Browse Source

some deliverables and timeline for the directory overhead project

svn:r14556
Roger Dingledine 17 years ago
parent
commit
0c46f1eaea
1 changed files with 19 additions and 6 deletions
  1. 19 6
      doc/TODO

+ 19 - 6
doc/TODO

@@ -94,12 +94,14 @@ N     - Additional TLS-camouflage work (spoofing FF cipher suite, etc.)
         - investigate the feasibility of handing connections off to a
         - investigate the feasibility of handing connections off to a
           local apache if they don't look like Tor or if they don't
           local apache if they don't look like Tor or if they don't
           portknock or whatever.
           portknock or whatever.
-W     - Get closer to downloading far fewer descriptors
-        - Instrument the code to track how many descriptors we download vs how
-          many times we extend a circuit.
-        - Write a proposal for how to fetch far fewer descriptors; assess
-          anonymity attacks, like from looking at the size of the
-          descriptor you fetch.
+      - Get closer to downloading far fewer descriptors
+W       - Instrument the code to track how many descriptors we download vs how
+          many times we extend a circuit. Guess a few other things to
+          instrument, like cache activity, and do those too.
+W       - Start a proposal for how to fetch far fewer descriptors;
+          identify and start assessing anonymity attacks, like from looking
+          at the size of the descriptor you fetch. See xxx-grand-plan.txt
+          for some early thoughts.
 I     - Translation portal
 I     - Translation portal
         - Vidalia installer translations
         - Vidalia installer translations
           - Find/make a script to convert NSI strings into PO files
           - Find/make a script to convert NSI strings into PO files
@@ -118,6 +120,13 @@ KS  - Investigate where the slowdown occurs for making hidden service
       areas that can be improved, and make some guesses about which we
       areas that can be improved, and make some guesses about which we
       should focus on.
       should focus on.
 
 
+  - mid July
+W   - Take the results from instrumenting directory downloads on Tor
+      clients, and analyze/simulate some alternate approaches. Finish
+      proposal for how to improve things, iterate based on feedback,
+      convince us that the anonymity tradeoffs and/or scalability
+      tradeoffs are acceptable.
+
   - mid August
   - mid August
 KS  - Design hidden service improvements, evaluate them and consider
 KS  - Design hidden service improvements, evaluate them and consider
       security properties: write some proposals, get feedback, revise
       security properties: write some proposals, get feedback, revise
@@ -139,10 +148,14 @@ I     - Figure out a good PKI, document the design, assess security issues:
   - mid October
   - mid October
 KS  - Finish implementation of hidden service improvements: have a set
 KS  - Finish implementation of hidden service improvements: have a set
       of patches that you think work.
       of patches that you think work.
+W   - Finish implementation of directory overhead changes: have a set
+      of patches that you think work.
 
 
   - mid January
   - mid January
 KS  - Finish testing, debugging, unit testing, etc the hidden service
 KS  - Finish testing, debugging, unit testing, etc the hidden service
       changes. Have it in the development version and in use.
       changes. Have it in the development version and in use.
+W   - Finish testing, debugging, unit testing, etc the directory overhead
+      changes. Have it in the development version and in use.
 
 
 =======================================================================
 =======================================================================