[or-cvs] r16498: {tor} List more proposals in TODO.021 (tor/trunk/doc)
nickm at seul.org
nickm at seul.org
Mon Aug 11 16:04:38 UTC 2008
Author: nickm
Date: 2008-08-11 12:04:38 -0400 (Mon, 11 Aug 2008)
New Revision: 16498
Modified:
tor/trunk/doc/TODO.021
Log:
List more proposals in TODO.021
Modified: tor/trunk/doc/TODO.021
===================================================================
--- tor/trunk/doc/TODO.021 2008-08-11 16:04:22 UTC (rev 16497)
+++ tor/trunk/doc/TODO.021 2008-08-11 16:04:38 UTC (rev 16498)
@@ -168,16 +168,7 @@
For 0.2.1.x:
- Proposals to do:
o 110: avoid infinite-length circuits
-R d 128: families of private bridges
- - 134: handle authority fragmentation.
-
- - Proposals to write:
-R d Do we want to maintain our own set of entryguards that we use as
- next hop after the bridge?
- X Add an 'exit-address' line in the descriptor for servers that exit
- from something that isn't their published address.
- [I think tordnsel solved this. -RD]
- - Proposal to supersede 117 by adding IPv6 support for exits and entries.
+ - 117: IPv6 Exits
- Internal code support for ipv6:
o Clone ipv6 functions (inet_ntop, inet_pton) where they don't exist.
o Many address variables need to become tor_addr_t
@@ -200,8 +191,27 @@
- config option to publish what ports you listen on, beyond
ORPort/DirPort. It should support ranges and bit prefixes (?) too.
- Need to figure out the right format for routerinfo_t on this.
+ - 121: Hidden service authentication
+R d 128: families of private bridges
+ - 134: handle authority fragmentation.
+ o 135: simplify configuration of private tor networks. Th
+ - 140: Provide diffs betweeen consensuses
+ - 147: Eliminate the need for v2 directories in generating v3 directories
+ - 148: Stream end reasons from the client side should be uniform.
+
+ - Maybe:
+ - 145: Separate "suitable from a guard" from "suitable as a new guard"
+ - 146: Adding new flag to reflect long-term stability
+ - 149: Using data from NETINFO cells
+
+ - Proposals to write:
- Fix voting to handle bug 608 case when multiple servers get
Named.
+R d Do we want to maintain our own set of entryguards that we use as
+ next hop after the bridge?
+ X Add an 'exit-address' line in the descriptor for servers that exit
+ from something that isn't their published address.
+ [I think tordnsel solved this. -RD]
d Possibly: revise link protocol to allow big circuit IDs,
variable-length cells, proposal-110 stuff, and versioned CREATES?
o Eliminate use of v2 networkstatus documents in v3 authority
@@ -308,7 +318,7 @@
- Refactor the HTTP logic so the functions aren't so large.
- Refactor buf_read and buf_write to have sensible ways to return
error codes after partial writes
- - Router_choose_random_node() has a big pile of args. make it "flags".
+ o Router_choose_random_node() has a big pile of args. make it "flags".
- Streamline how we pick entry nodes: Make choose_random_entry() have
less magic and less control logic.
- Don't call time(NULL) so much; instead have a static time_t field
More information about the tor-commits
mailing list