[or-cvs] take some items off the todo

Roger Dingledine arma at seul.org
Mon Apr 4 04:09:36 UTC 2005


Update of /home2/or/cvsroot/tor/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc

Modified Files:
	TODO 
Log Message:
take some items off the todo


Index: TODO
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/TODO,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -d -r1.297 -r1.298
--- TODO	1 Apr 2005 07:04:40 -0000	1.297
+++ TODO	4 Apr 2005 04:09:34 -0000	1.298
@@ -152,14 +152,13 @@
     - Windows. (?)
 
  Correctness
-   - Mark bugs for 010 or post 010 in bugtracker.
-   - Bugfixes
-R    - when we haven't explicitly sent a socks reject, sending one in
+   o Bugfixes
+     o when we haven't explicitly sent a socks reject, sending one in
        connection_about_to_close_connection() fails because we never give it
        a chance to flush. right answer is to do the socks reply manually in
        each appropriate case, and then about-to-close-connection can simply
        warn us if we forgot one. [Tag this 010 in flyspray.]
-R    - should retry exitpolicy end streams even if the end cell didn't
+     o should retry exitpolicy end streams even if the end cell didn't
        resolve the address for you
    o Figure out when to reset addressmaps (on hup, on reconfig, etc)
    - how do ulimits work on win32, anyway?  (We should handle WSAENOBUFS as
@@ -178,7 +177,6 @@
      o start counting again if your IP ever changes.
      o never regenerate identity keys, for now.
      o you can set a bit for not-being-an-OR.
-       * no need to do this yet. few people define their ORPort.
 
  Arguable
 N - tor-resolve script should use socks5 to get better error messages.
@@ -204,8 +202,8 @@
     - Write limiting; configurable token buckets.
     - Make it harder to circumvent bandwidth caps: look at number of bytes
       sent across sockets, not number sent inside TLS stream.
-  - Hidden service improvements
-    - Investigate hidden service performance/reliability
+  o Hidden service improvements
+    o Investigate hidden service performance/reliability
   - Add private:* alias in exit policies to make it easier to ban all the
     fiddly little 192.168.foo addresses.
   - controller should have an event to learn about new addressmappings?



More information about the tor-commits mailing list