[or-cvs] r14325: Move some 0.2.0 TODO items into 0.2.1; remove some completed (in tor/trunk: . doc)

nickm at seul.org nickm at seul.org
Wed Apr 9 02:15:34 UTC 2008


Author: nickm
Date: 2008-04-08 22:15:34 -0400 (Tue, 08 Apr 2008)
New Revision: 14325

Modified:
   tor/trunk/
   tor/trunk/doc/TODO
Log:
 r19255 at catbus:  nickm | 2008-04-08 21:42:51 -0400
 Move some 0.2.0 TODO items into 0.2.1; remove some completed ones.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r19255] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO	2008-04-08 22:02:08 UTC (rev 14324)
+++ tor/trunk/doc/TODO	2008-04-09 02:15:34 UTC (rev 14325)
@@ -127,6 +127,8 @@
 Things Roger would be excited to see:
 
 Nick
+  - Send or-dev email about proposal statuses and about window for
+    new proposals.
   - Finish buffer stuff in libevent; start using it in Tor.
   - Tors start believing the contents of NETINFO cells.
   - Get a "use less buffer ram" patch into openssl.
@@ -192,58 +194,29 @@
   - Take non-Running entries out of the networkstatus consensus.
   - Move proposal 134 forward.
 
+Roger:
+  . Fix FAQ entry on setting up private Tor network
+
 =======================================================================
 
-For Tor 0.2.0.x-rc:
-R - Figure out the autoconf problem with adding a fallback consensus.
-R - add a geoip file
-W   - figure out license
+Bugs/issues for Tor 0.2.0.x:
 R - let bridges set relaybandwidthrate as low as 5kb
 R - bug: if we launch using bridges, and then stop using bridges, we
     still have our bridges in our entryguards section, and may use them.
-  . make it easier to set up a private tor network on your own computer
-    is very hard.
-R   . FAQ entry which is wrong
-
-N . geoip caching and publishing for bridges
-    d Track consecutive time up, not time since last-forgotten IP.
-    - Mention in dir-spec.txt
-    - Mention in control-spec.txt
-    D have normal relays report geoip stats too.
-    D different thresholds for bridges than for normal relays.
-    o bridge relays round geoip stats *up*, not down.
 R - bridge communities
     . spec
     . deploy
       - man page entries for Alternate*Authority config options
 
-Things we'd like to do in 0.2.0.x:
+Documentation for Tor 0.2.0.x:
+  - Proposals:
+    . 111: Prioritize local traffic over relayed.
+R     - Merge into tor-spec.txt.
+    - 113: mark as closed close.
 N - document the "3/4 and 7/8" business in the clients fetching consensus
     documents timeline.
 R   - then document the bridge user download timeline.
 
-N - Before the feature freeze:
-    - 105+TLS, if possible.
-      . TLS backend work
-        . Enable.
-      - Test
-        o Verify version negotiation on client
-        o Verify version negotiation on server
-        o Verify that client->server connection becomes open
-        - Verify that server->server connection becomes open and
-          authenticated.
-        - Verify that initiator sends no cert in first stage of TLS
-          handshake.
-      - NETINFO fallout
-        - Don't extend a circuit over a noncanonical connection with
-          mismatched address.
-        - Learn our outgoing IP address from netinfo cells?
-
-  - Proposals:
-    . 111: Prioritize local traffic over relayed.
-R     - Merge into tor-spec.txt.
-    - 113: close.
-
 =======================================================================
 
 For 0.2.1.x:
@@ -263,9 +236,19 @@
       decision-making.
     - Draft proposal for GeoIP aggregation (see external constraints *)
 
+  - Items to backport to 0.2.0.x-rc once solved in 0.2.1.x:
+R   - Figure out the autoconf problem with adding a fallback consensus.
+R   - add a geoip file
+W     - figure out license
+
   - Use less RAM *
+    - Optimize cell pool allocation.
   - Handle multi-core cpus better
   - Use information from NETINFO cells
+    - Don't extend a circuit over a noncanonical connection with
+      mismatched address.
+    - Learn our outgoing IP address from netinfo cells?
+    - Learn skew from netinfo cells?
   - Better test coverage
   - Use more mid-level and high-level libevent APIs
   - Emulate NSS better:
@@ -273,7 +256,11 @@
     - Normalized lists of extensions *
 
 
+Nice to have for 0.2.1.x:
+  - Better support for private networks: figure out what is hard, and
+    make it easier.
 
+
 Planned for 0.2.1.x:
   - Refactoring:
     . Make cells get buffered on circuit, not on the or_conn.



More information about the tor-commits mailing list