|
@@ -92,15 +92,6 @@ Andrew
|
|
|
- Should we still be telling you how to use Safari on OS X for Tor,
|
|
|
given all the holes that Torbutton-dev solves on Firefox?
|
|
|
|
|
|
-Karsten
|
|
|
- o Make a hidden services explanation page with the hidden service
|
|
|
- diagrams. See img/THS-[1-6].png. These need some text to go along
|
|
|
- with them though, so people can follow what's going on.
|
|
|
- - We should consider a single config option TorPrivateNetwork that
|
|
|
- turns on all the config options for running a private test tor
|
|
|
- network. having to keep updating all the tools, and the docs,
|
|
|
- just isn't working.
|
|
|
-
|
|
|
Weasel
|
|
|
- Figure out how to make Vidalia and Tor play nicely on Debian, make
|
|
|
the necessary modifications, and make some Vidalia debs that pass
|
|
@@ -108,8 +99,6 @@ Weasel
|
|
|
- Fix bug 393.
|
|
|
- Get oftc to switch to Tor dns bulk exitlist. Or tell us why it's
|
|
|
not suitable yet.
|
|
|
- o Take non-Running entries out of the networkstatus consensus.
|
|
|
- [proposal 138]
|
|
|
- Move proposal 134 forward.
|
|
|
- putting port predictions in state file
|
|
|
- if tor hasn't been used in a while it stops fetching consensus
|
|
@@ -118,8 +107,6 @@ Weasel
|
|
|
Roger
|
|
|
- Finish tor-doc-bridge.wml
|
|
|
. Fix FAQ entry on setting up private Tor network
|
|
|
- - Review Karsten's hidden service diagrams
|
|
|
- - Roger should visit Internews DC sometime.
|
|
|
- Did we actually apply Steven's dkimproxy patch?
|
|
|
- Brainstorm about safe but effective ways for vidalia to
|
|
|
auto-update its user's bridges via Tor in the background.
|
|
@@ -166,8 +153,6 @@ R - investigate: it looks like if the bridge authority is unreachable,
|
|
|
we're not falling back on querying bridges directly?
|
|
|
R - if "no running bridges known", an application request should make
|
|
|
us retry all our bridges.
|
|
|
-R - get matt to make vidalia do a getinfo status/bootstrap-phase to
|
|
|
- get caught up after it connects.
|
|
|
R d Setting DirPort when acting as bridge will give false Warnings
|
|
|
|
|
|
For 0.2.1.x:
|
|
@@ -214,16 +199,9 @@ R d 128: families of private bridges
|
|
|
Named.
|
|
|
R d Do we want to maintain our own set of entryguards that we use as
|
|
|
next hop after the bridge?
|
|
|
- X Add an 'exit-address' line in the descriptor for servers that exit
|
|
|
- from something that isn't their published address.
|
|
|
- [I think tordnsel solved this. -RD]
|
|
|
d Possibly: revise link protocol to allow big circuit IDs,
|
|
|
variable-length cells, proposal-110 stuff, and versioned CREATES?
|
|
|
- o Eliminate use of v2 networkstatus documents in v3 authority
|
|
|
- decision-making.
|
|
|
N . Draft proposal for GeoIP aggregation (see external constraints *)
|
|
|
- o Separate Guard flags for "pick this as a new guard" and "keep this
|
|
|
- as an existing guard". First investigate if we want this.
|
|
|
. Figure out how to make good use of the fallback consensus file. Right
|
|
|
now many of the addresses in the fallback consensus will be stale,
|
|
|
so it will take dozens of minutes to bootstrap from it. This is a
|