TODO.021 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. $Id: TODO 16258 2008-07-30 13:04:38Z nickm $
  2. Legend:
  3. SPEC!! - Not specified
  4. SPEC - Spec not finalized
  5. N - nick claims
  6. R - arma claims
  7. P - phobos claims
  8. S - Steven claims
  9. E - Matt claims
  10. M - Mike claims
  11. J - Jeff claims
  12. I - ioerror claims
  13. W - weasel claims
  14. K - Karsten claims
  15. - Not done
  16. * Top priority
  17. . Partially done
  18. o Done
  19. d Deferrable
  20. D Deferred
  21. X Abandoned
  22. =======================================================================
  23. Things Roger would be excited to see:
  24. Nick
  25. * Look at Roger's proposal 141 discussions on or-dev, and help us
  26. decide how to proceed.
  27. - Tors start believing the contents of NETINFO cells.
  28. - respond to Steven's red-team TLS testing (a.k.a, look at a packet
  29. dump and compare)
  30. Matt
  31. - Fit Vidalia in 640x480 again.
  32. - Vidalia should avoid stomping on your custom exit policy lines
  33. just because you click on 'save' for a totally different config thing.
  34. - How much space do we save in TBB by stripping symbols from Vidalia
  35. first? Good idea or crazy idea?
  36. ioerror
  37. * weather.torproject.org should go live.
  38. - Keep advocating new Tor servers and working with orgs like Mozilla
  39. to let them like Tor.
  40. - Find out what happened to the buildbot and get it back up:
  41. http://tor-buildbot.freehaven.net:8010/
  42. - Learn about locking memory pages that have sensitive content. Get
  43. that started in Tor.
  44. - Translation portal
  45. - Vidalia html help files
  46. - should we i18nize polipo's error messages too?
  47. - how to get our diagrams translated, and how to get our screenshots
  48. from the right language?
  49. - Some of our translated wml files are very old -- so old that they
  50. are harmful to leave in place. We need some sort of way to notice
  51. this and disable them.
  52. Steven
  53. - Move proposal 131 or equivalent forward.
  54. - Keep bugging us about exploits on the .exit notation.
  55. - Mike's question #3 on https://www.torproject.org/volunteer#Research
  56. - Worthwhile shipping TBB with some local html help files that come
  57. as bookmarks?
  58. Andrew
  59. - Which bundles include Torbutton? Change the docs/tor-doc-foo pages
  60. so they admit that Torbutton is in them too. Change the download
  61. page too.
  62. - The OS X bundle screenshots are from forever ago -- they don't
  63. include Torbutton, they still say it's tor.eff.org, etc.
  64. - Should we still be telling you how to use Safari on OS X for Tor,
  65. given all the holes that Torbutton-dev solves on Firefox?
  66. Weasel
  67. - Figure out how to make Vidalia and Tor play nicely on Debian, make
  68. the necessary modifications, and make some Vidalia debs that pass
  69. muster.
  70. - Fix bug 393.
  71. - Get oftc to switch to Tor dns bulk exitlist. Or tell us why it's
  72. not suitable yet.
  73. - Move proposal 134 forward.
  74. - putting port predictions in state file
  75. - if tor hasn't been used in a while it stops fetching consensus
  76. documents. Retain that state over restarts.
  77. Roger
  78. - Finish tor-doc-bridge.wml
  79. . Fix FAQ entry on setting up private Tor network
  80. - Did we actually apply Steven's dkimproxy patch?
  81. - Brainstorm about safe but effective ways for vidalia to
  82. auto-update its user's bridges via Tor in the background.
  83. - it doesn't count as successfully opening a circuit if it's not
  84. an exit circuit.
  85. Mike:
  86. - Roger wants to get an email every time there's a blog change,
  87. e.g. a comment. That way spam doesn't go undetected for weeks.
  88. - Or, maybe just disable linking from blog comments entirely?
  89. =======================================================================
  90. Bugs/issues for Tor 0.2.0.x:
  91. . we should have an off-by-default way for relays to dump geoip data to
  92. a file in their data directory, for measurement purposes.
  93. o Basic implementation
  94. N - Include probability-of-selection
  95. R d let bridges set relaybandwidthrate as low as 5kb
  96. R - bridge communities
  97. . spec
  98. . deploy
  99. - man page entries for Alternate*Authority config options
  100. Documentation for Tor 0.2.0.x:
  101. - Proposals:
  102. . 111: Prioritize local traffic over relayed.
  103. R - Merge into tor-spec.txt.
  104. - 113: mark as closed close.
  105. o document the "3/4 and 7/8" business in the clients fetching consensus
  106. documents timeline.
  107. R - then document the bridge user download timeline.
  108. - HOWTO for DNSPort. See tup's wiki page.
