Browse Source

start to clean up and add to and rearrange the todo

svn:r5362
Roger Dingledine 20 years ago
parent
commit
b72323fab8
1 changed files with 37 additions and 32 deletions
  1. 37 32
      doc/TODO

+ 37 - 32
doc/TODO

@@ -22,7 +22,7 @@ P - flesh out the rest of the section 6 of the faq
 P - gather pointers to livecd distros that include tor
   - put the logo on the website, in source form, so people can put it on
     stickers directly, etc.
-  - more pictures from ren. he wants to describe the tor handshake, i want to
+R . more pictures from ren. he wants to describe the tor handshake, i want to
     talk about hidden services.
   * clean up the places where our docs are redundant (or worse, obsolete in
     one file and correct elsewhere). agl has a start on a global
@@ -35,17 +35,13 @@ NR- write a spec appendix for 'being nice with tor'
     tor-0.1.0.7.rc
   - Remove need for HACKING file.
 
-
-
-for 0.1.1.x:
+for 0.1.1.9-alpha:
 N - if they're trying to be a tor server and they're running
     win 98 or win me, don't let them be a server.
-R - are dirservers auto-verifying duplicate nicknames?
-  o tor should auto-sort the recommended-versions strings 
-    (with the new smartlist sort stuff maybe)
-  o setconf SocksBindAddress kills tor if it fails to bind
+R - ReachableAddresses doesn't do what we want wrt dir fetches.
+
 
-  o controller libs should support resetconf command.
+for 0.1.1.x:
 N . Additional controller features
       o Find a way to make event info more extensible
       - change circuit status events to give more details, like purpose,
@@ -83,25 +79,7 @@ R   - If you think an OR conn is open but you can never establish a circuit
   - Miscellaneous cleanups
     - switch accountingmax to count total in+out, not either in or
       out. it's easy to move in this direction (not risky), but hard to
-      back, out if we decide we prefer it the way it already is. hm.
-    . Come up with a coherent strategy for bandwidth buckets and TLS. (The
-      logic for reading from TLS sockets is likely to overrun the bandwidth
-      buckets under heavy load.  (Really, the logic was never right in the
-      first place.)  Also, we should audit all users of get_pending_bytes().)
-        - Make it harder to circumvent bandwidth caps: look at number of bytes
-          sent across sockets, not number sent inside TLS stream.
-R   o remove the warnings from rendezvous stuff that shouldn't be warnings.
-
-  . Update the hidden service stuff for the new dir approach.
-    - switch to an ascii format.
-    - authdirservers publish blobs of them.
-    - other authdirservers fetch these blobs.
-    - hidserv people have the option of not uploading their blobs.
-    - you can insert a blob via the controller.
-    - and there's some amount of backwards compatibility.
-    - teach clients, intro points, and hidservs about auth mechanisms.
-    - come up with a few more auth mechanisms.
-
+      back out if we decide we prefer it the way it already is. hm.
 
   - Christian Grothoff's attack of infinite-length circuit.
     the solution is to have a separate 'extend-data' cell type
@@ -110,6 +88,11 @@ R   o remove the warnings from rendezvous stuff that shouldn't be warnings.
     - Specify, including thought about
     - Implement
 
+  - Bind to random port when making outgoing connections to Tor servers,
+    to reduce remote sniping attacks.
+  - When we connect to a Tor server, it sends back a signed cell listing
+    the IP it believes it is using. Use this to block dvorak's attack.
+
 N - Destroy and truncated cells should have reasons.
 N - Add private:* alias in exit policies to make it easier to ban all the
     fiddly little 192.168.foo addresses.
@@ -133,7 +116,6 @@ R   - kill dns workers more slowly
       - a way of rolling back approvals to before a timestamp
       - have new people be in limbo and need to demonstrate usefulness
         before we approve them
-      - other?
 
 R   . Dirservers verify reachability claims
       o basic reachability testing, influencing network-status list.
@@ -217,7 +199,7 @@ N     . Routerdesc download changes
     - Make authorities rate-limit logging their complaints about given
       servers?
 
-N   . Naming and validation:
+    o Naming and validation:
       o Separate naming from validation in authdirs.
       o Authdirs need to be able to decline to validate based on
         IP range and key
@@ -228,14 +210,13 @@ N   . Naming and validation:
         and none says N->K' or N'->K.
       o Clients choose names based on network-status options.
       o Names are remembered in client state (?)
-      - Okay to have two valid servers with same nickname, but not
+      o Okay to have two valid servers with same nickname, but not
         two named servers with same nickname.  Update logic.
 
   - packaging and ui stuff:
     . multiple sample torrc files
     - uninstallers
       . for os x
-    . something, anything, for sys tray on Windows.
     . figure out how to make nt service stuff work?
       . Document it.
     . Add version number to directory.
@@ -243,6 +224,12 @@ N   - Vet all pending installer patches
       - Win32 installer plus privoxy, sockscap/freecap, etc.
       - Vet win32 systray helper code
 
+  - document:
+    - torcp needs more attention in the tor-doc-win32.
+    - recommend gaim.
+    - unrecommend IE because of ftp:// bug.
+    - torrc.complete.in needs attention?
+
   o openssl patch to check for degenerate keys in DH handshake
     o accepted and put into openssl
 
@@ -253,6 +240,23 @@ Reach (deferrable) items for 0.1.1.x:
   o Add TTLs to DNS-related replies, and use them (when present) to adjust
     addressmap values.
 
+  . Update the hidden service stuff for the new dir approach.
+    - switch to an ascii format.
+    - authdirservers publish blobs of them.
+    - other authdirservers fetch these blobs.
+    - hidserv people have the option of not uploading their blobs.
+    - you can insert a blob via the controller.
+    - and there's some amount of backwards compatibility.
+    - teach clients, intro points, and hidservs about auth mechanisms.
+    - come up with a few more auth mechanisms.
+
+  . Come up with a coherent strategy for bandwidth buckets and TLS. (The
+    logic for reading from TLS sockets is likely to overrun the bandwidth
+    buckets under heavy load.  (Really, the logic was never right in the
+    first place.)  Also, we should audit all users of get_pending_bytes().)
+      - Make it harder to circumvent bandwidth caps: look at number of bytes
+        sent across sockets, not number sent inside TLS stream.
+
   . Research memory use on Linux: what's happening?
     - Is it threading?  (Maybe, maybe not)
     - Is it the buf_shrink bug? (Quite possibly)
@@ -310,3 +314,4 @@ Blue-sky:
     streams, at least according to the protocol. But we handle all that
     we've seen in the wild.
     (Pending a user who needs this)
+