r25973: {website} add a bunch more projects; rearrange them; strip whitespace (website/trunk/getinvolved/en)

Author: arma Date: 2012-12-27 08:41:49 +0000 (Thu, 27 Dec 2012) New Revision: 25973 Modified: website/trunk/getinvolved/en/volunteer.wml Log: add a bunch more projects; rearrange them; strip whitespace Modified: website/trunk/getinvolved/en/volunteer.wml =================================================================== --- website/trunk/getinvolved/en/volunteer.wml 2012-12-26 23:15:13 UTC (rev 25972) +++ website/trunk/getinvolved/en/volunteer.wml 2012-12-27 08:41:49 UTC (rev 25973) @@ -8,7 +8,7 @@ <a href="<page index>">Home » </a> <a href="<page getinvolved/volunteer>">Volunteer</a> </div> - <div id="maincol"> + <div id="maincol"> <!-- PUT CONTENT AFTER THIS TAG --> <h1>A few things everyone can do now:</h1> <ol> @@ -30,7 +30,7 @@ yet described on that page, and you're comfortable sharing it with us, we'd love to hear from you.</li> </ol> - + <a id="Documentation"></a> <h2><a class="anchor" href="#Documentation">Documentation</a></h2> <ol> @@ -48,7 +48,7 @@ programs that interface to Tor</a>. Which ones are useful in which situations? Please help us test them out and document your results.</li> </ol> - + <a id="Advocacy"></a> <h2><a class="anchor" href="#Advocacy">Advocacy</a></h2> <ol> @@ -59,17 +59,17 @@ href="https://media.torproject.org/video/">Tor's Media server</a>, <a href="http://www.howcast.com/videos/90601-How-To-Circumvent-an-Internet-Proxy">Howcast</a>, - and <a href="http://www.youtube.com/thetorproject">YouTube</a>.</li> + and <a href="http://www.youtube.com/thetorproject">YouTube</a>.</li> <li>Create a poster, or a set of posters, around a theme, such as "Tor for Freedom!"</li> <li>Create a t-shirt design that incorporates "<a href="https://check.torproject.org/">Congratulations! You are using Tor!</a>" in any language.</li> </ol> - + <a id="opw"></a> <h2><a class="anchor" href="#opw">Outreach Program for Women</a></h2> - + <p> Several organisations, including Tor, are taking part in the <a href="https://live.gnome.org/OutreachProgramForWomen">2013 Outreach Program @@ -77,7 +77,7 @@ href="https://www.google-melange.com/gsoc/homepage/google/gsoc2012">Google Summer of Code</a> targeted at getting more women involved in open source. </p> - + <p> The program runs from January 2 through April 2, 2013. The application deadline is December 3, 2012 and it is best to start as early as possible @@ -85,11 +85,11 @@ you're a woman interested in fighting surveillance and censorship around the world then let us know! </p> - + <p> To apply... </p> - + <ol> <li>Read up on the <a href="https://live.gnome.org/OutreachProgramForWomen">outreach program</a>.</li> <li>Look over our projects and task ideas below. If nothing there strikes your fancy then feel free to make one of your own.</li> @@ -97,10 +97,10 @@ <li>Contact the maintainer of the project that you're interested in contributing to, and talk with them about how to get started. Maintainers are listed in the table below. Note that you need to submit a patch or contribute in some way before you can apply to the program.</li> <li><a href="https://live.gnome.org/OutreachProgramForWomen#Send_in_an_Application">Send your application</a> to opw-list@gnome.org. Please be available and responsive throughout the application period so we can work with you on improving it.</li> </ol> - + <a id="Projects"></a> <h2><a class="anchor" href="#Projects">Projects</a></h2> - + <p> Below are a list of Tor related projects we're developing and/or maintaining. Most discussions happen on IRC so if you're interested in any @@ -109,7 +109,7 @@ to ask questions, and don't hesitate to ask even if the main contributors aren't active at that moment. </p> - + <table id="projects"> <tr> <th>Name</th> @@ -118,15 +118,15 @@ <th>Activity</th> <th>Contributors</th> </tr> - + <tr> <td><a href="#project-tor">Tor</a></td> <td>Core</td> <td>C</td> <td>Heavy</td> - <td>nickm, arma, Sebastian</td> + <td>nickm, athena, arma</td> </tr> - + <tr class="alt"> <td>*<a href="#project-jtor">JTor</a></td> <td>Core</td> @@ -134,39 +134,39 @@ <td>None</td> <td>bleidl</td> </tr> - + <tr> <td><a href="#project-tbb">TBB</a></td> - <td>Usability</td> + <td>Bundle</td> <td>Sys Admin</td> <td>Moderate</td> <td>Erinn</td> </tr> - + <tr class="alt"> - <td><a href="#project-tails">Tails</a></td> - <td>Usability</td> - <td>Sys Admin</td> - <td>Heavy</td> - <td><a href="https://tails.boum.org/">#tails</a></td> + <td><a href="#project-torbrowser">Tor Browser</a></td> + <td>Browser</td> + <td>C</td> + <td>Moderate</td> + <td>mikeperry, pearl crescent</td> </tr> - + <tr> - <td><a href="#project-torsocks">Torsocks</a></td> - <td>Usability</td> - <td>C</td> - <td>Heavy</td> - <td>ioerror, nickm</td> + <td><a href="#project-torbutton">Torbutton</a></td> + <td>Browser Add-on</td> + <td>Javascript</td> + <td>Moderate</td> + <td>mikeperry</td> </tr> - + <tr class="alt"> - <td>*<a href="#project-torouter">Torouter</a></td> - <td>Usability</td> - <td>Sys Admin</td> - <td>Light</td> - <td>ioerror</td> + <td><a href="#project-httpseverywhere">HTTPS Everywhere</a></td> + <td>Browser Add-on</td> + <td>Javascript</td> + <td>Moderate</td> + <td>pde, mikeperry</td> </tr> - + <tr> <td><a href="#project-vidalia">Vidalia</a></td> <td>User Interface</td> @@ -174,7 +174,7 @@ <td>Light</td> <td>chiiph</td> </tr> - + <tr class="alt"> <td><a href="#project-arm">Arm</a></td> <td>User Interface</td> @@ -182,7 +182,7 @@ <td>Light</td> <td>atagar</td> </tr> - + <tr> <td><a href="#project-orbot">Orbot</a></td> <td>User Interface</td> @@ -190,39 +190,87 @@ <td>Moderate</td> <td>n8fr8, ioerror</td> </tr> - + <tr class="alt"> - <td><a href="#project-torbutton">Torbutton</a></td> - <td>Browser Add-on</td> - <td>Javascript</td> - <td>Moderate</td> - <td>mikeperry</td> + <td><a href="#project-tails">Tails</a></td> + <td>OS image</td> + <td>Sys Admin</td> + <td>Heavy</td> + <td><a href="https://tails.boum.org/">#tails</a></td> </tr> - + <tr> + <td><a href="#project-torramdisk">tor-ramdisk</a></td> + <td>OS image</td> + <td>Sys Admin</td> + <td>Light</td> + <td>blueness</td> + </tr> + + <tr class="alt"> + <td><a href="#project-torcloud">Tor cloud</a></td> + <td>OS image</td> + <td>Sys Admin</td> + <td>Light</td> + <td>runa</td> + </tr> + + <tr> + <td>*<a href="#project-torouter">Torouter</a></td> + <td>OS image</td> + <td>Sys Admin</td> + <td>Light</td> + <td>ioerror</td> + </tr> + + <tr class="alt"> + <td><a href="#project-torsocks">Torsocks</a></td> + <td>Usability</td> + <td>C</td> + <td>Heavy</td> + <td>ioerror, nickm</td> + </tr> + + <tr> <td><a href="#project-torbirdy">TorBirdy</a></td> <td>Browser Add-on</td> <td>JavaScript</td> <td>Heavy</td> <td>Sukhbir (sukhe), ioerror</td> </tr> - + <tr class="alt"> <td><a href="#project-obfsproxy">Obfsproxy</a></td> <td>Client