  109. . Document transport and natdport in a good HOWTO.
  110. - Quietly document NT Service options: revise (or create) FAQ entry
  111. =======================================================================
  112. For 0.2.1.x-alpha:
  113. R d bug: if we launch using bridges, and then stop using bridges, we
  114. still have our bridges in our entryguards section, and may use them.
  115. R d add an event to report geoip summaries to vidalia for bridge relays,
  116. so vidalia can say "recent activity (1-8 users) from sa".
  117. R - investigate: it looks like if the bridge authority is unreachable,
  118. we're not falling back on querying bridges directly?
  119. R - if "no running bridges known", an application request should make
  120. us retry all our bridges.
  121. R d Setting DirPort when acting as bridge will give false Warnings
  122. For 0.2.1.x:
  123. - Proposals to do:
  124. o 110: avoid infinite-length circuits
  125. - 117: IPv6 Exits
  126. - Internal code support for ipv6:
  127. o Clone ipv6 functions (inet_ntop, inet_pton) where they don't exist.
  128. o Many address variables need to become tor_addr_t
  129. o addr in connection_t
  130. o n_addr in extend_info_t
  131. - Teach resolving code how to handle ipv6.
  132. . Teach exit policies about ipv6 (consider ipv4/ipv6 interaction!)
  133. o Use IPv6 in connect/connected/failed-exitpolicy cells
  134. o accept ipv6 from socks
  135. o Generate END_REASON_EXITPOLICY cells right
  136. . ... and parse them right
  137. . Generate new BEGIN cell types and parse them right
  138. - Detect availability of ipv6
  139. - Advertise availability of ipv6.
  140. - Geoip support, if only to add a zone called "ipv6"
  141. - 118: Listen on and advertise multiple ports:
  142. - Tor should be able to have a pool of outgoing IP addresses that it is
  143. able to rotate through. (maybe. Possible overlap with proposal 118.)
  144. - config option to publish what ports you listen on, beyond
  145. ORPort/DirPort. It should support ranges and bit prefixes (?) too.
  146. - Need to figure out the right format for routerinfo_t on this.
  147. K . 121: Hidden service authentication:
  148. missing: delayed descriptor publication for 'stealth' mode.
  149. R d 128: families of private bridges
  150. - 134: handle authority fragmentation.
  151. o 135: simplify configuration of private tor networks.
  152. - 140: Provide diffs betweeen consensuses
  153. K - 143: Improvements of Distributed Hidden Service Descriptor Storage:
  154. only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
  155. - 147: Eliminate the need for v2 directories in generating v3 directories
  156. R - authorities should initiate a reachability test upon first
  157. glimpsing a new descriptor.
  158. - 148: Stream end reasons from the client side should be uniform.
  159. K - 155: Four Improvements of Hidden Service Performance
  160. - Maybe:
  161. - 145: Separate "suitable from a guard" from "suitable as a new guard"
  162. - 146: Adding new flag to reflect long-term stability
  163. - 149: Using data from NETINFO cells
  164. - Don't extend a circuit over a noncanonical connection with
  165. mismatched address.
  166. - Learn our outgoing IP address from netinfo cells?
  167. - Learn skew from netinfo cells?
  168. - Proposals to write:
  169. - Fix voting to handle bug 608 case when multiple servers get
  170. Named.
  171. R d Do we want to maintain our own set of entryguards that we use as
  172. next hop after the bridge?
  173. d Possibly: revise link protocol to allow big circuit IDs,
  174. variable-length cells, proposal-110 stuff, and versioned CREATES?
  175. N . Draft proposal for GeoIP aggregation (see external constraints *)
  176. . Figure out how to make good use of the fallback consensus file. Right
  177. now many of the addresses in the fallback consensus will be stale,
  178. so it will take dozens of minutes to bootstrap from it. This is a
  179. bad first Tor experience. But if we check the fallback consensus
  180. file *after* we fail to connect to any authorities, then it may
  181. still be valuable as a blocking-resistance step.
  182. o Write the proposal.
  183. - Patch our tor.spec rpm package so it knows where to put the fallback
  184. consensus file.
  185. d Something for bug 469, to limit connections per IP.
  186. . Put bandwidth weights in the networkstatus? So clients get weight
  187. their choices even before they have the descriptors; and so
  188. authorities can put in more accurate numbers in the future.
  189. d Fetch an updated geoip file from the directory authorities.
  190. - Tiny designs to write:
  191. . Better estimate of clock skew; has anonymity implications. Clients
  192. should estimate their skew as median of skew from servers over last
  193. N seconds, but for servers this is not so easy, since a server does
  194. not choose who it connects to.
  195. - Do TLS connection rotation more often than "once a week" in the
  196. extra-stable case.
