[or-cvs] r8907: Remove some completed or in-progress items from the voluntee (website/trunk/en)

nickm at seul.org nickm at seul.org
Sun Nov 5 17:59:49 UTC 2006


Author: nickm
Date: 2006-11-05 12:59:48 -0500 (Sun, 05 Nov 2006)
New Revision: 8907

Modified:
   website/trunk/en/volunteer.wml
Log:
Remove some completed or in-progress items from the volunteer.wml page

Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml	2006-11-05 15:52:33 UTC (rev 8906)
+++ website/trunk/en/volunteer.wml	2006-11-05 17:59:48 UTC (rev 8907)
@@ -10,9 +10,6 @@
 <ol>
 <li>Please consider <a href="<page docs/tor-doc-server>">running
 a server</a> to help the Tor network grow.</li>
-<li>Take a look at the <a href="<page gui/index>">Tor GUI Competition</a>, and
-contribute to making Tor's interface
-and usability better. Free Tor T-shirt for each submission!</li>
 <li>Tell your friends! Get them to run servers. Get them to run hidden
 services. Get them to tell their friends.</li>
 <li>We are looking for funding and sponsors. If you like Tor's goals, please
@@ -64,7 +61,9 @@
 its tweak (that's probably more portable). Can somebody write one for us
 and we'll put it into <a href="<svnsandbox>contrib/">contrib/</a>?
 This is a good entry for the <a href="<page gui/index>">Tor GUI
-competition</a>.</li>
+competition</a>.
+  <!-- We have a good script to adjust stuff now, right? -NM -->
+</li>
 <li>Tor can <a
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ChooseEntryExit">exit
 the Tor network from a particular exit node</a>, but we should be able
@@ -91,13 +90,15 @@
 functionality for Firefox 1.5+? We hear Tor is much faster when you take
 Privoxy out of the loop.</li>
 <li>Please help Matt Edman with the documentation and how-tos for his
-<a href="http://vidalia-project.net/">Tor Controller</a>.</li>
+Tor controller,
+<a href="http://vidalia-project.net/">Vidalia</a>.</li>
 <li>Evaluate and document
 <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">our
 list of programs</a> that can be configured to use Tor.</li>
 <li>We need better documentation for dynamically intercepting
 connections and sending them through Tor. tsocks (Linux), dsocks (BSD),
-and freecap (Windows) seem to be good candidates.</li>
+and freecap (Windows) seem to be good candidates, as would better
+use of our new TransPort feature.</li>
 <li>We have a huge list of <a href="http://wiki.noreply.org/noreply/TheOnionRouter/SupportPrograms">potentially useful
 programs that interface to Tor</a>. Which ones are useful in which
 situations? Please help us test them out and document your results.</li>
@@ -126,20 +127,6 @@
 into giving out fake ones. Second, any reliable distributed storage
 system will do, as long as it allows authenticated updates, but as far
 as we know no implemented DHT code supports authenticated updates.</li>
-<li>Tor exit servers need to do many DNS resolves in parallel. But
-gethostbyname() is poorly designed --- it blocks until it has finished
-resolving a query --- so it requires its own thread or process. So Tor
-is forced to spawn many separate DNS "worker" threads. There are some
-asynchronous DNS libraries out there, but historically they are buggy and
-abandoned. Are any of them stable, fast, clean, and free software? (Remember,
-Tor uses OpenSSL, and OpenSSL is (probably) not compatible with the GPL, so
-any GPL libraries are out of the running.) If so
-(or if we can make that so), we should integrate them into Tor. See <a
-href="http://archives.seul.org/or/talk/Sep-2005/msg00001.html">Agl's
-post</a> for one potential approach. Also see
-<a href="http://daniel.haxx.se/projects/c-ares/">c-ares</a> and
-<a href="http://www.monkey.org/~provos/libdnsres/">libdnsres</a>.
-</li>
 <li>Tor 0.1.1.x includes support for hardware crypto accelerators via
 OpenSSL. Nobody has ever tested it, though. Does somebody want to get
 a card and let us know how it goes?</li>
@@ -149,17 +136,10 @@
 buffers. Maybe this should be modelled after the Linux kernel buffer
 design, where you have many smaller buffers that link to each other,
 rather than monolithic buffers?</li>
-<li>Implement reverse DNS requests inside Tor (already specified in
-Section 5.4 of <a href="<svnsandbox>doc/tor-spec.txt">tor-spec.txt</a>).</li>
 <li>Perform a security analysis of Tor with <a
 href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine
 if there are good fuzzing libraries out there for what we want. Win fame by
 getting credit when we put out a new release because of you!</li>
-<li>How hard is it to patch bind or a
-DNS proxy to redirect requests to Tor via our <a
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CompatibleApplications">tor-resolve
-socks extension</a>? dsocks already does this on BSD. What about to
-convert UDP DNS requests to TCP requests and send them through Tor?</li>
 <li>Tor uses TCP for transport and TLS for link
 encryption. This is nice and simple, but it means all cells
 on a link are delayed when a single packet gets dropped, and



More information about the tor-commits mailing list