| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309 | 
Legend:SPEC!!  - Not specifiedSPEC    - Spec not finalizedNICK    - nick claimsARMA    - arma claims        - Not done        * Top priority        . Partially done        o Done        D Deferred        X AbandonedBugs:        o When it can't resolve any dirservers, it is useless from then on.          We should make it reload the RouterFile if it has no dirservers.        o Sometimes it picks a middleman node as the exit for a circuit.        - if you specify a non-dirserver as exitnode or entrynode, when it          makes the first few circuits it hasn't yet fetched the directory,          so it warns that it doesn't know the node.        - make 'make test' exit(1) if a test fails.        - fix buffer unit test so it passesShort-term:        - put IP into the descriptor, so clients don't need to resolve things        o when you hup, rewrite the router.desc file (and maybe others)        - consider handling broken socks4 implementations        - improve how it behaves when i remove a line from the approved-routers files        - Make tls connections tls_close intentionally        o Rename ACI to circID        . integrate rep_ok functions, see what breaks        - update tor faq        o obey SocksBindAddress, ORBindAddress        o warn if we're running as root        o make connection_flush_buf() more obviously obsolete        o let hup reread the config file, eg so we can get new exit          policies without restarting        o Put recommended_versions in a config entry        X use times(2) rather than gettimeofday to measure how long it          takes to process a cell        o Separate trying to rebuild a circuit because you have none from trying           to rebuild a circuit because the current one is stale        X Continue reading from socks port even while waiting for connect.        o Exit policies                o Spec how to write the exit policies                o Path selection algorithms                        o Choose path more incrementally                        o Let user request first/last node                        o And disallow certain nodes                        D Choose path by jurisdiction, etc?                o Make relay end cells have failure status and payload attached        X let non-approved routers handshake.        X Dirserver shouldn't put you in running-routers list if you haven't          uploaded a descriptor recently        X migrate to using nickname rather than addr:port for routers        - migrate to using IPv6 sizes everywhere        o Move from onions to ephemeral DH                o incremental path building                o transition circuit-level sendmes to hop-level sendmes                o implement truncate, truncated                o move from 192byte DH to 128byte DH, so it isn't so damn slow                X exiting from not-last hop                        X OP logic to decide to extend/truncate a path                        X make sure exiting from the not-last hop works                        X logic to find last *open* hop, not last hop, in cpath        o Remember address and port when beginning.         - Extend by nickname/hostname/something, not by IP.        - Need a relay teardown cell, separate from one-way ends.        - remove per-connection rate limiting        - Make it harder to circumvent bandwidth caps: look at number of bytes          sent across sockets, not number sent inside TLS stream.On-going        . Better comments for functions!        . Go through log messages, reduce confusing error messages.        . make the logs include more info (fd, etc)        . Unit tests        . Update the spec so it matches the codeMid-term:        - Rotate tls-level connections -- make new ones, expire old ones.          So we get actual key rotation, not just symmetric key rotation        o Are there anonymity issues with sequential streamIDs? Sequential          circIDs? Eg an attacker can learn how many there have been.          The fix is to initialize them randomly rather than at 1.        - Look at having smallcells and largecells        . Redo scheduler                o fix SSL_read bug for buffered records                - make round-robining more fair        - What happens when a circuit's length is 1? What breaks?        . streams / circuits                o Implement streams                o Rotate circuits after N minutes?                X Circuits should expire when circuit->expire triggersNICK            . Handle half-open connections                        o openssh is an application that uses half-open connections                        o Figure out what causes connections to close, standardize                          when we mark a connection vs when we tear it down                o Look at what ssl does to keep from mutating data streams        o Put CPU workers in separate processes                o Handle multiple cpu workers (one for each cpu, plus one)                o Queue for pending tasks if all workers full                o Support the 'process this onion' task                D Merge dnsworkers and cpuworkers to some extent                o Handle cpuworkers dying        . Scrubbing proxies                - Find an smtp proxy?                        - Check the old smtp proxy code                o Find an ftp proxy? wget --passive                D Wait until there are packet redirectors for Linux                . Get socks4a support into Mozilla        . Develop rendezvous points                X Handle socks commands other than connect, eg, bind?                o Design                - Spec                - Implement        . Tests                o Testing harness/infrastructure                D System tests (how?)                - Performance tests, so we know when we've improved                        . webload infrastructure (Bruce)                        . httperf infrastructure (easy to set up)                        . oprofile (installed in RH >8.0)NICK    . Daemonize and package                o Teach it to fork and background                - Red Hat spec file                o Debian spec file equivalent        . Portability                . Which .h files are we actually using?                . Port to:                        o Linux                        o BSD                        . Solaris                        o Cygwin                        . Win32                        o OS X                - deal with pollhup / reached_eof on all platforms                o openssl randomness                o inet_ntoa                o stdint.h                - Make a script to set up a local network on your machine        o More flexibility in node addressing                D Support IPv6 rather than just 4                o Handle multihomed servers (config variable to set IP)In the distant future:        D Load balancing between router twins                D Keep track of load over links/nodes, to                  know who's hosedSPEC!!  D Non-clique topologies        D Implement our own memory management, at least for common structs          (Not ever necessary?)        D Advanced directory servers                D Automated reputation managementSPEC!!          