Roger Dingledine commited on 2010-03-11 10:45:29
Zeige 1 geänderte Dateien mit 45 Einfügungen und 14 Löschungen.
| ... | ... |
@@ -72,7 +72,7 @@ people>#Core">core developers</a> would be good mentors. |
| 72 | 72 |
If one or more of these ideas looks promising to you, please <a |
| 73 | 73 |
href="<page contact>">contact us</a> to discuss your plans rather than |
| 74 | 74 |
sending blind applications. You may also want to propose your own project |
| 75 |
-idea which often results in the best applications. |
|
| 75 |
+idea — which often results in the best applications. |
|
| 76 | 76 |
</p> |
| 77 | 77 |
|
| 78 | 78 |
<ol> |
| ... | ... |
@@ -165,14 +165,14 @@ single address/port combination at a time. There's |
| 165 | 165 |
<a href="<gitblob>doc/spec/proposals/118-multiple-orports.txt">a |
| 166 | 166 |
proposal to address this limitation</a> and allow clients to connect |
| 167 | 167 |
to any given Tor on multiple addresses and ports, but it needs more |
| 168 |
-work. Another anti-censorship project is to try to make Tor |
|
| 169 |
-more scanning-resistant. Right now, an adversary can identify <a |
|
| 170 |
-href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a> |
|
| 171 |
-just by trying to connect to them, following the Tor protocol, |
|
| 172 |
-and seeing if they respond. To solve this, bridges could <a |
|
| 173 |
-href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like |
|
| 174 |
-webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools, |
|
| 175 |
-and not act like bridges until the user provides a bridge-specific key. |
|
| 168 |
+work. |
|
| 169 |
+<br /> |
|
| 170 |
+Another area that needs work is our <a |
|
| 171 |
+href="http://gitweb.torproject.org//bridgedb.git?a=tree">bridgedb</a> |
|
| 172 |
+service. See e.g. <a |
|
| 173 |
+href="http://archives.seul.org/or/dev/Dec-2009/msg00000.html">Roger's |
|
| 174 |
+or-dev post</a> from December for details — lots of design work |
|
| 175 |
+remains. |
|
| 176 | 176 |
<br /> |
| 177 | 177 |
This project involves a lot of research and design. One of the big |
| 178 | 178 |
challenges will be identifying and crafting approaches that can still |
| ... | ... |
@@ -290,7 +290,7 @@ Effort Level: <i>Medium</i> |
| 290 | 290 |
<br /> |
| 291 | 291 |
Skill Level: <i>Medium</i> |
| 292 | 292 |
<br /> |
| 293 |
-Likely Mentors: <i>Nick, Roger</i> |
|
| 293 |
+Likely Mentors: <i>Nick, Erinn</i> |
|
| 294 | 294 |
<br /> |
| 295 | 295 |
Tor needs to be far more tested. This is a multi-part effort. To start |
| 296 | 296 |
with, our unit test coverage should rise substantially, especially in |
| ... | ... |
@@ -317,7 +317,7 @@ Effort Level: <i>High</i> |
| 317 | 317 |
<br /> |
| 318 | 318 |
Skill Level: <i>Medium to High</i> |
| 319 | 319 |
<br /> |
| 320 |
-Likely Mentors: <i>Karsten, Nick</i> |
|
| 320 |
+Likely Mentors: <i>Bruce, Nathan</i> |
|
| 321 | 321 |
<br /> |
| 322 | 322 |
Others are currently working on Tor clients for Java, Android, and Maemo |
| 323 | 323 |
environments. The first step is to get a handle on the current state of |
| ... | ... |
@@ -336,7 +336,7 @@ when things are underdocumented. This project is mostly about coding and |
| 336 | 336 |
to a small degree about design. |
| 337 | 337 |
</li> |
| 338 | 338 |
|
| 339 |
-<li> |
|
| 339 |
+<!--<li> |
|
| 340 | 340 |
<b>New Torbutton Features</b> |
| 341 | 341 |
<br /> |
| 342 | 342 |
Priority: <i>Medium</i> |
| ... | ... |
@@ -368,7 +368,7 @@ features that could be added. |
| 368 | 368 |
