[or-cvs] Flush more changes from sandbox

Nick Mathewson nickm at seul.org
Wed Sep 8 06:52:35 UTC 2004


Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv28436/doc

Modified Files:
	TODO 
Log Message:
Flush more changes from sandbox
 - make clients cache directories and use them to seed their router lists
   at startup.  This means clients have a datadir again.
 - Introduce a global_write_bucket.  We need to respond better to exhausting
   it.
 - Remove the last vestiges of LinkPadding and TrafficShaping.
 - Configuration infrastructure support for warning on obsolete options.
 - Refactor directory header parsing to use smartlist_split_string.
 - Respond to content-encoding headers by trying to uncompress as appropriate.
 - Reply with a deflated directory when a client asks for "dir.z".
   (We could use allow-encodings instead, but allow-encodings isn't
   specified in HTTP 1.0.)



Index: TODO
===================================================================
RCS file: /home/or/cvsroot/doc/TODO,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -d -r1.157 -r1.158
--- TODO	21 Aug 2004 00:28:58 -0000	1.157
+++ TODO	8 Sep 2004 06:52:33 -0000	1.158
@@ -12,32 +12,46 @@
         X Abandoned
 
       0.0.9:
-        - the user interface interface
-        - let tor clients use http proxies for dir fetching
-        - let tor servers use http proxies for port 80 exits
-        - write instructions for port-forwarding directives or programs
+        o Fix OutboundBindAddress
+        o Config defaults should be consistant with config file and no
+          config file.
+        o write instructions for port-forwarding directives or programs
           to let people run on ports 80 and 443 without needing to bind
           tor to them.
-        - learn from ben about his openssl-reinitialization-trick to
-          rotate tls keys without making new connections.
-        - figure out how to handle rendezvousing with unverified nodes.
-        - clean up all the comma-separated stuff (eg exit policies) into
+        o clean up all the comma-separated stuff (eg exit policies) into
           smartlists.
-        - per-month byte allowances.
-        - node 'groups' that are known to be in the same zone of control.
-        - figure out enclaves, e.g. so we know what to recommend that people
+        o investigate sctp for alternate transport.
+ 	o Document all undocumented options, or mark them as undocumented
+	  in the source.
+        o bandwidth buckets for write as well as read.
+        . Cached-directory changes:
+            o make clients store the cached-directory to disk,
+            o and use it when they startup, so they don't need to bootstrap
+              from the authdirservers every time they start.
+            - also, once we've reduced authdirserver entries to config
+              lines, we can have lines that list cacheddirservers too.
+        . compress the directory.
+	    o Implement gzip/zlib wrappers
+	    o Compress directories as they're cached/generated
+	    o When requested, give a compressed directory.
+	    o Decompress incoming HTTP based on Content-Encoding
+	    - Once dirservers are running new code, make clients
+	      request compressed directories.  (Alternative: Switch
+	      to HTTP/1.1 and use Allowed-Encoding.  Is that really
+	      what we want?)
+N       - switch dirservers entries to config lines.
+N       - let tor clients use http proxies for dir fetching
+N       - per-month byte allowances.
+Nr      - figure out how to handle rendezvousing with unverified nodes.
+Nr      - figure out enclaves, e.g. so we know what to recommend that people
           do, and so running a tor server on your website is helpful.
-        - compress the directory.
-        - switch dirservers entries to config lines.
-        - investigate sctp for alternate transport.
-        - nt services on win32.
-        - bandwidth buckets for write as well as read.
-        - make clients store the cached-directory to disk, and use it
-          when they startup, so they don't need to bootstrap from the
-          authdirservers every time they start. also, once we've reduced
-          authdirserver entries to config lines, we can have lines that
-          list cacheddirservers too.
+        - node 'groups' that are known to be in the same zone of control.
+        - let tor servers use http proxies for port 80 exits
+        - the user interface interface
         - add ipv6 support.
+        - learn from ben about his openssl-reinitialization-trick to
+          rotate tls keys without making new connections.
+        D nt services on win32.
 
       0.0.8:
         - fix sprintf's to snprintf's?
@@ -94,6 +108,7 @@
         - if destination IP is running a tor node, extend a circuit there
           before sending begin.
 * don't do this for now. figure out how enclaves work. but do enclaves soon.
+        - Track max ten-second b/w ever seen, to show operator
 
       more features, complex:
         - compress the directory. client sends http header



More information about the tor-commits mailing list