[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [webwml/master] Core tor GSoC project ideas



commit b4db53b1539aa0dc92009c73d25e8c44de6f6e41
Author: Damian Johnson <atagar@xxxxxxxxxxxxxx>
Date:   Mon Feb 27 11:53:28 2017 -0800

    Core tor GSoC project ideas
    
    Nick has been leading discussions with core tor folks concerning some GSoC
    project ideas. Adding what they've come up with...
    
      https://storm.torproject.org/shared/Xh2gRt-Oy__EaM8_4DAIhrYFMXbOnC09AfLGbHx7TUG
---
 getinvolved/en/volunteer.wml | 169 ++++++++++++++++++++++++++++++++++++++++++-
 1 file changed, 168 insertions(+), 1 deletion(-)

diff --git a/getinvolved/en/volunteer.wml b/getinvolved/en/volunteer.wml
index e276865..3f70741 100644
--- a/getinvolved/en/volunteer.wml
+++ b/getinvolved/en/volunteer.wml
@@ -395,7 +395,14 @@ meetings around the world.</li>
 
     <p>
     <b>Project Ideas:</b><br />
-    <i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i>
+    <i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br />
+    <i><a href="#torFuzzing">Fuzzing coverage of Tor</a></i><br />
+    <i><a href="#relayCryptoParallelism">Relay crypto parallelism</a></i><br />
+    <i><a href="#anonymousLocalCountStatistics">Anonymous local count statistics</a></i><br />
+    <i><a href="#improveSocks5Variant">Improved SOCKS5 variant</a></i><br />
+    <i><a href="#hiddenServiceCryptoParallelism">Hidden service crypto parallelism</a></i><br />
+    <i><a href="#supportAllDNS">Support all kinds of DNS in Tor</a></i><br />
+    <i><a href="#improveIpv6Support">Improve IPv6 support</a></i>
     </p>
 
     <a id="project-torbrowser"></a>
@@ -835,6 +842,166 @@ ideas.
     </p>
     </li>
 
