would be
513
-to monitor a local Tor relay via its control port and include useful
514
-system information of the underlying machine. When running this tool, it
515
-would dynamically update its content like top does for Linux processes.
516
-<a href="http://archives.seul.org/or/dev/Jan-2008/msg00005.html">This
517
-or-dev post</a> might be a good first read.
518
-<br />
519
-A person interested in this should be familiar
520
-with or willing to learn about administering a Tor relay and configuring
521
-it via its control port. As an initial prototype is written in Python,
522
-some knowledge about writing Python code would be helpful, too. This
523
-project is one part about identifying requirements to such a
524
-tool and designing its interface, and one part lots of coding.
525
-</li>
526 882
 
527 883
 <!-- Removed, unless Mike still wants this to be in.
528 884
 <li>
... ...
@@ -545,24 +901,6 @@ with not too much involvement in the Tor internals.
545 901
 </li>
546 902
 -->
547 903
 
548
-<li>
549
-<b>Porting Polipo to Windows</b>
550
-<br />
551
-Help port <a
552
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to
553
-Windows. Example topics to tackle include:
554
-1) handle spaces in path names and understand the filesystem
555
-namespace &mdash; that is, where application data, personal data,
556
-and program data typically reside in various versions of Windows. 2) the
557
-ability to handle ipv6 communications. 3) the ability to asynchronously
558
-query name servers, find the system nameservers, and manage netbios
559
-and dns queries. 4) use native regex capabilities of Windows, rather
560
-than using 3rd party GNU regex libraries. 5) manage events and buffers
561
-natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in
562
-Windows it's whatever the config specifies). 6) some sort of GUI config
563
-and reporting tool, bonus if it has a systray icon with right clickable
564
-menu options. Double bonus if it's cross-platform compatible.
565
-</li>
566 904
 
567 905
 <!-- Is Blossom development still happening?
568 906
 <li>
... ...
@@ -615,12 +953,22 @@ the core of the Blossom effort.
615 953
 </li>
616 954
 -->
617 955
 
956
+<!-- not really suited for GSoC; integrated into TBB for Linux/Mac OS X
618 957
 <li>
619
-<b>Contribuisci con delle nuove idee!</b>
958
+<b>Usability testing of Tor</b>
620 959
 <br />
621
-Nessuna di queste proposte ti piace? Dai un'occhiata alla <a
622
-href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
623
-roadmap</a> per avere altri spunti.
960
+Priority: <i>Medium</i>
961
+<br />
962
+Effort Level: <i>Medium</i>
963
+<br />
964
+Skill Level: <i>Low to Medium</i>
965
+<br />
966
+Likely Mentors: <i>Andrew</i>
967
+<br />
968
+Especially the browser bundle, ideally amongst our target demographic.
969
+That would help a lot in knowing what needs to be done in terms of bug
970
+fixes or new features. We get this informally at the moment, but a more
971
+structured process would be better.
624 972
 </li>
625 973
 
626 974
 </ol>
... ...
@@ -658,8 +1006,7 @@ maggior dettagli sulla ricerca in questo campo &mdash; chiss&agrave; forse al
658 1006
 termine  potresti scrivere qualche paper sull'argomento.</li>
659 1007
 
660 1008
 <li>Tor 0.1.1.x e successivi includono il supporto per acceleratori crittografici hardware
661
-tramite OpenSSL. Nessuno tuttavia lo ha ancora testato. C'&egrave; qualcuno che vuole
662
-prendere una scheda e farci sapere come va?</li>
1009
+tramite OpenSSL. &Egrave; stato testato leggermente ed &egrave; verosimilmente pieno di bachi. Cerchiamo test pi&ugrave; rigorosi, analisi delle prestazioni e, idealmente, modifiche al codice di OpenSSL e Tor se necessario.</li>
663 1010
 
664 1011
 <li>Effettuare una analisi di sicurezza di Tor con <a
665 1012
 href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determinare
666 1013