Add-on</td> <td>C</td> - <td>Moderate</td> + <td>Light</td> <td>nickm, asn</td> </tr> - + <tr> + <td><a href="#project-pyobfsproxy">PyObfsproxy</a></td> + <td>Client Add-on</td> + <td>Python</td> + <td>Moderate</td> + <td>asn</td> + </tr> + + <tr class="alt"> <td><a href="#project-flash-proxy">Flash Proxy</a></td> <td>Client Add-on</td> <td>Python, JavaScript, Go</td> <td>Moderate</td> <td>dcf, aallai, jct</td> </tr> - + + <tr> + <td><a href="#project-brdgrd">bridge-guard</a></td> + <td>Client Add-on</td> + <td>C</td> + <td>Light</td> + <td>phw</td> + </tr> + <tr class="alt"> <td>*<a href="#project-thandy">Thandy</a></td> <td>Updater</td> @@ -230,31 +278,31 @@ <td>Light</td> <td>chiiph, Erinn, nickm</td> </tr> - + <tr> - <td>*<a href="#project-ooni-probe">Ooni Probe</a></td> - <td>Scanner</td> - <td>Python</td> - <td>Moderate</td> - <td>hellais, isis, ioerror</td> - </tr> - - <tr class="alt"> <td><a href="#project-shadow">Shadow</a></td> - <td>Experimentation</td> + <td>Simulator</td> <td>C, Python</td> <td>Moderate</td> <td>robgjansen</td> </tr> - + + <tr class="alt"> + <td><a href="#project-experimentor">ExperimenTor</a></td> + <td>Simulator</td> + <td>C, Perl</td> + <td>Light</td> + <td></td> + </tr> + <tr> - <td><a href="#project-torctl">TorCtl</a></td> - <td>Library</td> + <td><a href="#project-chutney">Chutney</a></td> + <td>Simulator</td> <td>Python</td> - <td>None</td> - <td>aagbsn</td> + <td>Light</td> + <td>nickm</td> </tr> - + <tr class="alt"> <td><a href="#project-stem">Stem</a></td> <td>Library</td> @@ -262,7 +310,7 @@ <td>Heavy</td> <td>atagar, neena</td> </tr> - + <tr> <td><a href="#project-txtorcon">Txtorcon</a></td> <td>Library</td> @@ -270,79 +318,95 @@ <td>Moderate</td> <td>meejah</td> </tr> - + <tr class="alt"> + <td><a href="#project-torctl">TorCtl</a></td> + <td>Library</td> + <td>Python</td> + <td>None</td> + <td>aagbsn</td> + </tr> + + <tr> <td><a href="#project-tlsdate">Tlsdate</a></td> <td>Utility</td> <td>C</td> - <td>Heavy</td> + <td>Light</td> <td>ioerror</td> </tr> - - <tr> + + <tr class="alt"> <td><a href="#project-metrics">Metrics</a></td> <td>Client Service</td> <td>Java</td> <td>Heavy</td> <td>karsten</td> </tr> - - <tr class="alt"> + + <tr> <td><a href="#project-atlas">Atlas</a></td> <td>Client Service</td> <td>JavaScript</td> <td>Moderate</td> <td>hellais</td> </tr> - - <tr> + + <tr class="alt"> <td><a href="#project-torstatus">TorStatus</a></td> <td>Client Service</td> <td>Python, Django</td> <td>None</td> <td></td> </tr> - - <tr class="alt"> + + <tr> <td><a href="#project-compass">Compass</a></td> <td>Client Service</td> <td>Python</td> <td>Heavy</td> <td>gsathya, karsten</td> </tr> - + + <tr class="alt"> + <td><a href="#project-torperf">Torperf</a></td> + <td>Client Service</td> + <td>C, Python</td> + <td>Light</td> + <td>karsten</td> + </tr> + <tr> + <td><a href="#project-onionoo">Onionoo</a></td> + <td>Backend Service</td> + <td>Java, Python</td> + <td>Moderate</td> + <td>karsten, gsathya</td> + </tr> + + <tr class="alt"> <td><a href="#project-weather">Weather</a></td> <td>Client Service</td> <td>Python</td> <td>None</td> <td>kaner</td> </tr> - - <tr class="alt"> + + <tr> <td><a href="#project-gettor">GetTor</a></td> <td>Client Service</td> <td>Python</td> <td>None</td> <td>kaner</td> </tr> - - <tr> + + <tr class="alt"> <td><a href="#project-torcheck">TorCheck</a></td> <td>Client Service</td> <td>Python, Perl</td> <td>None</td> <td>ioerror</td> </tr> - - <tr class="alt"> - <td><a href="#project-onionoo">Onionoo</a></td> - <td>Backend Service</td> - <td>Java, Python</td> - <td>Moderate</td> - <td>karsten, gsathya</td> - </tr> - + <tr> <td><a href="#project-bridgedb">BridgeDB</a></td> <td>Backend Service</td> @@ -350,73 +414,98 @@ <td>None</td> <td>kaner, nickm</td> </tr> - + <tr class="alt"> + <td>*<a href="#project-ooni-probe">Ooni Probe</a></td> + <td>Scanner</td> + <td>Python</td> + <td>Moderate</td> + <td>hellais, isis, ioerror</td> + </tr> + + <tr> <td><a href="#project-torflow">TorFlow</a></td> <td>Backend Service</td> <td>Python</td> <td>None</td> - <td>aagbsn</td> + <td>aagbsn, mikeperry</td> </tr> - - <tr> + + <tr class="alt"> <td>*<a href="#project-torbel">TorBEL</a></td> <td>Backend Service</td> <td>Python</td> <td>None</td> <td>Sebastian</td> </tr> + + <tr> + <td><a href="#project-tor2web">Tor2web</a></td> + <td>Client Service</td> + <td>python</td> + <td>Light</td> + <td>hellais, others</td> + </tr> + + <tr class="alt"> + <td><a href="#project-anonbib">Anonbib</a></td> + <td>Website</td> + <td>python</td> + <td>Light</td> + <td>arma, nickm</td> + </tr> + </table> - + <sub> * Project is still in an alpha state. </sub> - + <br /><br /> - + <a id="project-tor"></a> <h3>Tor (<a href="https://gitweb.torproject.org/tor.git">code</a>, <a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Client&component=Tor+Relay&component=vidalia&order=priority">bug + href="https://trac.torproject.org/projects/tor/report/12">bug tracker</a>)</h3> - + <p> Central project, providing the core software for using and participating in the Tor network. Numerous people contribute to the project to varying extents, but the chief architects are Nick Mathewson and Roger Dingledine. </p> - + <p> <b>Project Ideas:</b><br /> <i><a href="#limitCapabilities">Run With Limited Capabilities</a></i><br /> <i><a href="#torCleanup">Tor Codebase Cleanup</a></i><br /> - <i><a href="#httpsImersonation">HTTPS Server Impersonation</a></i><br /> + <i><a href="#httpsImpersonation">HTTPS Server Impersonation</a></i><br /> <i><a href="#chutneyExpansion">Make Chutney Do More, More Reliably</a></i> </p> - + <a id="project-jtor"></a> <h3><a href="https://github.com/brl/JTor/wiki">JTor</a> (<a href="https://github.com/brl/JTor">code</a>, <a href="https://github.com/brl/JTor/issues">bug tracker</a>)</h3> - + <p> Java implementation of Tor and successor to <a href="http://onioncoffee.sourceforge.net/">OnionCoffee</a>. This project isn't yet complete, and has been inactive since Fall 2010. </p> - + <a id="project-tbb"></a> <h3><a href="<page projects/torbrowser>">Tor Browser Bundle</a> (<a href="https://gitweb.torproject.org/torbrowser.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+bundles/installation&order=priority">bug - tracker</a>)</h3> - + tracker</a>, <a href="https://www.torproject.org/projects/torbrowser/design/">design doc</a>)</h3> + <p> The Tor Browser Bundle is an easy-to-use portable package of Tor, Vidalia, - and Firefox preconfigured to work together out of the box. This is actively - being worked on by Erinn Clark. + Torbutton, and a Firefox fork preconfigured to work together out of + the box. This is actively being worked on by Erinn Clark. </p> - + <!-- <p> <b>Project Ideas:</b><br /> @@ -424,74 +513,57 @@ <i><a href="#usabilityTesting">Usability testing of Tor</a></i> </p> --> - - <a id="project-tails"></a> - <h3><a href="https://tails.boum.org/">The Amnesic Incognito Live System</a> (<a - href="http://git.immerda.ch/?p=amnesia.git;a=summary">code</a>, <a - href="https://tails.boum.org/bugs/">bug + + <a id="project-torbrowser"></a> + <h3><a href="<page projects/torbrowser>">Tor Browser</a> (<a + href="https://gitweb.torproject.org/torbrowser.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+bundles/installation&order=priority">bug tracker</a>)</h3> - + <p> - The Amnesic Incognito Live System is a live CD/USB distribution - preconfigured so that everything is safely routed through Tor and leaves no - trace on the local system. This is a merger of the Amnesia and <a - href="http://www.anonymityanywhere.com/incognito/">Incognito</a> projects, - and still under very active development. + The Tor Browser is a modified Firefox that aims to resolve the privacy + and security issues in mainline Firefox. </p> - - <!-- - <p> - <b>Project Ideas:</b><br /> - <i><a href="#tailsHiddenServicePetnames">Petname system for Tor hidden - services</a></i><br /> - <i><a href="#tailsServer">Tails server: Self-hosted services behind - Tails-powered Tor hidden services</a></i> - </p> - --> - - <a id="project-torsocks"></a> - <h3><a href="http://code.google.com/p/torsocks/">Torsocks</a> (<a - href="https://gitweb.torproject.org/torsocks.git">code</a>, <a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torify&order=priority">bug + + <a id="project-torbutton"></a> + <h3><a href="<page torbutton/index>">Torbutton</a> (<a + href="https://gitweb.torproject.org/torbutton.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torbutton&order=priority">bug tracker</a>)</h3> - + <p> - Utility for adapting other applications to work with Tor. Development has - slowed and compatibility issues remain with some platforms, but it's - otherwise feature complete. + Firefox addon that addresses many of the client-side threats to browsing + the Internet anonymously. Mike has since continued to adapt it to new + threats, updated versions of Firefox, and possibly <a + href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">Chrome + as well</a>. </p> - - <!-- - <p> - <b>Project Ideas:</b><br /> - <i><a href="#torsocksForOSX">Make torsocks/dsocks work on OS X</a></i> - </p> - --> - - <a id="project-torouter"></a> - <h3><a - href="<wiki>doc/Torouter">Torouter</a> (<a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torouter&order=priority">bug + + <a id="project-httpseverywhere"></a> + <h3><a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> (<a + href="https://gitweb.torproject.org/https-everywhere.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/report/19">bug tracker</a>)</h3> - + <p> - Project to provide an easy-to-use, embedded Tor instance for routers. This - had high activity in late 2010, but has since been rather quiet. + HTTPS Everywhere is a Firefox and Chrome extension that encrypts + your communications with many major websites, making your browsing + more secure. </p> - + <a id="project-vidalia"></a> <h3><a href="<page projects/vidalia>">Vidalia</a> (<a href="https://gitweb.torproject.org/vidalia.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Vidalia&order=priority">bug tracker</a>)</h3> - + <p> The most commonly used user interface for Tor. Matt Edman started the project in 2006 and brought it to its current stable state. Development - slowed for several years, though Tomás Touceda has since taken a lead with - pushing the project forward. + slowed for several years, though Tomás Touceda has since taken the + lead with pushing the project forward. </p> - + <!-- <p> <b>Project Ideas:</b><br /> @@ -499,19 +571,19 @@ <i><a href="#vidalia-hidden-service-panel">Torrc plugin and improved hidden service configuration panel</a></i> </p> --> - + <a id="project-arm"></a> <h3><a href="http://www.atagar.com/arm/">Arm</a> (<a href="https://gitweb.torproject.org/arm.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=arm&order=priority">bug tracker</a>)</h3> - + <p> Command-line monitor for Tor. This has been under very active development by its author, Damian Johnson, since early 2009 to make it a better general-purpose controller for *nix environments. </p> - + <!-- <p> <b>Project Ideas:</b><br /> @@ -519,18 +591,18 @@ <i><a href="#armGui">GUI for Arm</a></i> </p> --> - + <a id="project-orbot"></a> <h3><a href="https://guardianproject.info/apps/orbot/">Orbot</a> (<a href="https://gitweb.torproject.org/orbot.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Orbot&order=priority">bug tracker</a>)</h3> - + <p> Provides Tor on the Android platform. This was under very active development up through Fall 2010, after which things have been quiet. </p> - + <!-- <p> <b>Project Ideas:</b><br /> @@ -539,47 +611,105 @@ <i><a href="#orbot-optimisation">Core Tor mobile optimisation</a></i> </p> --> - - <a id="project-torbutton"></a> - <h3><a href="<page torbutton/index>">Torbutton</a> (<a - href="https://gitweb.torproject.org/torbutton.git">code</a>, <a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torbutton&order=priority">bug + + <a id="project-tails"></a> + <h3><a href="https://tails.boum.org/">The Amnesic Incognito Live System</a> (<a + href="http://git.immerda.ch/?p=amnesia.git;a=summary">code</a>, <a + href="https://tails.boum.org/bugs/">bug tracker</a>)</h3> - + <p> - Firefox addon that addresses many of the client-side threats to browsing - the Internet anonymously. Mike has since continued to adapt it to new - threats, updated versions of Firefox, and possibly <a - href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">Chrome - as well</a>. + The Amnesic Incognito Live System is a live CD/USB distribution + preconfigured so that everything is safely routed through Tor and leaves no + trace on the local system. This is a merger of the Amnesia and <a + href="http://www.anonymityanywhere.com/incognito/">Incognito</a> projects, + and still under very active development. </p> - + + <!-- + <p> + <b>Project Ideas:</b><br /> + <i><a href="#tailsHiddenServicePetnames">Petname system for Tor hidden + services</a></i><br /> + <i><a href="#tailsServer">Tails server: Self-hosted services behind + Tails-powered Tor hidden services</a></i> + </p> + --> + + <a id="project-torramdisk"></a> + <h3><a href="http://opensource.dyc.edu/tor-ramdisk">Tor-ramdisk</a> (<a + href="">code</a>, <a + href="">bug tracker</a>)</h3> + + <p> + tor-ramdisk + </p> + + <a id="project-torcloud"></a> + <h3><a href="https://cloud.torproject.org/">Tor cloud</a> (<a + href="">code</a>, <a + href="">bug tracker</a>)</h3> + + <p> + Tor cloud + </p> + + <a id="project-torouter"></a> + <h3><a + href="<wiki>doc/Torouter">Torouter</a> (<a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torouter&order=priority">bug + tracker</a>)</h3> + + <p> + Project to provide an easy-to-use, embedded Tor instance for routers. This + had high activity in late 2010, but has since been rather quiet. + </p> + + <a id="project-torsocks"></a> + <h3><a href="http://code.google.com/p/torsocks/">Torsocks</a> (<a + href="https://gitweb.torproject.org/torsocks.