+    <a id="torFuzzing"></a>
+    <li>
+    <b>Fuzzing coverage of Tor</b>
+    <br>
+    Likely Mentors: <i>Nick (nickm), ahf, teor</i>
+    <br><br>
+    <p>
+Starting in 0.3.0.x, Tor supports a few fuzzing systems to check our
+code for bugs.  But as of now, we only support a few possible entry
+points to Tor.  It would be great to add fuzzing support for more of
+our codebase -- ideally to include our whole network-facing interface.
+That way, we could find more bugs in our code faster, and fix them
+before they can get out of hand.
+    </p>
+
+    <p>
+This won't be so easy, however: to fuzz effectively, we need to
+refactor or mock the target function so that it doesn't change any
+global state, or verify any signatures, or take too long to run.  With
+lots of our network code, that's not so easy.  Make sure you
+understand how our mocking system works, and what the challenges are,
+before you apply for this one.
+    </p>
+    </li>
+
+    <a id="relayCryptoParallelism"></a>
+    <li>
+    <b>Relay crypto parallelism</b>
+    <br>
+    Likely Mentors: <i>Isis, Nick (nickm)</i>
+    <br><br>
+    <p>
+Tor relays spend a lot of time encrypting and decrypting relay
+traffic, doing SHA1 and AES-CTR operations.  But right now, all of
+this is done in the main thread!  It would be cool to split this
+across multiple cores instead.
+    </p>
+
+    <p>
+This won't be so easy though.  The code today is written to expect
+immediate results from its encryption operations, so you would need to
+do some pretty tricky refactoring in order get performance and
+correctness here.  Make sure you understand how circuit crypto is
+invoked today, and what the challenges are, before you apply for this
+one.
+    </p>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/1749";>see its ticket</a>.
+    </p>
+    </li>
+
+    <a id="anonymousLocalCountStatistics"></a>
+    <li>
+    <b>Anonymous local count statistics</b>
+    <br>
+    Likely Mentors: <i>Nick (nickm), teor</i>
+    <br><br>
+    <p>
+There are some places in Tor where we count things (like distinct IPs)
+to later report anonymized statistics.  But if the local Tor instance
+were compromised, this data would be exposed.  There are statistical
+methods which insteasd allow us to record this data in a way that's
+already anonymous, before we ever summarize it.  Interested?
+    </p>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/7532";>see its ticket</a>.
+    </p>
+    </li>
+
+    <a id="improveSocks5Variant"></a>
+    <li>
+    <b>Improved SOCKS5 variant</b>
+    <br>
+    Likely Mentors: <i>Nick (nickm), David Goulet (dgoulet)</i>
+    <br><br>
+    <p>
+In proposal 229, we describe a bunch of additional SOCKS extensions
+that Tor-aware applications could use to get more fine-grained control
+over how Tor handles their streams.  It would be cool to implement
+this!  If there's time remaining, you might want to add support to one
+or more applications.  Or maybe to torsocks?
+    </p>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/12456";>see its ticket</a>.
+    </p>
+    </li>
+
+    <a id="hiddenServiceCryptoParallelism"></a>
+    <li>
+    <b>Hidden service crypto parallelism</b>
+    <br>
+    Likely Mentors: <i>Nick (nickm), David Goulet (dgoulet)</i>
+    <br><br>
+    <p>
+Hidden services, hidden service clients, hidden service directories,
+and introduction points all need to do a few public-key operations as
+they operate.  But right now, these operations are all done on the
+main thread.  It would be good to have these run across multiple cores.
+    </p>
+
+    <p>
+This could probably be done in a way similar to how we currently hand
+circuit extension handshakes in onion.c and cpuworker.c, but we'd need
+to extend the state machine for hidden services to add an additional
+state.  It could help hidden services operate much more efficiently.
+    </p>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/13738";>see its ticket</a>.
+    </p>
+    </li>
+
+    <a id="supportAllDNS"></a>
+    <li>
+    <b>Support all kinds of DNS in Tor</b>
+    <br>
+    Likely Mentors: <i>Nick (nickm), George (asn)</i>
+    <br><br>
+    <p>
+Right now Tor can query for the kind of DNS information you'd find in
+A records, AAAA records, and PTR records.  It would be neat to be able
+to support more general DNS queries to allow things like MX loopups,
+DNSSEC lookups, and so on.  We have a design proposal (number 219) for
+this, but it might need some clean-up.
+    </p>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/7829";>see its ticket</a>.
+    </p>
+    </li>
+
+    <a id="improveIpv6Support"></a>
+    <li>
+    <b>Improve IPv6 support</b>
+    <br>
+    Likely Mentors: <i>ahf, teor</i>
+    <br><br>
+    <p>
+Tor works over IPv6, but require some manual configuration.
+Clients and relays could automatically detect IPv6 availability,
+and configure themselves appropriately. Implementing a
+"happy eyeballs"-like algorithm is a challenge in an anonymity
+network: are you up for it?
+    </p>
+
+    <ul>
+      <li><a href="https://trac.torproject.org/projects/tor/ticket/6939";>Missing IPv6 ORPort reachability check</a></li>
+      <li><a href="https://trac.torproject.org/projects/tor/ticket/4847";>Bridges binding only to an IPv6 address doesn't work</a></li>
+      <li><a href="https://trac.torproject.org/projects/tor/ticket/5940";>Figure out own IPv6 address</a></li>
+      <li><a href="https://trac.torproject.org/projects/tor/ticket/17011";>Teach chutney to verify over IPv6</a></li>
+    </ul>
+
+    <p>
+For more information <a href="https://trac.torproject.org/projects/tor/ticket/17811";>see its ticket</a>.
+    </p>
+    </li>
+
     <a id="feedbackExtension"></a>
     <li>
     <b>Feedback Extension for Tor Browser</b>

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits