TODO.external 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. Legend:
  2. SPEC!! - Not specified
  3. SPEC - Spec not finalized
  4. N - nick claims
  5. R - arma claims
  6. P - phobos claims
  7. S - Steven claims
  8. E - Matt claims
  9. M - Mike claims
  10. J - Jeff claims
  11. I - ioerror claims
  12. W - weasel claims
  13. K - Karsten claims
  14. C - coderman claims
  15. - Not done
  16. * Top priority
  17. . Partially done
  18. o Done
  19. d Deferrable
  20. D Deferred
  21. X Abandoned
  22. =======================================================================
  23. External constraints:
  24. For June/July:
  25. NR - Work more on Paul's NRL research problem.
  26. For March 22:
  27. I * Email auto-responder
  28. * teach gettor how to ask for (and attach) split files.
  29. K . Metrics.
  30. . With Mike's help, use Torflow to start doing monthly rudimentary
  31. performance evaluations:
  32. . Circuit throughput and latency
  33. - Measure via Broadband and dialup
  34. . Publish a report addressing key long-term metrics questions:
  35. . What metrics should we present?
  36. . What data are available for these metrics?
  37. . What data are missing, and can collect them safely? Can we
  38. publish them safely?
  39. . What systems are available to present this data?
  40. E . Vidalia improvements
  41. o Vidalia displays by-country user summary for bridge operators
  42. ? - write a help page for vidalia, "what is this"
  43. For mid August:
  44. Section 0, items that didn't make it into the original roadmap:
  45. 0.1, installers and packaging
  46. C . i18n for the msi bundle files
  47. P . more consistent TBB builds
  48. IC- get a buildbot up again. Have Linux and BSD build machines.
  49. (Windows would be nice but realistically will come later.)
  50. E - Get Tor to work properly on the iPhone.
  51. 3.1, performance work. [Section numbers in here are from performance.pdf]
  52. - High-priority items from performance.pdf
  53. RS - 1.2, new circuit window sizes. make the default package window lower.
  54. R+ - 2.1, squeeze loud circuits
  55. - Evaluate the code to see what stats we can keep about circuit use.
  56. - Write proposals for various meddling. Look at the research papers
  57. that Juliusz pointed us to. Ask our systems friends. Plan to put
  58. a lot of the parameters in the consensus, so we can tune it with
  59. short turnaround times.
  60. E+ - 2.5, Change Vidalia's default exit policy to not click "other
  61. protocols". Or choose not to. Think this through first.
  62. R+ - 2.6, Tell users not to file-share.
  63. - Put statement on the Tor front page
  64. - Put statement on the download pages too
  65. - And the FAQ
  66. - 3.1.2, Tor weather
  67. I - Implement time-to-notification (immediate, a day, a week)
  68. I - Get a relay operator mailing list going, with a plan and supporting
  69. scripts and so on.
  70. R - Link to them from the Tor relay page
  71. R - and the torrc.sample?
  72. SM - 4.1, balance traffic better
  73. - Steven and Mike should decide if we should do Steven's plan
  74. (rejigger the bandwidth numbers at the authorities based on
  75. Steven's algorithm), or Mike's plan (relay scanning to identify
  76. the unbalanced relays and fix them on the fly), or both.
  77. - Implement Proposal 160
  78. o 4.5, Older entry guards are overloaded
  79. o Pick a conservative timeout like a month, and implement.
  80. M - 5.2, better timeouts for giving up on circuits/streams
  81. - clients gather data about circuit timeouts, and then abandon
  82. circuits that take more than a std dev above that.
  83. 4.1, IOCP / libevent / windows / tor
  84. N - get it working for nick
  85. N - put out a release so other people can start testing it.
  86. N - both the libevent buffer abstraction, and the
  87. tor-uses-libevent-buffer-abstraction. Unless we think that's
  88. unreachable for this milestone?
