r19277@catbus: nickm | 2008-04-09 16:31:51 -0400

Pull up items from "future versions" list, remove duplicate items, etc.


svn:r14337
This commit is contained in:
Nick Mathewson 2008-04-09 20:31:59 +00:00
parent 7210ebfb44
commit 3f6e23e3f4

View File

@ -285,6 +285,7 @@ W - figure out license *
- Optimize cell pool allocation. - Optimize cell pool allocation.
- Support (or just always use) jemalloc - Support (or just always use) jemalloc
- mmap more files. - mmap more files.
- Look into pulling serverdescs off buffers as they arrive.
- Use less bandwidth - Use less bandwidth
- Use if-modified-since to download consensuses - Use if-modified-since to download consensuses
- Handle multi-core cpus better - Handle multi-core cpus better
@ -380,6 +381,10 @@ P - create a "make win32-bundle" for vidalia-privoxy-tor-torbutton bundle
*last* use, not their *first* use. *last* use, not their *first* use.
- enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout. - enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
- Make 'safelogging' extend to info-level logs too. - Make 'safelogging' extend to info-level logs too.
- don't do dns hijacking tests if we're reject *:* exit policy?
(deferred until 0.1.1.x is less common)
- More consistent error checking in router_parse_entry_from_string().
I can say "banana" as my bandwidthcapacity, and it won't even squeak.
- Interface for letting SOAT modify flags that authorities assign. - Interface for letting SOAT modify flags that authorities assign.
(How to keep the authority from clobbering them afterwords? (How to keep the authority from clobbering them afterwords?
@ -450,7 +455,7 @@ If somebody wants to do this in some version, they should:
Future versions: Future versions:
- Protocol: - Protocol
- Our current approach to block attempts to use Tor as a single-hop proxy - Our current approach to block attempts to use Tor as a single-hop proxy
is pretty lame; we should get a better one. is pretty lame; we should get a better one.
- Allow small cells and large cells on the same network? - Allow small cells and large cells on the same network?
@ -470,21 +475,22 @@ Future versions:
- Directory system - Directory system
- BEGIN_DIR items - BEGIN_DIR items
X turn the received socks addr:port into a digest for setting .exit
- handle connect-dir streams that don't have a chosen_exit_name set. - handle connect-dir streams that don't have a chosen_exit_name set.
- Have a "Faster" status flag that means it. Fast2, Fast4, Fast8? - Have a "Faster" status flag that means it. Fast2, Fast4, Fast8?
- Add an option (related to AvoidDiskWrites) to disable directory - Add an option (related to AvoidDiskWrites) to disable directory
caching. (Is this actually a good idea??) caching. (Is this actually a good idea??)
- Add d64 and fp64 along-side d and fp so people can paste status X Add d64 and fp64 along-side d and fp so people can paste status
entries into a url. since + is a valid base64 char, only allow one entries into a url. since + is a valid base64 char, only allow one
at a time. Consider adding to controller as well. at a time. Consider adding to controller as well.
[abandoned for lack of demand]
- Some back-out mechanism for auto-approval on authorities - Some back-out mechanism for auto-approval on authorities
- a way of rolling back approvals to before a timestamp - a way of rolling back approvals to before a timestamp
- Consider minion-like fingerprint file/log combination. - Consider minion-like fingerprint file/log combination.
- Have new people be in limbo and need to demonstrate usefulness X Have new people be in limbo and need to demonstrate usefulness
before we approve them. before we approve them.
- Hidden services: - Hidden services:
****** Have karsten sort these.
- Standby/hotswap/redundant hidden services. - Standby/hotswap/redundant hidden services.
. Update the hidden service stuff for the new dir approach. (Much . Update the hidden service stuff for the new dir approach. (Much
of this will be superseded by 114.) of this will be superseded by 114.)
@ -503,11 +509,6 @@ Future versions:
- Hidserv offerers shouldn't need to define a SocksPort - Hidserv offerers shouldn't need to define a SocksPort
- Server operation - Server operation
X When we notice a 'Rejected: There is already a named server with
this nickname' message... or maybe instead when we see in the
networkstatuses that somebody else is Named with the name we
want: warn the user, send a STATUS_SERVER message, and fall back
to unnamed.
- If the server is spewing complaints about raising your ulimit -n, - If the server is spewing complaints about raising your ulimit -n,
we should add a note about this to the server descriptor so other we should add a note about this to the server descriptor so other
people can notice too. people can notice too.
@ -553,7 +554,6 @@ Future versions:
(It's hard to support read > write, since we need better (It's hard to support read > write, since we need better
congestion control to avoid overfull buffers there. So, congestion control to avoid overfull buffers there. So,
defer the whole thing.) defer the whole thing.)
- Look into pulling serverdescs off buffers as they arrive.
- Rate limit exit connections to a given destination -- this helps - Rate limit exit connections to a given destination -- this helps
us play nice with websites when Tor users want to crawl them; it us play nice with websites when Tor users want to crawl them; it
also introduces DoS opportunities. also introduces DoS opportunities.
@ -578,8 +578,6 @@ Future versions:
- Security - Security
- some better fix for bug #516? - some better fix for bug #516?
- don't do dns hijacking tests if we're reject *:* exit policy?
(deferred until 0.1.1.x is less common)
- Directory guards - Directory guards
- Mini-SoaT: - Mini-SoaT:
- Servers might check certs for known-good ssl websites, and if - Servers might check certs for known-good ssl websites, and if
@ -592,8 +590,6 @@ Future versions:
the BadExit flag set. the BadExit flag set.
- Alternatively, authorities should be able to import opinions - Alternatively, authorities should be able to import opinions
from Snakes on a Tor. from Snakes on a Tor.
- More consistent error checking in router_parse_entry_from_string().
I can say "banana" as my bandwidthcapacity, and it won't even squeak.
- Bind to random port when making outgoing connections to Tor servers, - Bind to random port when making outgoing connections to Tor servers,
to reduce remote sniping attacks. to reduce remote sniping attacks.
- Audit everything to make sure rend and intro points are just as - Audit everything to make sure rend and intro points are just as
@ -620,8 +616,6 @@ Future versions:
- We need a getrlimit equivalent on Windows so we can reserve some - We need a getrlimit equivalent on Windows so we can reserve some
file descriptors for saving files, etc. Otherwise we'll trigger file descriptors for saving files, etc. Otherwise we'll trigger
asserts when we're out of file descriptors and crash. asserts when we're out of file descriptors and crash.
- Merge code from Urz into libevent
- Make Tor use evbuffers.
- Documentation - Documentation
- a way to generate the website diagrams from source, so we can - a way to generate the website diagrams from source, so we can
@ -629,8 +623,6 @@ Future versions:
imagemagick?) imagemagick?)
. Flesh out options_description array in src/or/config.c . Flesh out options_description array in src/or/config.c
. multiple sample torrc files . multiple sample torrc files
. figure out how to make nt service stuff work?
. Document it.
- Refactor tor man page to divide generally useful options from - Refactor tor man page to divide generally useful options from
less useful ones? less useful ones?
- Add a doxygen style checker to make check-spaces so nick doesn't drift - Add a doxygen style checker to make check-spaces so nick doesn't drift
@ -653,8 +645,6 @@ Future versions:
fix the https thing in the default configuration: fix the https thing in the default configuration:
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#PrivoxyWeirdSSLPort http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#PrivoxyWeirdSSLPort
- Related tools
X Patch privoxy and socks protocol to pass strings to the browser.
======================================================================= =======================================================================