[or-cvs] remove a few things from the 0.1.2 todo, and add one
arma at seul.org
arma at seul.org
Tue May 30 05:05:52 UTC 2006
Update of /home/or/cvsroot/tor/doc
In directory moria:/tmp/cvs-serv23355
Modified Files:
TODO
Log Message:
remove a few things from the 0.1.2 todo, and add one
Index: TODO
===================================================================
RCS file: /home/or/cvsroot/tor/doc/TODO,v
retrieving revision 1.453
retrieving revision 1.454
diff -u -p -d -r1.453 -r1.454
--- TODO 23 May 2006 15:26:51 -0000 1.453
+++ TODO 30 May 2006 05:05:50 -0000 1.454
@@ -31,6 +31,7 @@ R - Server usability
- Write limiting; separate token bucket for write
- dir answers include a your-ip-address-is header, so we can
break our dependency on dyndns.
+ - "bandwidth classes", for incoming vs initiated-here conns.
N - Better hidden service performance, with possible redesign.
- Asynchronous DNS
- What to use? C-ares? Libdns? AGL's patch?
@@ -153,7 +154,6 @@ Minor items for 0.1.2.x as time permits.
R - Streamline how we define a guard node as 'up'. document it somewhere.
- Better installers and build processes.
- Commit edmanm's win32 makefile to tor cvs contrib, or write a new one.
- o Can we cross-compile?
R - Christian Grothoff's attack of infinite-length circuit.
the solution is to have a separate 'extend-data' cell type
which is used for the first N data cells, and only
@@ -202,12 +202,6 @@ N - Vet all pending installer patches
- unrecommend IE because of ftp:// bug.
- torrc.complete.in needs attention?
- - Bind to random port when making outgoing connections to Tor servers,
- to reduce remote sniping attacks.
- - Have new people be in limbo and need to demonstrate usefulness
- before we approve them.
- - Clients should estimate their skew as median of skew from servers
- over last N seconds.
- Security
- Alices avoid duplicate /24 servers.
- Analyze how bad the partitioning is or isn't.
@@ -231,15 +225,20 @@ N - Vet all pending installer patches
- Make it harder to circumvent bandwidth caps: look at number of bytes
sent across sockets, not number sent inside TLS stream.
- - Make router_is_general_exit() a bit smarter once we're sure what it's for.
+M - rewrite how libevent does select() on win32 so it's not so very slow.
- - rewrite how libevent does select() on win32 so it's not so very slow.
+Future version:
+ - Bind to random port when making outgoing connections to Tor servers,
+ to reduce remote sniping attacks.
+ - Have new people be in limbo and need to demonstrate usefulness
+ before we approve them.
+ - Clients should estimate their skew as median of skew from servers
+ over last N seconds.
+R - Make router_is_general_exit() a bit smarter once we're sure what it's for.
- Audit everything to make sure rend and intro points are just as likely to
be us as not.
- Do something to prevent spurious EXTEND cells from making middleman
nodes connect all over. Rate-limit failed connections, perhaps?
-
-Future version:
R - Automatically determine what ports are reachable and start using
those, if circuits aren't working and it's a pattern we recognize
("port 443 worked once and port 9001 keeps not working").
More information about the tor-commits
mailing list