  197. (One reason not to do it more often is because the old TLS conn
  198. probably has a circuit on it, and we don't really want to build up
  199. dozens of TCP connections to all the other extra-stable relays.)
  200. - If a relay publishes a new descriptor with a significantly lower
  201. uptime or with a new IP address, then we should consider its current
  202. "running" interval to have ended even if it hadn't yet failed its
  203. third reachability test. the interval ended when the new descriptor
  204. appeared, and a new interval began then too.
  205. - Use less RAM *
  206. - Optimize cell pool allocation.
  207. d Support (or just always use) jemalloc (if it helps)
  208. - mmap more files.
  209. - Look into pulling serverdescs off buffers as they arrive.
  210. - Use less bandwidth
  211. - Use if-modified-since to download consensuses
  212. - Handle multi-core cpus better
  213. - Split circuit AES across cores?
  214. - Split TLS across cores? This will be harder.
  215. - Testing
  216. - Better unit test coverage
  217. - Refactor unit tests into multiple files
  218. - Verify that write limits to linked connections work.
  219. - Use more mid-level and high-level libevent APIs
  220. - For dns?
  221. - For http?
  222. - For buffers?
  223. - Tool improvements:
  224. - Get IOCP patch into libevent *
  225. - Security improvements
  226. - make is-consensus-fresh-enough check way tighter.
  227. - If we haven't tried downloading a consensus for ages since we're tired,
  228. try getting a new one before we use old descriptors for a circuit.
  229. Related to bug 401. [What does "since we're tired" mean? -RD]
  230. - Feature removals and deprecations:
  231. - Get rid of the v1 directory stuff (making, serving, and caching)
  232. . First verify that the caches won't flip out?
  233. o If they will, just stop the caches from caching for now
  234. . perhaps replace it with a "this is a tor server" stock webpage.
  235. - Get the debs to set DirPortFrontPage in the default.
  236. - Decide how to handle DirPortFrontPage files with image links.
  237. - The v2dir flag isn't used for anything anymore, right? If so, dump it.
  238. - Even clients run rep_hist_load_mtbf_data(). Does this waste memory?
  239. Dump it?
  240. - Unless we start using ftime functions, dump them.
  241. - can we deprecate 'getinfo network-status'?
  242. - can we deprecate the FastFirstHopPK config option?
  243. - Can we deprecate controllers that don't use both features?
  244. - Dump most uint32_t addr functions.
  245. Nice to have for 0.2.1.x:
  246. - Proposals to write
  247. - steven's plan for replacing check.torproject.org with a built-in
  248. answer by tor itself.
  249. - Documentation
  250. P - Make documentation realize that location of system configuration file
  251. will depend on location of system defaults, and isn't always /etc/torrc.
  252. - Small controller features
  253. - A status event for when tor decides to stop fetching directory info
  254. if the client hasn't clicked recently: then make the onion change too.
  255. - Add a status event when new consensus arrives
  256. - Windows build
  257. P - Figure out why dll's compiled in mingw don't work right in WinXP.
  258. P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle
  259. - Refactor bad code:
  260. - Refactor the HTTP logic so the functions aren't so large.
  261. - Refactor buf_read and buf_write to have sensible ways to return
  262. error codes after partial writes
  263. - Streamline how we pick entry nodes: Make choose_random_entry() have
  264. less magic and less control logic.
  265. - Don't call time(NULL) so much; instead have a static time_t field
  266. that gets updated only a handful of times per second.
  267. - Move all status info out of routerinfo into local_routerstatus. Make
  268. "who can change what" in local_routerstatus explicit. Make
  269. local_routerstatus (or equivalent) subsume all places to go for "what
  270. router is this?"
  271. - deprecate router_digest_is_trusted_dir() in favor of
  272. router_get_trusteddirserver_by_digest()
  273. - Make Tor able to chroot itself
  274. o allow it to load an entire config file from control interface
  275. - document LOADCONF
  276. - log rotation (and FD passing) via control interface
  277. - chroot yourself, including inhibit trying to read config file
  278. and reopen logs, unless they are under datadir.
  279. - Should be trivial:
  280. - Base relative control socket paths (and other stuff in torrc) on datadir.
  281. - Tor logs the libevent version on startup, for debugging purposes.
  282. This is great. But it does this before configuring the logs, so
  283. it only goes to stdout and is then lost.
  284. - enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
  285. - Make 'safelogging' extend to info-level logs too.
  286. - don't do dns hijacking tests if we're reject *:* exit policy?
  287. (deferred until 0.1.1.x is less common)
  288. - More consistent error checking in router_parse_entry_from_string().
  289. I can say "banana" as my bandwidthcapacity, and it won't even squeak.
  290. d Interface for letting SOAT modify flags that authorities assign.
  291. (How to keep the authority from clobbering them afterwards?