[or-cvs] r15249: a huge pile of bridge and bootstrap related bugs that arma s (tor/trunk/doc)
arma at seul.org
arma at seul.org
Sat Jun 14 06:04:16 UTC 2008
Author: arma
Date: 2008-06-14 02:04:16 -0400 (Sat, 14 Jun 2008)
New Revision: 15249
Modified:
tor/trunk/doc/TODO
Log:
a huge pile of bridge and bootstrap related bugs that arma should work on.
Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO 2008-06-14 05:14:57 UTC (rev 15248)
+++ tor/trunk/doc/TODO 2008-06-14 06:04:16 UTC (rev 15249)
@@ -309,8 +309,6 @@
o Basic implementation
N - Include probability-of-selection
R d let bridges set relaybandwidthrate as low as 5kb
-R - bug: if we launch using bridges, and then stop using bridges, we
- still have our bridges in our entryguards section, and may use them.
R - bridge communities
. spec
. deploy
@@ -330,6 +328,27 @@
=======================================================================
+For 0.2.1.2-alpha:
+R - bug: if we launch using bridges, and then stop using bridges, we
+ still have our bridges in our entryguards section, and may use them.
+R - add an event to report geoip summaries to vidalia for bridge relays,
+ so vidalia can say "recent activity (1-8 users) from sa".
+R - investigate: it looks like if the bridge authority is unreachable,
+ we're not falling back on querying bridges directly?
+R - a getinfo so vidalia can query our current bootstrap state, in
+ case it attaches partway through and wants to catch up.
+R - directory authorities shouldn't complain about bootstrapping problems
+ just because they do a lot of reachability testing and some of
+ it fails.
+R - if your bridge is unreachable, it won't generate enough connection
+ failures to generate a bootstrap problem event.
+R - if "no running bridges known", an application request should make
+ us retry all our bridges.
+R - get matt to fix vidalia so it moves to a "starting tor" bootstrap
+ state if it hasn't gotten any status events. Maybe it can even be
+ more certain by checking the version (<0211) and/or looking at the
+ results of the getinfo.
+
For 0.2.1.x:
- Proposals to do:
- 110: avoid infinite-length circuits
More information about the tor-commits
mailing list