[or-cvs] r12675: move the december feature list up into the 0.2.0 section of (tor/trunk/doc)

arma at seul.org arma at seul.org
Wed Dec 5 05:46:52 UTC 2007


Author: arma
Date: 2007-12-05 00:46:52 -0500 (Wed, 05 Dec 2007)
New Revision: 12675

Modified:
   tor/trunk/doc/TODO
Log:
move the december feature list up into the 0.2.0 section of
the todo list. the feature freeze is off. better luck in 2008!


Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO	2007-12-04 22:29:26 UTC (rev 12674)
+++ tor/trunk/doc/TODO	2007-12-05 05:46:52 UTC (rev 12675)
@@ -20,7 +20,38 @@
   - Put a consensus in place of the empty fallback-consensus file in
     src/config and see what breaks.
   - let bridges set relaybandwidthrate as low as 5kb
+  - config option FetchDirInfoEagerly so the dnsel can fetch dir
+    info like a mirror without needing to be a tor server.
+    - nick has to pick a name for it
 
+Features blocking 0.2.0.x:
+  - mirror tor downloads on (via) tor dir caches
+R   . spec
+    d deploy
+  - geoip caching and publishing for bridges
+R   . spec
+    - deploy
+    d let Vidalia use the geoip data too rather than doing its own
+      anonymized queries
+  - bridge address disbursal strategies
+    o get the cached-descriptors* to bridges at moria
+    - parse out bridge addresses from cached-descriptors*
+      (or parse them out before Tonga sends them)
+      (or get Tonga's Tor to write them out better in the first place)
+N   * answer by IP/timestamp
+      - run a little web server on moria?
+N   d answer by answering email to bridges at torproject
+      - keep track of which addresses have been answered already
+R   d some sort of reachability testing on bridges
+R - families of bridges
+  - interface for letting soat modify flags that authorities assign
+R   . spec
+    - deploy
+S * tor usb windows image (vidalia, polipo, tor, firefox)
+S/M - vidalia can launch firefox
+    - build a community version of firefox
+    - pick our favorite extensions
+
 Things we'd like to do in 0.2.0.x:
   - See also Flyspray tasks.
   - See also all items marked XXXX020 and DOCDOC in the code
@@ -146,7 +177,7 @@
       o be more robust to bridges being marked as down and leaving us
         stranded without any known "running" bridges.
     - Bridges operators (rudimentary version)
-      * Ability to act as dir cache without a dir port.
+      o Ability to act as dir cache without a dir port.
       o Bridges publish to bridge authorities
       o Fix BEGIN_DIR so that you connect to bridge of which you only
         know IP (and optionally fingerprint), and then use BEGIN_DIR to learn
@@ -211,34 +242,6 @@
       servers. but sometimes our entry node is the same for multiple
       test circuits. this defeats the point.
 
-Planned for 0.2.1.x, December:
-  - mirror tor downloads on (via) tor dir caches
-R   - spec
-    d deploy
-  - geoip caching and publishing for bridges
-R   - spec
-    - deploy
-    d let Vidalia use the geoip data too rather than doing its own
-      anonymized queries
-  - bridge address disbursal strategies
-    o get the cached-descriptors* to bridges at moria
-    - parse out bridge addresses from cached-descriptors*
-      (or parse them out before Tonga sends them)
-      (or get Tonga's Tor to write them out better in the first place)
-    * answer by IP/timestamp
-      - run a little web server on moria?
-    d answer by answering email to bridges at torproject
-      - keep track of which addresses have been answered already
-    d some sort of reachability testing on bridges
-  - families of bridges
-  - interface for letting soat modify flags that authorities assign
-R   - spec
-    - deploy
-S * tor usb windows image (vidalia, polipo, tor, firefox)
-S/M - vidalia can launch firefox
-    - build a community version of firefox
-    - pick our favorite extensions
-
 Planned for 0.2.1.x:
   - enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
   - configurable timestamp granularity. defaults to 'seconds'.
@@ -313,8 +316,8 @@
       local_routerstatus (or equivalent) subsume all places to go for "what
       router is this?"
   - Blocking/scanning-resistance
-    - It would be potentially helpful to https requests on the OR port by
-      acting like an HTTPS server.
+    - It would be potentially helpful to respond to https requests on
+      the OR port by acting like an HTTPS server.
     - Do we want to maintain our own set of entryguards that we use as
       next hop after the bridge? Open research question; let's say no
       for 0.2.0 unless we learn otherwise.



More information about the tor-commits mailing list