[or-cvs] Flush more changes from sandbox
Nick Mathewson
nickm at seul.org
Wed Sep 8 06:52:35 UTC 2004
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv28436/doc
Modified Files:
TODO
Log Message:
Flush more changes from sandbox
- make clients cache directories and use them to seed their router lists
at startup. This means clients have a datadir again.
- Introduce a global_write_bucket. We need to respond better to exhausting
it.
- Remove the last vestiges of LinkPadding and TrafficShaping.
- Configuration infrastructure support for warning on obsolete options.
- Refactor directory header parsing to use smartlist_split_string.
- Respond to content-encoding headers by trying to uncompress as appropriate.
- Reply with a deflated directory when a client asks for "dir.z".
(We could use allow-encodings instead, but allow-encodings isn't
specified in HTTP 1.0.)
Index: TODO
===================================================================
RCS file: /home/or/cvsroot/doc/TODO,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -d -r1.157 -r1.158
--- TODO 21 Aug 2004 00:28:58 -0000 1.157
+++ TODO 8 Sep 2004 06:52:33 -0000 1.158
@@ -12,32 +12,46 @@
X Abandoned
0.0.9:
- - the user interface interface
- - let tor clients use http proxies for dir fetching
- - let tor servers use http proxies for port 80 exits
- - write instructions for port-forwarding directives or programs
+ o Fix OutboundBindAddress
+ o Config defaults should be consistant with config file and no
+ config file.
+ o write instructions for port-forwarding directives or programs
to let people run on ports 80 and 443 without needing to bind
tor to them.
- - learn from ben about his openssl-reinitialization-trick to
- rotate tls keys without making new connections.
- - figure out how to handle rendezvousing with unverified nodes.
- - clean up all the comma-separated stuff (eg exit policies) into
+ o clean up all the comma-separated stuff (eg exit policies) into
smartlists.
- - per-month byte allowances.
- - node 'groups' that are known to be in the same zone of control.
- - figure out enclaves, e.g. so we know what to recommend that people
+ o investigate sctp for alternate transport.
+ o Document all undocumented options, or mark them as undocumented
+ in the source.
+ o bandwidth buckets for write as well as read.
+ . Cached-directory changes:
+ o make clients store the cached-directory to disk,
+ o and use it when they startup, so they don't need to bootstrap
+ from the authdirservers every time they start.
+ - also, once we've reduced authdirserver entries to config
+ lines, we can have lines that list cacheddirservers too.
+ . compress the directory.
+ o Implement gzip/zlib wrappers
+ o Compress directories as they're cached/generated
+ o When requested, give a compressed directory.
+ o Decompress incoming HTTP based on Content-Encoding
+ - Once dirservers are running new code, make clients
+ request compressed directories. (Alternative: Switch
+ to HTTP/1.1 and use Allowed-Encoding. Is that really
+ what we want?)
+N - switch dirservers entries to config lines.
+N - let tor clients use http proxies for dir fetching
+N - per-month byte allowances.
+Nr - figure out how to handle rendezvousing with unverified nodes.
+Nr - figure out enclaves, e.g. so we know what to recommend that people
do, and so running a tor server on your website is helpful.
- - compress the directory.
- - switch dirservers entries to config lines.
- - investigate sctp for alternate transport.
- - nt services on win32.
- - bandwidth buckets for write as well as read.
- - make clients store the cached-directory to disk, and use it
- when they startup, so they don't need to bootstrap from the
- authdirservers every time they start. also, once we've reduced
- authdirserver entries to config lines, we can have lines that
- list cacheddirservers too.
+ - node 'groups' that are known to be in the same zone of control.
+ - let tor servers use http proxies for port 80 exits
+ - the user interface interface
- add ipv6 support.
+ - learn from ben about his openssl-reinitialization-trick to
+ rotate tls keys without making new connections.
+ D nt services on win32.
0.0.8:
- fix sprintf's to snprintf's?
@@ -94,6 +108,7 @@
- if destination IP is running a tor node, extend a circuit there
before sending begin.
* don't do this for now. figure out how enclaves work. but do enclaves soon.
+ - Track max ten-second b/w ever seen, to show operator
more features, complex:
- compress the directory. client sends http header
More information about the tor-commits
mailing list