[or-cvs] r17512: {tor} more updates on our todo files (tor/trunk/doc)

arma at seul.org arma at seul.org
Sun Dec 7 23:43:56 UTC 2008


Author: arma
Date: 2008-12-07 18:43:55 -0500 (Sun, 07 Dec 2008)
New Revision: 17512

Modified:
   tor/trunk/doc/TODO.021
   tor/trunk/doc/TODO.external
Log:
more updates on our todo files


Modified: tor/trunk/doc/TODO.021
===================================================================
--- tor/trunk/doc/TODO.021	2008-12-07 23:41:10 UTC (rev 17511)
+++ tor/trunk/doc/TODO.021	2008-12-07 23:43:55 UTC (rev 17512)
@@ -25,32 +25,23 @@
 Things Roger would be excited to see:
 
 Nick
-  - Finish buffer stuff in libevent; start using it in Tor.
+  * Look at Roger's proposal 141 discussions on or-dev, and help us
+    decide how to proceed.
   - Tors start believing the contents of NETINFO cells.
-  . Work with Steven and Roger to decide which parts of Paul's project
-    he wants to work on.
   - respond to Steven's red-team TLS testing (a.k.a, look at a packet
     dump and compare)
 
 Matt
   - Fit Vidalia in 640x480 again.
-  - Vidalia should display/edit PlaintextPorts events/config.
   - Vidalia should avoid stomping on your custom exit policy lines
     just because you click on 'save' for a totally different config thing.
   - How much space do we save in TBB by stripping symbols from Vidalia
     first? Good idea or crazy idea?
 
 ioerror
-  - gmail auto responder so you send us an email and we send you a Tor
-    binary. Probably needs a proposal first.
-    - document how it works / what its interface is
-    - set it up so people can 'get tor' in many languages, and so the
-      docs we send back are in many languages.
-  - weather.torproject.org should go live.
+  * weather.torproject.org should go live.
   - Keep advocating new Tor servers and working with orgs like Mozilla
     to let them like Tor.
-  - Start converting critical wiki pages into real Tor wml pages. E.g.,
-    https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures
   - Find out what happened to the buildbot and get it back up:
     http://tor-buildbot.freehaven.net:8010/
   - Learn about locking memory pages that have sensitive content. Get
@@ -58,24 +49,18 @@
   - Translation portal
     - Vidalia html help files
     - should we i18nize polipo's error messages too?
+    - how to get our diagrams translated, and how to get our screenshots
+      from the right language?
     - Some of our translated wml files are very old -- so old that they
       are harmful to leave in place. We need some sort of way to notice
       this and disable them.
 
 Steven
-  - Figure out (or give up on) how to run Tor Browser and ordinary
-    Firefox side-by-side.
-  - Write a list of research items Tor would like to see done, for the
-    volunteer page. Pick a few you'd like to work on yourself.
   - Move proposal 131 or equivalent forward.
   - Keep bugging us about exploits on the .exit notation.
-  - If relays have 100KB/s but set relaybandwidthrate to 10KB/s, do your
-    interference attacks still work?
   - Mike's question #3 on https://www.torproject.org/volunteer#Research
   - Worthwhile shipping TBB with some local html help files that come
     as bookmarks?
-  - Decide whether TBB should use Torbutton's "lock" feature.
-    http://archives.seul.org/or/cvs/Jun-2008/msg00186.html
 
 Andrew
   - Which bundles include Torbutton? Change the docs/tor-doc-foo pages
@@ -180,7 +165,7 @@
            missing: delayed descriptor publication for 'stealth' mode.
 R   d 128: families of private bridges
     - 134: handle authority fragmentation.
-    o 135: simplify configuration of private tor networks.  Th
+    o 135: simplify configuration of private tor networks.
     - 140: Provide diffs betweeen consensuses
 K   - 143: Improvements of Distributed Hidden Service Descriptor Storage:
            only easy parts for 0.2.1.x, defer complex ones to 0.2.2.x.
@@ -194,6 +179,10 @@
     - 145: Separate "suitable from a guard" from "suitable as a new guard"
     - 146: Adding new flag to reflect long-term stability
     - 149: Using data from NETINFO cells
+      - Don't extend a circuit over a noncanonical connection with
+        mismatched address.
+      - Learn our outgoing IP address from netinfo cells?
+      - Learn skew from netinfo cells?
 