This work would be independent coding in Javascript and the fun world of <a |
| 369 | 369 |
href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>, |
| 370 | 370 |
with not too much involvement in the Tor internals. |
| 371 |
-</li> |
|
| 371 |
+</li>--> |
|
| 372 | 372 |
|
| 373 | 373 |
<!-- <li> |
| 374 | 374 |
<b>New Thandy Features</b> |
| ... | ... |
@@ -535,6 +535,14 @@ and <a href="https://svn.torproject.org/svn/weather/trunk/TODO">TODO</a>. |
| 535 | 535 |
<li> |
| 536 | 536 |
<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b> |
| 537 | 537 |
<br /> |
| 538 |
+Priority: <i>Medium</i> |
|
| 539 |
+<br /> |
|
| 540 |
+Effort Level: <i>Medium</i> |
|
| 541 |
+<br /> |
|
| 542 |
+Skill Level: <i>Medium</i> |
|
| 543 |
+<br /> |
|
| 544 |
+Likely Mentors: <i>Erinn, Peter</i> |
|
| 545 |
+<br /> |
|
| 538 | 546 |
Vidalia currently doesn't play nicely on Debian and Ubuntu with the |
| 539 | 547 |
default Tor packages. The current Tor packages automatically start Tor |
| 540 | 548 |
as a daemon running as the debian-tor user and (sensibly) do not have a |
| ... | ... |
@@ -613,6 +621,14 @@ with others prior to implementation. |
| 613 | 621 |
<li> |
| 614 | 622 |
<b>Improving the Tor QA process: Continuous Integration for builds</b> |
| 615 | 623 |
<br /> |
| 624 |
+Priority: <i>Medium</i> |
|
| 625 |
+<br /> |
|
| 626 |
+Effort Level: <i>Medium</i> |
|
| 627 |
+<br /> |
|
| 628 |
+Skill Level: <i>Medium</i> |
|
| 629 |
+<br /> |
|
| 630 |
+Likely Mentors: <i>Erinn</i> |
|
| 631 |
+<br /> |
|
| 616 | 632 |
It would be useful to have automated build processes for Windows and |
| 617 | 633 |
probably other platforms. The purpose of having a continuous integration |
| 618 | 634 |
build environment is to ensure that Windows isn't left behind for any of |
| ... | ... |
@@ -723,7 +739,8 @@ or discarding one entirely. |
| 723 | 739 |
<br /> |
| 724 | 740 |
Don't like any of these? Look at the <a |
| 725 | 741 |
href="<gitblob>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development |
| 726 |
-roadmap</a> for more ideas. |
|
| 742 |
+roadmap</a> for more ideas, or just try out Tor, Vidalia, and Torbutton, |
|
| 743 |
+and find out what you think needs fixing. |
|
| 727 | 744 |
Some of the <a href="<gittree>doc/spec/proposals">current proposals</a> |
| 728 | 745 |
might also be short on developers. |
| 729 | 746 |
</li> |
| ... | ... |
@@ -797,6 +814,20 @@ to maintain, improve, and document? Some examples are <a |
| 797 | 814 |
href="http://amnesia.boum.org/">amnesia LiveCD/USB</a> and the <a |
| 798 | 815 |
href="http://anonymityanywhere.com/incognito/">Incognito LiveCD</a> |
| 799 | 816 |
</li> |
| 817 |
+ |
|
| 818 |
+<li> |
|
| 819 |
+Another anti-censorship project is to try to make Tor |
|
| 820 |
+more scanning-resistant. Right now, an adversary can identify <a |
|
| 821 |
+href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a> |
|
| 822 |
+just by trying to connect to them, following the Tor protocol, |
|
| 823 |
+and seeing if they respond. To solve this, bridges could <a |
|
| 824 |
+href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like |
|
| 825 |
+webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools, |
|
| 826 |
+and not act like bridges until the user provides a bridge-specific key. |
|
| 827 |
+To start, check out Shane Pope's <a |
|
| 828 |
+href="http://dl.dropbox.com/u/37735/index.html">thesis and prototype</a>. |
|
| 829 |
+</li> |
|
| 830 |
+ |
|
| 800 | 831 |
</ol> |
| 801 | 832 |
|
| 802 | 833 |
<a id="Research"></a> |
| 803 | 834 |