some todo items that have been sitting in my sandbox

svn:r10021
This commit is contained in:
Roger Dingledine 2007-04-25 05:59:30 +00:00
parent f0b89dc35a
commit 8f2883e96b

View File

@ -173,18 +173,28 @@ Things we'd like to do in 0.2.0.x:
- A better UI for authority ops. - A better UI for authority ops.
- Follow weasel's proposal, crossed with mixminion dir config format - Follow weasel's proposal, crossed with mixminion dir config format
- Write a proposal - Write a proposal
- Bridges (rudimentary version) (By Jun 1) - Bridges users (rudimentary version) (By Jun 1)
- Ability to specify bridges manually - Ability to specify bridges manually
- Use bridges to build circuits D cache of bridges that we've learned about and use but aren't
manually listed in the torrc.
D and some mechanism for specifying that we want to stop using
a given bridge in this cache.
- Config option 'UseBridges' that bridge users can turn on.
- uses bridges as first hop rather than entry guards.
D Do we want to maintain our own set of entryguards that we use
after the bridge? Open research question; let's say no for 0.2.0
unless we learn otherwise.
- Ask all directory questions to bridge via BEGIN_DIR. - Ask all directory questions to bridge via BEGIN_DIR.
- Bridges operators (rudimentary version) (By Jun 1)
- Ability to act as dir cache without a dir port. - Ability to act as dir cache without a dir port.
- Bridges publish to bridge authorities - Bridges publish to bridge authorities
- Rudimentary "do not publish networkstatus" option for bridge
authorities.
- Clients can ask bridge authorities for more bridges.
- Fix BEGIN_DIR so that you connect to bridge of which you only - Fix BEGIN_DIR so that you connect to bridge of which you only
know IP (and optionally fingerprint), and then use BEGIN_DIR to learn know IP (and optionally fingerprint), and then use BEGIN_DIR to learn
more about it. more about it.
- Bridges authorities (rudimentary version) (By Jun 1)
- Rudimentary "do not publish networkstatus" option for bridge
authorities.
- Clients can ask bridge authorities for more bridges.
- Bridges (not necessarily by Jun 1) - Bridges (not necessarily by Jun 1)
- Clients can ask bridge authorities for updates on known bridges. - Clients can ask bridge authorities for updates on known bridges.
- More TLS normalization work: make Tor less easily - More TLS normalization work: make Tor less easily
@ -201,6 +211,8 @@ Things we'd like to do in 0.2.0.x:
- Blocking-resistance. - Blocking-resistance.
- It would be potentially helpful to https requests on the OR port by - It would be potentially helpful to https requests on the OR port by
acting like an HTTPS server. acting like an HTTPS server.
- add an 'exit-address' line in the descriptor for servers that exit
from something that isn't their published address.
- Audit how much RAM we're using for buffers and cell pools; try to - Audit how much RAM we're using for buffers and cell pools; try to
trim down a lot. trim down a lot.
o Deprecations: o Deprecations:
@ -211,6 +223,7 @@ P - If we haven't replaced privoxy, lock down its configuration in all
packages, as documented in tor-doc-unix.html packages, as documented in tor-doc-unix.html
P - Figure out why dll's compiled in mingw don't work right in WinXP. P - Figure out why dll's compiled in mingw don't work right in WinXP.
P - Figure out why openssl 0.9.8d "make test" fails at sha256t test. P - Figure out why openssl 0.9.8d "make test" fails at sha256t test.
- add an AuthDirBadexit torrc option if we decide we want one.
Deferred from 0.1.2.x: Deferred from 0.1.2.x:
- BEGIN_DIR items - BEGIN_DIR items
@ -397,6 +410,9 @@ R - add d64 and fp64 along-side d and fp so people can paste status
Future version: Future version:
- we try to build 4 test circuits to break them over different
servers. but sometimes our entry node is the same for multiple
test circuits. this defeats the point.
- when we hit a funny error from a dir request (eg 403 forbidden), - when we hit a funny error from a dir request (eg 403 forbidden),
but tor is working and happy otherwise, and we haven't seen many but tor is working and happy otherwise, and we haven't seen many
such errors recently, then don't warn about it. such errors recently, then don't warn about it.