[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] new-contribute is now valid xhtml 1.1
Update of /home/or/cvsroot/website
In directory moria:/tmp/cvs-serv12451
Modified Files:
new-contribute.html
Log Message:
new-contribute is now valid xhtml 1.1
Index: new-contribute.html
===================================================================
RCS file: /home/or/cvsroot/website/new-contribute.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- new-contribute.html 14 Jun 2005 03:41:14 -0000 1.6
+++ new-contribute.html 14 Jun 2005 03:55:30 -0000 1.7
@@ -1,5 +1,4 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
-"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
@@ -69,26 +68,26 @@
<li>Change server descriptors to declare log level.</li>
<li>Add in support for clients to avoid servers that are too loggy based upon user configuration of acceptable log level.</li>
<li>Separate node discovery from routing to allow neat extensions. [Goodell?]</li>
-<ul>
+<li><ul>
<li>Add SetServerStatus control event to adjust verified/running status of nodes.</li>
<li>Add NoDownload config option to prevent regular directory downloads from happening.</li>
-</ul>
+</ul></li>
<li>Choosing exit node by meta-data, e.g. country.</li>
<li>Use cpuworker for more heavy lifting.</li>
-<ul>
+<li><ul>
<li>Signing (and verifying) hidserv descriptors</li>
<li>Signing (and verifying) intro/rend requests</li>
<li>Signing (and verifying) router descriptors</li>
<li>Signing (and verifying) directories</li>
<li>Doing TLS handshake (this is very hard to separate out, though)</li>
-</ul>
+</ul></li>
<li>Buffer size pool: allocate a maximum size for all buffers, not a maximum size for each buffer. So we don't have to give up as quickly (and kill the thickpipe!) when there's congestion.</li>
<li>Add alternative versions of crypto.c and tortls.c to use libnss or libgcrypt+gnutls.</li>
<li>Implement a way to stop falling back to forbidden ports when FascistFirewall blocks all good dirservers, if there is already a good, cached directory locally.</li>
<li>Extend our NSIS-based windows installer to include FreeCap and/or Privoxy.</li>
<li>Develop a way to handle OS X installation and uninstallation.</li>
<li>Develop a GUI or other controller program, to do configuration, etc. See our control specification for details, and the rudimentary demonstration Python control script. </li>
-<ul>
+<li><ul>
<li>Design an interface for the control program. You can use any license you want, but we'd recommend 3-clause BSD or maybe GPL; and we can only help out if your license conforms to the DFSG.</li>
<li>Periodically people running servers tells us they want to have one
BandwidthRate during some part of the day, and a different
@@ -99,7 +98,7 @@
until appropriate times and then do its tweak (that's probably more
portable). Can somebody write one for us and we'll put it inside
tor/contrib/?</li>
-</ul>
+</ul></li>
<li>Develop a way to become a Windows NT service. </li>
<li>Develop a systray app for Tor under MS Windows (all versions). </li>
<li>Integrate a good (portable, fast, clean, BSD-free) asynchronous DNS library so we don't have to keep forking DNS worker threads to do gethostbyname.</li>
@@ -128,11 +127,11 @@
<ul>
<li>Test out why some of our tor servers have dns resolvers that resolve
unknown addresses to 127.0.0.1.</li>
-<ul>
+<li><ul>
<li>Identify the servers that experience this issue. </li>
<li>Identify how to cause and repair the issue in BIND, DJBDNS, or
whatever daemon the misconfigured servers use.</li>
-</ul>
+</ul></li>
<li>Figure out how to setup web proxy gateways to let normal people
browse hidden services. (This has been done a few times, but nobody has
sent us code.)</li>
@@ -160,14 +159,14 @@
**hard**
<ul>
<li>Arranging membership management for independence.</li>
-<ul>
+<li><ul>
<li>Sybil defenses without having a human bottleneck.</li>
<li>How to gather random sample of nodes.</li>
<li>How to handle nodelist recommendations.</li>
<li>Consider incremental switches: a p2p tor with only 50 users has
different anonymity properties than one with 10k users, and should be
treated differently.</li>
-</ul>
+</ul></li>
<li>Incentives to relay; incentives to exit.</li>
<li>Allowing dissidents to relay through Tor clients.</li>
<li>Experiment with mid-latency systems. How do they impact usability,
@@ -180,7 +179,7 @@
<li>Attacking freenet-gnunet/timing-delay-randomness-arguments.</li>
<li>Is exiting from the middle of the circuit always a bad idea?</li>
<li>IPv6 support (For exit addresses)</li>
-<ul>
+<li><ul>
<li>Spec issue: if a resolve returns an IP4 and an IP6 address,
which to use?</li>
<li>Add to exit policy code</li>
@@ -189,7 +188,7 @@
a generalize address struct.</li>
<li>Change relay cell types to accept new addresses.</li>
<li>Add flag to serverdescs to tell whether IPv6 is supported.</li>
-</ul>
+</ul></li>
<li>patch tsocks with our current patches + gethostbyname, getpeername,
etc.</li>
<li>make freecap (or whichever) do what we want.</li>
@@ -235,10 +234,10 @@
followup for details.</li>
<li>Congestion control. Is our current design sufficient once we have
heavy use? Need to measure and tweak, or maybe overhaul.</li>
+</ul>
Drop by the #tor IRC channel at irc.oftc.net or email tor-volunteer@xxxxxxxxxxxxx if you want to help out!
-</pre>
</div><!-- #main -->
</div>
<div class="bottom" id="bottom">