   - Proposals to write:
     - Fix voting to handle bug 608 case when multiple servers get
@@ -244,11 +233,6 @@
   - Handle multi-core cpus better
     - Split circuit AES across cores?
     - Split TLS across cores?  This will be harder.
-  - Use information from NETINFO cells
-    - Don't extend a circuit over a noncanonical connection with
-      mismatched address.
-    - Learn our outgoing IP address from netinfo cells?
-    - Learn skew from netinfo cells?
   - Testing
     - Better unit test coverage
     - Refactor unit tests into multiple files
@@ -264,13 +248,15 @@
     - make is-consensus-fresh-enough check way tighter.
     - If we haven't tried downloading a consensus for ages since we're tired,
       try getting a new one before we use old descriptors for a circuit.
-      Related to bug 401.
+      Related to bug 401. [What does "since we're tired" mean? -RD]
 
   - Feature removals and deprecations:
     - Get rid of the v1 directory stuff (making, serving, and caching)
-      - First verify that the caches won't flip out?
-        - If they will, just stop the caches from caching for now
-      - perhaps replace it with a "this is a tor server" stock webpage.
+      . First verify that the caches won't flip out?
+        o If they will, just stop the caches from caching for now
+      . perhaps replace it with a "this is a tor server" stock webpage.
+        - Get the debs to set DirPortFrontPage in the default.
+        - Decide how to handle DirPortFrontPage files with image links.
     - The v2dir flag isn't used for anything anymore, right? If so, dump it.
     - Even clients run rep_hist_load_mtbf_data(). Does this waste memory?
       Dump it?
@@ -302,7 +288,6 @@
     - Refactor the HTTP logic so the functions aren't so large.
     - Refactor buf_read and buf_write to have sensible ways to return
       error codes after partial writes
-    o Router_choose_random_node() has a big pile of args. make it "flags".
     - Streamline how we pick entry nodes: Make choose_random_entry() have
       less magic and less control logic.
     - Don't call time(NULL) so much; instead have a static time_t field
@@ -326,8 +311,6 @@
     - Tor logs the libevent version on startup, for debugging purposes.
       This is great. But it does this before configuring the logs, so
       it only goes to stdout and is then lost.
-    o Make TrackHostExits expire TrackHostExitsExpire seconds after their
-      *last* use, not their *first* use.
     - enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
     - Make 'safelogging' extend to info-level logs too.
     - don't do dns hijacking tests if we're reject *:* exit policy?
@@ -335,7 +318,6 @@
     - More consistent error checking in router_parse_entry_from_string().
       I can say "banana" as my bandwidthcapacity, and it won't even squeak.
 
-  - Interface for letting SOAT modify flags that authorities assign.
+  d Interface for letting SOAT modify flags that authorities assign.
     (How to keep the authority from clobbering them afterwards?
 
-

Modified: tor/trunk/doc/TODO.external
===================================================================
--- tor/trunk/doc/TODO.external	2008-12-07 23:41:10 UTC (rev 17511)
+++ tor/trunk/doc/TODO.external	2008-12-07 23:43:55 UTC (rev 17512)
@@ -32,9 +32,14 @@
   - end of October
     - Auto update
 C     - Get the MSI working and stable for Windows Tor installer.
+N     - Come up with an interface to export the package/bundle gloss
+        descriptions so Vidalia can display them.
 E     . Vidalia calls Thandy, learns when to upgrade, requests the upgrade.
 ?     - Teach our OSX installer to register its version on install
 
+  - end of December
+I   - Periodic summaries of localization progress: both pootle and wml.
+
   - mid January
 KS  . Finish testing, debugging, unit testing, etc the hidden service
       changes. Have it in the development version and in use.
@@ -43,6 +48,7 @@
 
   - end of January
 NSE - Write first draft of research study for Paul's research problem.
+I   - Periodic summaries of localization progress: both pootle and wml.
 
   - mid February
 S   - Examine current load balancing issues and evaluate trade-offs
@@ -58,7 +64,8 @@
 
 S   - Write a summary of progress toward understanding risks to relays
       (and thus bridges) from letting attackers route traffic through
-      them.
+      them. Eg, if relays have 100KB/s but set relaybandwidthrate to
+      10KB/s, do your interference attacks still work?
 
 R   - Revise and publish incentive draft paper
       - Write an explanation for its current flaws
@@ -94,6 +101,9 @@
         - Start playing around with figuring out which one is more
           accurate, or how to combine them to get better guesses,
           or something.
+R       - Roger should walk Karsten through applying (and maybe
+          updating) the patch for each method, and write a summary
+          of what we have tried/guessed so far.
       - Automatically collect and document or publish other monthly
         statistics
         - Total data over time
@@ -150,8 +160,12 @@
       - Continue analyzing "traces" left on host machine by use of
         Tor Browser. Write a summary of current progress, and what
         remains.
+      - Decide whether TBB should use Torbutton's "lock" feature.
+        http://archives.seul.org/or/cvs/Jun-2008/msg00186.html
+I     - Jake learns how to build the TBB and takes over doing new
+        releases.
 
-I   - Periodic summaries of localization progress
+I   - Periodic summaries of localization progress: both pootle and wml.
 I   - Collecting user stories
 I   - Revise the 'Tor mirror page' so it doesn't list obsolete-looking
       timestamps. Just have two tables, "new enough" and "not new enough".



More information about the tor-commits mailing list