[tor-commits] [tor/master] Remove TODO file.

nickm at torproject.org nickm at torproject.org
Mon Jan 14 19:50:35 UTC 2019


commit b269ab5aaeee65a3a0b1e5e0923d9dc7898c232e
Author: George Kadianakis <desnacked at riseup.net>
Date:   Mon Jan 14 15:07:19 2019 +0200

    Remove TODO file.
    
    All remaining tasks are now part of #28632.
---
 PADDING_TODO.txt | 58 --------------------------------------------------------
 1 file changed, 58 deletions(-)

diff --git a/PADDING_TODO.txt b/PADDING_TODO.txt
deleted file mode 100644
index a2e97f7ca..000000000
--- a/PADDING_TODO.txt
+++ /dev/null
@@ -1,58 +0,0 @@
-TODO sketch for this branch, in rough priority order:
-
-- Clean up/fix XXX's and FIXMEs
-  - Test event entry points into circuitpad?
-    - Most of our events come from completely untested code :/
-
-- Compat-breaking changes to be decided/done ASAP
-  - Option to keep circuits open if machine present
-  - Specify an ordered preference list of padding machines
-  - Specify exit policy for machine conditions?
-    - short_policy_t looks good, except for its flexible array member :/
-      - Can we make our own struct with a small, fixed number of policy
-        entries? Say 3-4? Or is that a bad idea to lose this flexibility?
-    - Check conditions based on attached streams on the circuit
-      - Accept should mean "only apply if matched"
-      - Reject should mean "don't apply if matched"
-      - If a policy is specified, Reject *:* is implicit default (so reject
-        policies need an Accept entry).
-      - With no policy, Accept *:* is implicit default.
-
-
-- Misc fixes:
-  - Remove circuitsetup machine (but place it in unittests -- they depend on it)
-  - Circuit RTT measurement will break on var_cell/EXTEND2 cells
-    - Are there any heuristics we can use here?
-      - If RELAY_EARLY is only for the first cell of an EXTEND2 series,
-        we can use that. But the proposal currently says MAY, but not MUST
-        for this behavior.
-
-======== 0.3.6 ========
-
-- Come up with some good histograms for eg circuit setup fingerprinting,
-  website fingerprinting, and vanguards usage.
-
-- Vanguards compatibility for MiddleNodes (via changes to vanguards addon)
-
-- circpad_machine_validate() function to sanity-check histograms loaded from
-  consensus/torrc (can also be used to help guide a GA).
-  - Check bin construction
-  - no type overflow (start_usec + range_sec, etc)
-  - no conflicting state transitions (or overlap with cancel events)
-  - no use of both histograms and iat_dist
-  - at least two histogram bins
-  - min_hop vs target_hop
-
-- Support torrc load+serialization of state machines
-  - ??
-
-- Support consensus load+serialization of state machines
-  - ??
-
-- Prop #265 load balancing
-
-- Rephist timer stats
-  - Is this a privacy risk? The adversary could create lots of circuits
-    to find a layer2 vanguard.. Otherwise they will be spread across middles.
-
-





More information about the tor-commits mailing list