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torify&order=priority">bug + tracker</a>)</h3> + + <p> + Utility for adapting other applications to work with Tor. Development has + slowed and compatibility issues remain with some platforms, but it's + otherwise feature complete. + </p> + + <!-- + <p> + <b>Project Ideas:</b><br /> + <i><a href="#torsocksForOSX">Make torsocks/dsocks work on OS X</a></i> + </p> + --> + <a id="project-torbirdy"></a> <h3>TorBirdy (<a href="https://github.com/ioerror/torbirdy">code</a>, <a href="https://trac.torproject.org/projects/tor/wiki/torbirdy/dev">bug tracker</a>)</h3> - + <p> TorBirdy is Torbutton for Thunderbird and related Mozilla mail clients. </p> - + <p> <b>Project Ideas:</b><br /> <i><a href="#improveTorbirdy">Improving TorBirdy</a></i><br /> </p> - + <a id="project-obfsproxy"></a> <h3><a href="<page projects/obfsproxy>">Obfsproxy</a> (<a href="https://gitweb.torproject.org/obfsproxy.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Pluggable+transport&order=priority">bug tracker</a>)</h3> - + <p> A proxy that shapes Tor traffic, making it harder for censors to detect and block Tor. </p> - + <!-- <p> <b>Project Ideas:</b><br /> @@ -588,96 +718,126 @@ <i><a href="#obfsproxy-fuzzer">Fuzzer for the Tor protocol</a></i> </p> --> - + + <a id="project-pyobfsproxy"></a> + <h3><a href="<page projects/obfsproxy>">PyObfsproxy</a> (<a + href="https://gitweb.torproject.org/user/asn/pyobfsproxy.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Pluggable+transport&order=priority">bug + tracker</a>)</h3> + + <p> + PyObfsproxy is a Python reimplementation of Obfsproxy, with the goal of + improving its agility in responding to new censor actions. + </p> + <a id="project-flash-proxy"></a> <h3><a href="https://crypto.stanford.edu/flashproxy/">Flash Proxy</a> (<a href="https://gitweb.torproject.org/flashproxy.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_information&status=needs_review&status=needs_revision&status=new&status=reopened&component=Flashproxy">bug tracker</a>)</h3> - + <p> Pluggable transport using proxies running in web browsers to defeat address-based blocking. </p> - + + <a id="project-brdgrd"></a> + <h3><a href="https://gitweb.torproject.org/brdgrd.git/blob/HEAD:/README">Flash Proxy</a> (<a + href="https://gitweb.torproject.org/brdgrd.git/tree">code</a>)</h3> + + <p> + brgbrd ("bridge guard") is a simple script that can be run on a + Tor bridge to induce the Tor clients connecting to it to be less + blockable. + </p> + <a id="project-thandy"></a> <h3>Thandy (<a href="https://gitweb.torproject.org/thandy.git">code</a>)</h3> - + <p> Updater for Tor. The project began in the Summer of 2008 but wasn't completed. Recently interest in it has been rekindled and many aspects of its design (including the language it'll be in) are currently in flux. </p> - - <a id="project-ooni-probe"></a> - <h3>Ooni Probe (<a - href="https://gitweb.torproject.org/ooni-probe.git">code</a>, <a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Ooni&order=priority">bug - tracker</a>)</h3> - - <p> - Censorship scanner, checking your local connection for blocked or modified - content. - </p> - + <a id="project-shadow"></a> <h3><a href="https://shadow.cs.umn.edu/">Shadow</a> (<a href="https://github.com/shadow">code</a>, <a href="https://github.com/shadow/shadow/issues">bug tracker</a>)</h3> - + <p> Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in. Shadow is open-source software that enables accurate, efficient, controlled, and repeatable Tor experimentation. </p> - - <a id="project-torctl"></a> - <h3>TorCtl (<a - href="https://gitweb.torproject.org/pytorctl.git">code</a>, <a - href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torctl&order=priority">bug + + <a id="project-experimentor"></a> + <h3><a href="">ExperimenTor</a> (<a + href="">code</a>, <a + href="">bug tracker</a>)</h3> - + <p> - Python bindings and utilities for using the Tor control port. It has been - stable for several years, with only minor revisions. + ExperimenTor </p> - + + <a id="project-chutney"></a> + <h3><a href="">Chutney</a> (<a + href="">code</a>, <a + href="">bug + tracker</a>)</h3> + + <p> + Chutney + </p> + <a id="project-stem"></a> <h3><a href="https://stem.torproject.org/">Stem</a> (<a href="https://gitweb.torproject.org/stem.git">code</a>, <a href="https://trac.torproject.org/projects/tor/wiki/doc/stem/bugs">bug tracker</a>)</h3> - + <p> Python controller library with a similar scope to TorCtl, but with better testing, documentation, and API. This project is not yet feature complete. </p> - + <p> <b>Project Ideas:</b><br /> <i><a href="#stemUsability">Stem Usability Improvements</a></i> </p> - + <a id="project-txtorcon"></a> <h3>Txtorcon (<a href="https://github.com/meejah/txtorcon">code</a>, <a href="https://txtorcon.readthedocs.org">docs</a>)</h3> - + <p> Twisted-based asynchronous Tor control protocol implementation. Includes unit-tests, examples, state-tracking code and configuration abstraction. Used by OONI and APAF. </p> - + + <a id="project-torctl"></a> + <h3>TorCtl (<a + href="https://gitweb.torproject.org/pytorctl.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torctl&order=priority">bug + tracker</a>)</h3> + + <p> + Python bindings and utilities for using the Tor control port. It has been + stable for several years, with only minor revisions. + </p> + <a id="project-tlsdate"></a> <h3>Tlsdate (<a href="https://github.com/ioerror/tlsdate">code</a>)</h3> - + <p> tlsdate: secure parasitic rdate replacement </p> - + <p> tlsdate sets the local clock by securely connecting with TLS to remote servers and extracting the remote time out of the secure handshake. Unlike @@ -685,7 +845,7 @@ enabled service, and provides some protection against adversaries that try to feed you malicious time information. </p> - + <a id="project-metrics"></a> <h3><a href="https://metrics.torproject.org/">Metrics</a> (code: <a href="https://gitweb.torproject.org/metrics-db.git">db</a>, <a @@ -693,32 +853,32 @@ href="https://gitweb.torproject.org/metrics-web.git">web</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Metrics&order=priority">bug tracker</a>)</h3> - + <p> Processing and analytics of consensus data, provided to users via the metrics portal. This has been under active development for several years by Karsten Loesing. </p> - + <p> <b>Project Ideas:</b><br /> <i><a href="#metricsSearch">Searchable Tor descriptor and Metrics data archive</a></i> (Python/Django?) </p> - + <a id="project-atlas"></a> <h3><a href="https://atlas.torproject.org/">Atlas</a> (<a href="https://gitweb.torproject.org/atlas.git">code</a>)</h3> - + <p> Atlas is a web application to discover Tor relays and bridges. It provides useful information on how relays are configured along with graphics about their past usage. This is the third evolution of the TorStatus application. </p> - + <a id="project-torstatus"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/TorStatus">TorStatus</a> (<a href="https://gitweb.torproject.org/torstatus.git">code</a>)</h3> - + <p> Portal providing an overview of the Tor network, and details on any of its current relays. Though very actively used, this project has been @@ -727,86 +887,107 @@ codebase</a> was written in PHP, and students from Wesleyan wrote the new Django counterpart. </p> - + <a id="project-compass"></a> <h3><a href="https://compass.torproject.org/">Compass</a> (<a href="https://gitweb.torproject.org/compass.