TODO.external 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. $Id: TODO 16258 2008-07-30 13:04:38Z nickm $
  2. Legend:
  3. SPEC!! - Not specified
  4. SPEC - Spec not finalized
  5. N - nick claims
  6. R - arma claims
  7. P - phobos claims
  8. S - Steven claims
  9. E - Matt claims
  10. M - Mike claims
  11. J - Jeff claims
  12. I - ioerror claims
  13. W - weasel claims
  14. K - Karsten claims
  15. C - coderman claims
  16. - Not done
  17. * Top priority
  18. . Partially done
  19. o Done
  20. d Deferrable
  21. D Deferred
  22. X Abandoned
  23. =======================================================================
  24. External constraints:
  25. - mid October
  26. W - Finish implementation of directory overhead changes: have a set
  27. of patches that you think work.
  28. - end of October
  29. - Auto update
  30. C - Get the MSI working and stable for Windows Tor installer.
  31. E . Vidalia calls Thandy, learns when to upgrade, requests the upgrade.
  32. ? - Teach our OSX installer to register its version on install
  33. - mid January
  34. KS . Finish testing, debugging, unit testing, etc the hidden service
  35. changes. Have it in the development version and in use.
  36. W - Finish testing, debugging, unit testing, etc the directory overhead
  37. changes. Have it in the development version and in use.
  38. - end of January
  39. NSE - Write first draft of research study for Paul's research problem.
  40. - mid February
  41. S - Examine current load balancing issues and evaluate trade-offs
  42. associated with other methods.
  43. - For each potential routing improvement strategy...
  44. - Explain method, calculate theoretical impact, estimate likely
  45. impact, prioritize
  46. - Establish implementation work plan
  47. - Document strategy for metrics and evaluation
  48. - Highlight which items on your list are doable in 2009.
  49. N - Write a summary of progress toward Overlapped I/O on Windows.
  50. S - Write a summary of progress toward understanding risks to relays
  51. (and thus bridges) from letting attackers route traffic through
  52. them.
  53. R - Revise and publish incentive draft paper
  54. - Write an explanation for its current flaws
  55. - Gather comments, search for new designs
  56. - Write up a summary of recommendations and next steps
  57. W - Download fewer descriptors
  58. - Summarize progress so far, on all the different approaches to
  59. reducing directory download overhead.
  60. - Measure/estimate impact of each improvement.
  61. - Build a plan and timeline for implementing the rest.
  62. N - Write a summary of progress toward "enumerating TLS fingerprint
  63. blocking risks and how we would overcome / respond to each".
  64. I - Email auto-responder
  65. - Document the design and spec.
  66. - Describe auto-responder "commands"
  67. - Describe DKIM requirement (and alternatives)
  68. - Describe how we're going to localize the text
  69. - Describe the workflow for a user that wants to know she's got
  70. the right file. Digitally signed installer? Feed it to the
  71. updater that recognizes signatures? Other options?
  72. - How do we better support users with limited email
  73. bandwidth? Multi-part download? Teach them how to reconnect
  74. their gmail? Does downloading your gmail work when your network
  75. keeps dying?
  76. K - Metrics.
  77. - Gather and document monthly usage metrics, by country
  78. - Using Roger's old method of counting users
  79. - Using Nick's new method of counting users
  80. - Start playing around with figuring out which one is more
  81. accurate, or how to combine them to get better guesses,
  82. or something.
  83. - Automatically collect and document or publish other monthly
  84. statistics
  85. - Total data over time
  86. - Number, availability and performance of relays
  87. - Advertised capacity
  88. - With Mike's help, use Torflow to start doing monthly rudimentary
  89. performance evaluations:
  90. - Circuit throughput and latency
  91. - Measure via Broadband and dialup
  92. - Make a few graphs of the most interesting public data
  93. - Publish a report addressing key long-term metrics questions:
  94. - What metrics should we present?
  95. - What data are available for these metrics?
  96. - What data are missing, and can collect them safely? Can we
  97. publish them safely?
  98. - What systems are available to present this data?
  99. E - Vidalia improvements
  100. - Implement Vidalia presentation of plaintext port warnings
  101. - Figure out a plan for presenting other Tor status warning events.
  102. - Move Polipo into the main Vidalia -dev bundle.
  103. - Vidalia displays by-country user summary for bridge operators
  104. R - Tor sends a status event or something so Vidalia knows what
  105. to display
  106. M - Network scanning and network health
  107. - Implement some initial automated scans.
  108. - Describe a roadmap for how to get from here to plausible,
  109. long-term security scanning tests for Tor network
  110. - Document a strategy for incorporating results into directory
  111. consensus documents. At what phases will we be ready to automate
  112. which parts? How will we recognize when we are ready?
  113. M - Torbutton development
  114. - Keep up with our bugfixes -- build a plan for (or resolve)
  115. every item in Flyspray, and other known issues.
  116. - Build a strategy for how Torbutton and Vidalia can
  117. communicate. E.g., what do we do with the 'new identity' button
  118. in Vidalia?
  119. - Make Torbutton happy on FF3, especially so TBB can drop FF2.
  120. C - Transparent interception of connections on Windows
  121. - Produce prototype, with screenshots for how to install and test.
  122. - Document open issues, future work, things users need to be aware
  123. of, etc.
  124. S - Tor Browser bundle work
  125. - Use native Vidalia (non-PortableFirefox) launcher for browser
  126. - Close Browser on clean Vidalia exit
  127. - Establish feasibility of simultaneous Firefox usage (also
  128. considering implications for (OpenVPN-style or other) system-wide
  129. Tor interception)
  130. - Switch Tor Browser Bundle to Firefox 3, once Torbutton is ready.
  131. - Continue analyzing "traces" left on host machine by use of
  132. Tor Browser. Write a summary of current progress, and what
  133. remains.
  134. I - Periodic summaries of localization progress
  135. I - Collecting user stories
  136. I - Revise the 'Tor mirror page' so it doesn't list obsolete-looking
  137. timestamps. Just have two tables, "new enough" and "not new enough".