  89. 4.2.1, risks from becoming a relay
  90. S - Have a clear plan for how users who become relays will be safe,
  91. and be confident that we can build this plan.
  92. - evaluate all the various attacks that are made possible by relaying.
  93. specifically, see "relaying-traffic attacks" in 6.6.
  94. - identify and evaluate ways to make them not a big deal
  95. - setting a low RelayBandwidth
  96. - Nick Hopper's FC08 paper suggesting that we should do a modified
  97. round-robin so we leak less about other circuits
  98. - instructing clients to disable pings in their firewall, etc
  99. - pick the promising ones, improve them so they're even better, and
  100. spec them out so we know how to build them and how much effort is
  101. involved in building them.
  102. 4.5, clients download less directory info
  103. N * deploy proposal 158.
  104. N - decide whether to do proposal 140. if so, construct an implementation
  105. plan for how we'll do it. if not, explain why not.
  106. 5.1, Normalize TLS fingerprint
  107. N o write a draft list of possible attacks for this section, with
  108. estimates about difficulty of attack, difficulty of solution, etc
  109. N - revisit the list and revise our plans as needed
  110. NR- put up a blog post about the two contradictory conclusions: we can
  111. discuss the theory of arms races, and our quandry, without revealing
  112. any specific vulnerabilities. (or decide not to put up a blog post,
  113. and explain why not.)
  114. 5.5, email autoresponder
  115. I . maintenance and keeping it running
  116. 5.7.2, metrics
  117. XXX.
  118. 6.2, Vidalia work
  119. E - add breakpad support or similar for windows debugging
  120. E o let vidalia change languages without needing a restart
  121. E - Implement the status warning event interface started for the
  122. phase one deliverables.
  123. E - Work with Steve Tyree on building a Vidalia plugin API to enable
  124. building Herdict and TBB plugins.
  125. 6.3, Node scanning
  126. M - Steps toward automation
  127. - Set up email list for results
  128. - Map failure types to potential BadExit lines
  129. M - Improve the ability of SoaT to mimic various real web browsers
  130. - randomizing user agents and locale strings
  131. - caching, XMLHTTPRequest, form posting, content sniffing
  132. - Investigate ideas like running Chrome/xulrunner in parallel
  133. M - Other protocols
  134. - SSH, IMAPS, POPS, SMTPS
  135. M - Add ability to geolocalize exit selection based on scanner location
  136. - Use this to rescan dynamic urls filtered by the URL filter
  137. 6.4, Torbutton development
  138. M - Resolve extension conflicts and other high priority bugs
  139. M - Fix or hack around ugly firefox bugs, especially Timezone issue.
  140. Definitely leaning towards "hack around" unless we see some
  141. level of love from Mozilla.
  142. M - Vidalia New Nym Integration
  143. - Implement for Torbutton to pick up on Vidalia's NEWNYM and clear
  144. cookies based on FoeBud's source
  145. - Do this in such a way that we could adapt polipo to purge cache
  146. if we were so inclined
  147. M - Write up a summary of our options for dealing with the google
  148. you-must-solve-a-captcha-to-search problem, and pick one as our
  149. favorite option.
  150. 6.6, Evaluate new anonymity attacks
  151. S - relaying-traffic attacks
  152. - original murdoch-danezis attack
  153. - nick hopper's latency measurement attack
  154. - columbia bandwidth measurement attack
  155. - christian grothoff's long-circuit attack
  156. S - client attacks
  157. - website fingerprinting
  158. 7.1, Tor VM Research, analysis, and prototyping
  159. C . Get a working package out, meaning other people are testing it.
  160. 7.2, Tor Browser Bundle
  161. I - Port to one of OS X or Linux, and start the port to the other.
  162. I . Make it the recommended Tor download on Windows
  163. I - Make sure it's easy to un-brand TBB in case Firefox asks us to
  164. I - Evaluate CCC's Freedom Stick