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Compass&order=priority">bug tracker</a>)</h3> - + <p> Compass is a web and command line application that filters and aggregates the Tor relays based on various attributes. </p> - + <p> <b>Project Ideas:</b><br /> <i><a href="#compassRefactoring">Compass Refactoring</a></i> </p> - + + <a id="project-torperf"></a> + <h3><a href="">Torperf</a> (<a + href="">code</a>, <a + href="">bug + tracker</a>)</h3> + + <p> + TorPerf + </p> + + <a id="project-onionoo"></a> + <h3><a href="<page projects/onionoo>">Onionoo</a> (<a + href="https://gitweb.torproject.org/onionoo.git">java codebase</a>, <a + href="https://gitweb.torproject.org/pyonionoo.git">python + codebase</a>)</h3> + + <p> + Onionoo is a JSON based protocol to learn information about currently + running Tor relays and bridges. + </p> + <a id="project-weather"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Weather">Weather</a> (<a href="https://gitweb.torproject.org/weather.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Weather&order=priority">bug tracker</a>)</h3> - + <p> Provides automatic notification to subscribed relay operators when their relay's unreachable. This underwent a rewrite by the <a href="http://hfoss.wesleyan.edu/">Wesleyan HFOSS team</a>, which went live in early 2011. </p> - + <a id="project-gettor"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/GetTor">GetTor</a> (<a href="https://gitweb.torproject.org/gettor.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=GetTor&order=priority">bug tracker</a>)</h3> - + <p> E-mail autoresponder providing Tor's packages over SMTP. This has been relatively unchanged for quite a while. </p> - + <a id="project-torcheck"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/TorCheck">TorCheck</a> (<a href="https://svn.torproject.org/svn/check/trunk/">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Tor+Check&order=priority">bug tracker</a>)</h3> - + <p> Provides a simple site for determining if the visitor is using Tor or not. This has been relatively unchanged for quite a while. </p> - - <a id="project-onionoo"></a> - <h3><a href="<page projects/onionoo>">Onionoo</a> (<a - href="https://gitweb.torproject.org/onionoo.git">java codebase</a>, <a - href="https://gitweb.torproject.org/pyonionoo.git">python - codebase</a>)</h3> - - <p> - Onionoo is a JSON based protocol to learn information about currently - running Tor relays and bridges. - </p> - + <a id="project-bridgedb"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/BridgeDB">BridgeDB</a> (<a href="https://gitweb.torproject.org/bridgedb.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=BridgeDB&order=priority">bug tracker</a>)</h3> - + <p> Backend bridge distributor, handling the various pools they're distributed in. This was actively developed until Fall of 2010. </p> - + + <a id="project-ooni-probe"></a> + <h3>Ooni Probe (<a + href="https://gitweb.torproject.org/ooni-probe.git">code</a>, <a + href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Ooni&order=priority">bug + tracker</a>)</h3> + + <p> + Censorship scanner, checking your local connection for blocked or modified + content. + </p> + <a id="project-torflow"></a> <h3><a href="https://trac.torproject.org/projects/tor/wiki/org/roadmaps/TorFlow">TorFlow</a> (<a href="https://gitweb.torproject.org/torflow.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=Torflow&order=priority">bug tracker</a>)</h3> - + <p> Library and collection of services for actively monitoring the Tor network. These include the Bandwidth Scanners (measuring throughput of relays) and @@ -815,14 +996,14 @@ months later. Both have been under active use since then, but development has stopped. </p> - + <a id="project-torbel"></a> <h3><a href="https://blog.torproject.org/blog/torbel-tor-bulk-exit-list-tools">TorBEL</a> (<a href="https://gitweb.torproject.org/torbel.git">code</a>, <a href="https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_review&status=new&status=reopened&component=TorDNSEL/TorBEL&order=priority">bug tracker</a>)</h3> - + <p> The Tor Bulk Exitlist provides a method of identifying if IPs belong to exit nodes or not. This is a replacement for TorDNSEL which is a stable @@ -830,11 +1011,32 @@ version of TorBEL was started in GSOC 2010 but since then the project has been inactive. </p> - + + <a id="project-tor2web"></a> + <h3><a + href="http://wiki.tor2web.org/index.php/Main_Page">Tor2web</a> (<a + href="https://github.com/globaleaks/tor2web-3.0/wiki">code</a>)</h3> + + <p> + Tor2web allows Internet users to browse websites running in <a + href="<page docs/hidden-services>">Tor hidden services</a>. It trades + user anonymity for usability by allowing anonymous content to be + distributed to non-anonymous users. + </p> + + <a id="project-anonbib"></a> + <h3><a + href="http://freehaven.net/anonbib/">Anonymity Bibliography</a> (<a + href="https://gitweb.torproject.org/anonbib.git">code</a>)</h3> + + <p> + anonbib + </p> + <a id="Coding"></a> <a id="Summer"></a> <h2><a class="anchor" href="#Coding">Project Ideas</a></h2> - + <p> You may find some of these projects to be good ideas for <a href="<page about/gsoc>">Google Summer of Code</a> and the <a @@ -848,9 +1050,9 @@ sending blind applications. You may also want to propose your own project idea — which often results in the best applications. </p> - + <ol> - + <!-- <a id="auditTBB"></a> <li> @@ -877,7 +1079,7 @@ not likely to be a good GSoC project.</p> </li> --> - + <!-- <a id="orbot-userInterface"></a> <li> @@ -903,7 +1105,7 @@ Tablet.</p> </li> --> - + <!-- <a id="armClientMode"></a> <li> @@ -921,10 +1123,10 @@ operators. However, this doesn't need to be the case. This project would be to expand and simplify arm to make it useful for Tor's client users too.