D Figure out how to do threshold directory servers                D jurisdiction info in dirserver entries? other info?Older (done) todo stuff:For 0.0.2pre17:        o Put a H(K | handshake) into the onionskin response        o Make cells 512 bytes        o Reduce streamid footprint from 7 bytes to 2 bytes          X Check for collisions in streamid (now possible with            just 2 bytes), and back up & replace with padding if so        o Use the 4 reserved bytes in each cell header to keep 1/5          of a sha1 of the ongoing relay payload (move into stream header)        o Move length into the stream header too        o Make length 2 bytes        D increase DH key length        D increase RSA key length        D Spec the stream_id stuff. Clarify that nobody on the backward          stream should look at stream_id.Cell:        ACI (anonymous circuit identifier)    [2 bytes]        Command                               [1 byte]        Payload (padded with 0 bytes)         [509 bytes]Relay payload:        Relay command           [1 byte]        Stream ID               [7 bytes]        Partial SHA-1           [4 bytes]        Length                  [2 bytes]        Relay payload           [495 bytes]For 0.0.2pre15:        o don't pick exit nodes which will certainly reject all things.        o don't pick nodes that the directory says are down        o choose randomly from running dirservers, not just first one        o install the man page        o warn when client-side tries an address/port which no router in the dir accepts.For 0.0.2pre14:        o More flexible exit policies (18.*, 18.0.0.0/8)        o Work to succeed in the precense of exit policy violation                o Replace desired_path_len with opaque path-selection specifier                o Client-side DNS caching                o Add entries to client DNS cache based on END cells                o Remove port from END_REASON_EXITPOLICY cells                o Start building new circuits when we get an exit-policy                  failure.  (Defer exiting from the middle of existing                  circuits or extending existing circuits for later.)                o Implement function to check whether a routerinfo_t                   supports a given exit addr.                o Choose the exit node of an in-progress circuit based on                  pending AP connections.                o Choose the exit node _first_, then beginning, then                  middle nodes.Previous:        o Get tor to act like a socks server                o socks4, socks4a                o socks5        o routers have identity key, link key, onion key.                o link key certs are                  D signed by identity key                  D not in descriptor                  o not in config                  D not on disk                o identity and onion keys are in descriptor (and disk)        o upon boot, if it doesn't find identity key, generate it and write it.        o also write a file with the identity key fingerprint in it        o router generates descriptor: flesh out router_get_my_descriptor()        o Routers sign descriptors with identity key        o routers put version number in descriptor        o routers should maybe have `uname -a` in descriptor?        o Give nicknames to routers                o in config                o in descriptors        o router posts descriptor                o when it boots                o every DirFetchPostPeriod seconds                D when it changes        o change tls stuff so certs don't get written to disk, or read from disk        o make directory.c 'thread'safe        o dirserver parses descriptor        o dirserver checks signature        D client checks signature?        o dirserver writes directory to file          o reads that file upon boot        o directory includes all routers, up and down        o add "up" line to directory, listing nicknames        o instruments ORs to report stats          o average cell fullness          o average bandwidth used        o configure log files. separate log file, separate severities.        o what assumptions break if we fclose(0) when we daemonize?        o make buffer struct elements opaque outside buffers.c        o add log convention to the HACKING file        o make 'make install' do the right thing        o change binary name to tor        o change config files so you look at commandline, else look in          /etc/torrc. no cascading.        o have an absolute datadir with fixed names for files, and fixed-name          keydir under that with fixed names        o Move (most of) the router/directory code out of main.c        o Simple directory servers                o Include key in source; sign directories                        o Signed directory backend                        o Document                        o Integrate                o Add versions to code                o Have directories list recommended-versions                        o Include line in directories                        o Check for presence of line.                        o Quit if running the wrong version                        o Command-line option to override quit                o Add more information to directory server entries                        o Exit policies        o Clearer bandwidth management                 o Do we want to remove bandwidth from OR handshakes?                o What about OP handshakes?        X Move away from openssl                o Abstract out crypto calls                X Look at nss, others? Just include code?        o Use a stronger cipher                o aes now, by including the code ourselves        X On the fly compression of each stream        o Clean up the event loop (optimize and sanitize)        o Remove that awful concept of 'roles'        o Terminology                o Circuits, topics, cells stay named that                o 'Connection' gets divided, or renamed, or something?        o DNS farm                o Distribute queries onto the farm, get answers                o Preemptively grow a new worker before he's needed                o Prune workers when too many are idle                o DNS cache                           o Clear DNS cache over time                          D Honor DNS TTL info (how??)                o Have strategy when all workers are busy                o Keep track of which connections are in dns_wait                o Need to cache positives/negatives on the tor side                        o Keep track of which queries have been asked                o Better error handling when                        o An address doesn't resolve                        o We have max workers running                o Consider taking the master out of the loop?        X Implement reply onions        o Total rate limiting        o Look at OR handshake in more detail                o Spec it                o Merge OR and OP handshakes                o rearrange connection_or so it doesn't suck so much to read                D Periodic link key rotation. Spec?        o wrap malloc with something that explodes when it fails        o Clean up the number of places that get to look at prkey
 |