[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r13884: add some details on why we haven't done proposal 127 yet, an (tor/trunk/doc/spec/proposals)



Author: arma
Date: 2008-03-07 16:19:21 -0500 (Fri, 07 Mar 2008)
New Revision: 13884

Modified:
   tor/trunk/doc/spec/proposals/127-dirport-mirrors-downloads.txt
Log:
add some details on why we haven't done proposal 127 yet, and may
not ever do it.


Modified: tor/trunk/doc/spec/proposals/127-dirport-mirrors-downloads.txt
===================================================================
--- tor/trunk/doc/spec/proposals/127-dirport-mirrors-downloads.txt	2008-03-07 21:10:59 UTC (rev 13883)
+++ tor/trunk/doc/spec/proposals/127-dirport-mirrors-downloads.txt	2008-03-07 21:19:21 UTC (rev 13884)
@@ -135,3 +135,23 @@
       answers to popular requests, so we don't have to keep getting
       them again.)
 
+6. Outstanding problems
+
+  1) HTTP proxies already exist.  Why waste our time cloning one
+  badly? When we clone existing stuff, we usually regret it.
+
+  2) It's overbroad.  We only seem to need a secure get-a-tor feature,
+  and instead we're contemplating building a locked-down HTTP proxy.
+
+  3) It's going to add a fair bit of complexity to our code.  We do
+  not currently implement HTTPS.  We'd need to refactor lots of the
+  low-level connection stuff so that "SSL" and "Cell-based" were no
+  longer synonymous.
+
+  4) It's still unclear how effective this proposal would be in
+  practice. You need to know that this feature exists, which means
+  somebody needs to tell you about a bridge (mirror) address and tell
+  you how to use it. And if they're doing that, they could (e.g.) tell
+  you about a gmail autoresponder address just as easily, and then you'd
+  get better authentication of the Tor program to boot.
+