</p> - + <p>This would include UI design, experimenting, and a lot of python hacking. Here's some ideas for client functionality arm could provide:</p> - + <ul> <li>A panel for client connections, showing each hop of the user's circuits with the ISP, country, and jurisdiction where those relays @@ -934,35 +1136,35 @@ information can be fetched safely (for instance, scraping rdns and whois lookups could give hints about a relay's ISP, but we'd need to do it on all Tor relays to avoid leaking our connections to the resolver).</li> - + <li>Options to let the user request new circuits (the "New Identity" feature in Vidalia), select the exit country, etc.</li> - + <li>A panel showing Internet application and if their connections are being routed through Tor or not (giving a warning if there's leaks).</li> - + <li>The status of the bridges we're configured to use (ie, are they up?). This would include adding control port functionality to Tor for <a href="https://trac.torproject.org/projects/tor/ticket/2068">ticket 2068</a>.</li> - + <li>A one click option to set Tor to be a client, relay, or bridge. The goal would be to make it trivial for users to voluntarily contribute to the Tor network.</li> - + <li>Menus as an alternative to hotkeys to make the interface more intuitive and usable for beginners (<a href="http://gnosis.cx/publish/programming/charming_python_6.html">example</a>).</li> - + <li>Look at Vidalia and TorK for ideas and solicit input from the Tor community.</li> </ul> - + <p> More information is available in the following sections of arm's dev notes: <a href="https://trac.torproject.org/projects/tor/wiki/doc/arm#ConnectionListingExpansion">Connection Listing Expansion</a>, <a href="https://trac.torproject.org/projects/tor/wiki/doc/arm#CircuitDetails">Circuit Details</a>, and <a href="https://trac.torproject.org/projects/tor/wiki/doc/arm#ClientModeUseCases">Client Mode Use Cases</a> </p> </li> --> - + <a id="compassRefactoring"></a> <li> <b>Compass Refactoring</b> @@ -986,7 +1188,7 @@ href="https://trac.torproject.org/6728">#6728</a>). </p> </li> - + <!-- <a id="orbot-optimisation"></a> <li> @@ -1005,7 +1207,7 @@ available (such as wireless network status) that could be taken advantage of. </p> - + <p> It should be noted, that even without optimisation, Tor is handling the mobile network environment very well, automatically detecting change in @@ -1015,13 +1217,13 @@ experience, and not any detailed study of what exactly is happening, and what threats might exist because of this constantly changing network state. </p> - + <p> Finally, the build process needs to be moved to the Android NDK from the custom GCC toolchain we are now using, and compatibility with Android 2.3 and 3.x Honeycomb OS need to be verified. </p> - + <p> For more information see the <a href="https://svn.torproject.org/svn/projects/android/trunk/Orbot/BUILD">Orbot @@ -1029,7 +1231,7 @@ </p> </li> --> - + <!-- <a id="obfsproxy-scanning-measures"></a> <li> @@ -1043,14 +1245,14 @@ <p>Involves providing good answers to <a href="https://lists.torproject.org/pipermail/tor-dev/2011-November/003073.html">this thread</a> as well as concrete implementation plans for it.</p> - + <p>This also involves implementing proposals <a href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/189-authorize-cell.txt">189</a> and <a href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/190-shared-secret-bridge-authorization.txt">190</a>.</p> </li> --> - + <!-- <a id="firewallProbeTool"></a> <li> @@ -1080,7 +1282,7 @@ </ul> </li> --> - + <!-- <a id="obfsproxy-fuzzer"></a> <li> @@ -1093,12 +1295,12 @@ Likely Mentors: <i>asn</i> <p>Involves researching good and smart ways to fuzz stateful network protocols, and also implementing the fuzzer.</p> - + <p>We are mostly looking for a fuzzer that fuzzes the Tor protocol itself, and not the Tor directory protocol.</p> - + <p>Bonus points if it's extremely modular. Relevant research:</p> - + <ul> <li>PROTOS - Security Testing of Protocol Implementations</li> <li>INTERSTATE: A Stateful Protocol Fuzzer for SIP</li> @@ -1111,8 +1313,8 @@ </ul> </li> --> - - <a id="httpsImersonation"></a> + + <a id="httpsImpersonation"></a> <li> <b>HTTPS Server Impersonation</b> <br> @@ -1130,7 +1332,7 @@ 203</a> has a general design sketch. </p> </li> - + <!-- <a id="geoIPUpgrade"></a> <li> @@ -1155,7 +1357,7 @@ project.</p> </li> --> - + <!-- <a id="unitTesting"></a> <li> @@ -1182,7 +1384,7 @@ changes in performance on machines in different roles automatically.</p> </li> --> - + <!-- <a id="vidaliaNetworkMap"></a> <li> @@ -1206,7 +1408,7 @@ more Tor exit relays and say, "I want my connections to exit from here." </p> - + <p> This project will first involve getting familiar with Vidalia and the Marble widget's API. One will then integrate the widget @@ -1214,7 +1416,7 @@ such as making circuits clickable, storing cached map data in Vidalia's own data directory, and customizing some of the widget's dialogs. </p> - + <p> A person undertaking this project should have good C++ development experience. Previous experience with Qt and CMake is helpful, but not @@ -1222,7 +1424,7 @@ </p> </li> --> - + <!-- <a id="resistCensorship"></a> <li> @@ -1263,7 +1465,7 @@ robustness.</p> </li> --> - + <a id="improveTorbirdy"></a> <li> <b>Improving TorBirdy</b> @@ -1284,11 +1486,11 @@ href="https://addons.mozilla.org/en-US/thunderbird/addon/torbirdy/">mozilla's addons site</a>. </p> - + <p> The goal of this project is to improve TorBirdy by: </p> - + <ul> <li> Writing a Thunderbird patch to plug known leaks. We have already <a @@ -1309,14 +1511,14 @@ href="https://trac.torproject.org/projects/tor/ticket/6319">ticket</a>) </li> </ul> - + <p> A student undertaking this project should have some C++ and JavaScript development experience. Previous experience with Firefox/Thunderbird extension development is a plus, but not required. </p> </li> - + <!-- <a id="user-space-transport"></a> <li> @@ -1345,7 +1547,7 @@ internals are highly desirable.</p> </li> --> - + <a id="chutneyExpansion"></a> <li> <b>Make Chutney Do More, More Reliably</b> @@ -1361,14 +1563,14 @@ making small local test networks. It's small, not widely used, and not as automated as it could be. </p> - + <p> It would be great to see chutney extended and a set of supporting tests built to the point where we could use Chutney to exercise various Tor features as an automated integration test. </p> </li> - + <!-- <a id="torsocksForOSX"></a> <li> @@ -1399,7 +1601,7 @@ </p> </li> --> - + <!-- <a id="obfsproxy-new-transports"></a> <li> @@ -1414,19 +1616,19 @@ interesting. Other ideas like bittorrent transports might be relevant, but you will have to provide security proofs on why they are harder to detect and block than other less-sophisticated transports.</p> - + <p>The whole point of this project, though, is to come up with new transports that we haven't already thought of. Be creative.</p> - + <p>Bonus points if your idea is interesting and still implementable through the summer period.</p> - + <p>More bonus points if it's implemented on top of obfsproxy, or if your implementation has a pluggable transport interface on top of it (as specified <a href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/180-pluggable-transport.txt">here</a>).</p> </li> --> - + <!-- <a id="orbot-orlibAndOutreach"></a> <li> @@ -1451,7 +1653,7 @@ </p> </li> --> - + <!-- <a id="tailsHiddenServicePetnames"></a> <li> @@ -1494,7 +1696,7 @@ Python using similar tools.</p> </li> --> - + <a id="limitCapabilities"></a> <li> <b>Run With Limited Capabilities</b> @@ -1509,7 +1711,7 @@ capabilities that it no longer needs, and other ways for a program to run pieces of itself in a sandbox with diminished privileges. </p> - + <p> We'd like to do this with Tor, to improve its resistance to attacks. The easiest areas to address would be on systems like <a @@ -1521,14 +1723,14 @@ privileges and pieces that don't with an eye towards sandboxing them differently. </p> - + <p> See tickets <a href="https://trac.torproject.org/7005">#7005</a> and <a href="https://trac.torproject.org/5219">#5219</a>, and their descendants, for more information. </p> </li> - + <a id="metricsSearch"></a> <li> <b>Searchable Tor descriptor and Metrics data archive</b> @@ -1546,7 +1748,7 @@ finds relays by nickname, fingerprint, or IP address in a given month; <a href="https://metrics.torproject.org/exonerator.html">ExoneraTor</a> finds whether a given IP address was a relay on a given day.</p> - + <p>We'd like to have a more general search application for Tor descriptors and metrics data. There are more <a href="https://metrics.torproject.org/formats.html">descriptor types</a> @@ -1558,7 +1760,7 @@ other descriptors should contain links, and descriptors should be able to say from where they are linked. The goal is to make the archive easily browsable.</p> - + <p>The search application shall be separate from the metrics website and shouldn't rely on the metrics website codebase. The search application will contain hourly updated descriptor data from the metrics website via @@ -1569,13 +1771,13 @@ too. Further requirements are that lookups should be really fast and that changes to the search application can be implemented in reasonable time.</p> - + <p>Applications for this project should come with a design of the proposed search application, ideally with a proof-of-concept based on a subset of the available data to show that it will be able to handle the 100G+ of data.</p> </li> - + <!-- <a id="simulateSlowConnections"></a> <li> @@ -1593,7 +1795,7 @@ difficult to improve the situation without being able to repeat the problems in the lab. </p> - + <p> This project would be to build a simulation environment which replicates the poor connectivity so that the effect on Tor performance @@ -1601,7 +1803,7 @@ establish what are the properties of connections available, and to measure the effect of performance-improving modifications to Tor. </p> - + <p> The tools used would be up to the student, but dummynet (for FreeBSD) and nistnet (for Linux) are two potential components on which this @@ -1611,7 +1813,7 @@ </p> </li> --> - + <!-- <a id="stemPathsupport"></a> <li> @@ -1630,26 +1832,26 @@ protocol</a> to help developers program against the tor process, enabling them to build things similar to <a href="#project-vidalia">Vidalia</a> and <a href="#project-arm">arm</a>.</p> - + <p>While TorCtl provided a fine first draft for this sort of functionality, it has not proved to be extensible nor maintainable. Stem is a rewrite of TorCtl with a heavy focus on testing, documentation, and providing a developer friendly API.</p> - + <p>At the moment stem is still very much incomplete, missing several pieces of functionality that TorCtl provides. This is a project to fix that by porting TorCtl's <a href="https://gitweb.torproject.org/pytorctl.git/blob/HEAD:/PathSupport.py">PathSupport module</a> to stem, writing tests for it, and migrate a couple clients to use it.</p> - + <p>PathSupport provides applications with programmatic control over how tor's circuits are built, for instance letting you exit from particular relays. This is used by projects like <a href="#project-torbel">TorBEL</a>, <a href="#project-torflow">the Bandwidth Scanners, and SoaT</a>.</p> - + <p>This project can be broken into three parts...</p> - + <ol style="list-style-type: decimal"> <li><p>Look at PathSupport's clients to figure out how it is used and come up with the API that we will use for stem. Note that the goal if @@ -1667,13 +1869,13 @@ API as we discover issues. A particularly good client to start with would be TorBEL.</p></li> </ol> - + <p><b> Upon reflection this is not an especially good project for this year's GSoC. You are still perfectly wecome to apply for this project, but <a href="https://trac.torproject.org/projects/tor/wiki/doc/stem">other stem related tasks</a> such as implementing a general controller, descriptor fetching, and client migrations would be better. For the discussion that lead to this see <a href="http://archives.seul.org/or/dev/Apr-2012/msg00006.html">this thread</a>. </b></p> </li> --> - + <a id="stemUsability"></a> <li> <b>Stem Usability Improvements</b> @@ -1692,30 +1894,30 @@ them to build things similar to <a href="#project-vidalia">Vidalia</a> and <a href="#project-arm">arm</a>. </p> - + <p> While TorCtl provided a fine first draft for this sort of functionality, it has not proved to be extensible nor maintainable. Stem is a rewrite of TorCtl with a heavy focus on testing, documentation, and providing a developer friendly API. </p> - + <p> Stem is very nearly feature complete but presently has no users. We want to change that prior to making our first release for a couple reasons... </p> - + <ul> <li>Make sure that we have a reasonably good API, and improve the rough edges that hurt its usability.</li> <li>Provide examples for how stem can be used.</li> </ul> - + <p> This project involves several tasks... </p> - + <ol> <li>Move stem's site to Tor's website (<a href="https://trac.torproject.org/projects/tor/ticket/7324">ticket</a>)</li> <li>Set up Piwik for our site (<a href="https://trac.torproject.org/projects/tor/ticket/7424">ticket</a>)</li> @@ -1723,7 +1925,7 @@ <li>Finally get your hands dirty using stem. We want to expand stem's <a href="https://stem.torproject.org/tutorial.html">tutorial page</a> with more examples. To do this you'll want to both brainstorm some of your own and contact the <a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev/">tor-dev@ email list</a> to solicit ideas. This last step is pretty open ended, so go nuts with whatever you think will improve stem's usability!</li> </ol> </li> - + <!-- <a id="tailsServer"></a> <li> @@ -1757,7 +1959,7 @@ amnesia property and limited support for persistent encrypted data allows to protect content, to a great degree, even in such contexts.</p> <p>In short, setting up a new Tails server would be done by:</p> - + <ol style="list-style-type: decimal"> <li>Alice plugs a USB stick into a running desktop Tails system.</li> <li>Alice uses a GUI to easily configure the needed services.</li> @@ -1773,12 +1975,12 @@ services</b> project would be very complementary to this one, by the way.)</li> </ol> - + <p>Tails server should content itself with hardware that is a bit old (such as a PIII-450 laptop with 256MB of RAM) and/or half broken (e.g. non-functional hard-disk, screen or keyboard).</p> <p>The challenges behind this project are:</p> - + <ul> <li>Design and write the services configuration GUI [keywords: edit configuration files, upgrade between major Debian versions, @@ -1791,7 +1993,7 @@ encryption passphrase without X, and possibly with a broken keyboard and/or screen [keywords: local network, SSL/TLS?, certificate?].</li> </ul> - + <p>This project can easily grow quite large, so the first task would probably be to clarify what it would need to get an initial (minimal but working) implementation ready to be shipped to users.</p> @@ -1810,7 +2012,7 @@ <p>For more information see https://tails.boum.org/todo/server_edition/</p> </li> --> - + <a id="torCleanup"></a> <li> <b>Tor Codebase Cleanup</b> @@ -1830,7 +2032,7 @@ you could make the code look better, read better, and (subject to testing) work better. </p> - + <p> If this is for a fun side-project, it would be great for you to work on anything that can be made better and more tested. For an internship-level @@ -1838,7 +2040,7 @@ knotty piece of the code to clean up, and aim for resolving the ugliest problems, not necessarily the easiest. </p> - + <p> For a big project here, it would be great to pick one of the major "submodules" of Tor -- path selection, node discovery, directory authority @@ -1846,7 +2048,7 @@ minify and codify its points of contact with the rest of Tor. </p> </li> - + <!-- <a id="vidaliaStatusEventInterface"></a> <li> @@ -1887,7 +2089,7 @@ design/Photoshop fu, since we might want/need some shiny new icons too.</p> </li> --> - + <!-- <a id="orbot-torbutton"></a> <li> @@ -1908,7 +2110,7 @@ on this so far.</p> </li> --> - + <!-- <a id="vidalia-hidden-service-panel"></a> <li> @@ -1923,11 +2125,11 @@ every Tor option is saved in the torrc file. With that change, the Hidden Service configuration panel was removed due to its specificity and its multiple bugs.</p> - + <p>The idea would be to provide the new Torrc class' functionality to the Plugin Engine and with that, create a better Hidden Service configuration panel as a plugin.</p> - + <p>A person undertaking this project should have good UI design, layout skills and some C++ development experience. Previous experience with Qt and Qt's Designer will be very helpful, but are not required. Javascript @@ -1935,7 +2137,7 @@ complies with the previous requirements.</p> </li> --> - + <!-- <a id="usabilityTesting"></a> <li> @@ -1952,14 +2154,14 @@ fixes or new features. We get this informally at the moment, but a more structured process would be better. </p> - + <p> Please note that since this isn't a coding project, it isn't suitable for Google Summer of Code. </p> </li> --> - + <a id="docUpdate"></a> <li> <b>Website and video documentation update</b> @@ -1978,7 +2180,7 @@ website tickets</a> for more information and a starting point. </p> </li> - + <li> <b>Bring up new ideas!</b> <br> @@ -1989,9 +2191,9 @@ Some of the <a href="<spectree>proposals">current proposals</a> might also be short on developers. </li> - + </ol> - + <a id="OtherCoding"></a> <h2><a class="anchor" href="#OtherCoding">Other Coding and Design related ideas</a></h2> <ol> @@ -2007,13 +2209,13 @@ the new libevent interface. Christian King made a <a href="https://svn.torproject.org/svn/libevent-urz/trunk/">good start</a> on this in the summer of 2007.</li> - + <li>We need to actually start building our <a href="<page docs/documentation>#DesignDoc">blocking-resistance design</a>. This involves fleshing out the design, modifying many different pieces of Tor, adapting <a href="<page projects/vidalia>">Vidalia</a> so it supports the new features, and planning for deployment.</li> - + <li>We need a flexible simulator framework for studying end-to-end traffic confirmation attacks. Many researchers have whipped up ad hoc simulators to support their intuition either that the attacks work @@ -2023,18 +2225,18 @@ See the entry <a href="#Research">below</a> on confirmation attacks for details on the research side of this task — who knows, when it's done maybe you can help write a paper or three also.</li> - + <li>Tor 0.1.1.x and later include support for hardware crypto accelerators via OpenSSL. It has been lightly tested and is possibly very buggy. We're looking for more rigorous testing, performance analysis, and optimally, code fixes to OpenSSL and Tor if needed.</li> - + <li>Perform a security analysis of Tor with <a href="https://secure.wikimedia.org/wikipedia/en/wiki/Fuzz_testing">"fuzz"</a>. Determine if there are good fuzzing libraries out there for what we want. Win fame by getting credit when we put out a new release because of you!</li> - + <li>Tor uses TCP for transport and TLS for link encryption. This is nice and simple, but it means all cells on a link are delayed when a single packet gets dropped, and @@ -2045,24 +2247,24 @@ href="<specblob>proposals/100-tor-spec-udp.txt">specification for Tor and UDP</a> — please let us know what's wrong with it.</li> - + <li>We're not that far from having IPv6 support for destination addresses (at exit nodes). If you care strongly about IPv6, that's probably the first place to start.</li> - + <li>We need a way to generate the website diagrams (for example, the "How Tor Works" pictures on the <a href="<page about/overview>">overview page</a> from source, so we can translate them as UTF-8 text rather than edit them by hand with Gimp. We might want to integrate this as an wml file so translations are easy and images are generated in multiple languages whenever we build the website.</li> - + <li>How can we make the various LiveCD/USB systems easier to maintain, improve, and document? One example is <a href="https://tails.boum.org/">The Amnesic Incognito Live System</a>. </li> - + <li> Another anti-censorship project is to try to make Tor more scanning-resistant. Right now, an adversary can identify <a @@ -2075,9 +2277,9 @@ To start, check out Shane Pope's <a href="http://dl.dropbox.com/u/37735/index.html">thesis and prototype</a>. </li> - + </ol> - + <a id="Research"></a> <h2><a class="anchor" href="#Research">Research</a></h2> <ol> @@ -2201,7 +2403,7 @@ connected? </li> </ol> - + <p> <a href="<page about/contact>">Let us know</a> if you've made progress on any of these! @@ -2215,4 +2417,4 @@ <!-- END SIDECOL --> </div> <!-- END CONTENT --> -#include <foot.wmi> +#include <foot.wmi>
participants (1)
-
Roger Dingledine