[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] clean up volunteer page
Update of /home2/or/cvsroot/website
In directory moria:/home/arma/work/onion/cvs/website
Modified Files:
volunteer.html
Log Message:
clean up volunteer page
Index: volunteer.html
===================================================================
RCS file: /home2/or/cvsroot/website/volunteer.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- volunteer.html 29 Jun 2005 19:23:25 -0000 1.7
+++ volunteer.html 30 Jun 2005 22:56:08 -0000 1.8
@@ -65,26 +65,26 @@
<li>Change server descriptors to declare log level.</li>
<li>Add in support for clients to avoid servers that are too loggy based upon user configuration of acceptable log level.</li>
<li>Separate node discovery from routing to allow neat extensions. [Goodell?]</li>
-<li><ul>
+<ul>
<li>Add SetServerStatus control event to adjust verified/running status of nodes.</li>
<li>Add NoDownload config option to prevent regular directory downloads from happening.</li>
-</ul></li>
+</ul>
<li>Choosing exit node by meta-data, e.g. country.</li>
<li>Use cpuworker for more heavy lifting.</li>
-<li><ul>
+<ul>
<li>Signing (and verifying) hidserv descriptors</li>
<li>Signing (and verifying) intro/rend requests</li>
<li>Signing (and verifying) router descriptors</li>
<li>Signing (and verifying) directories</li>
<li>Doing TLS handshake (this is very hard to separate out, though)</li>
-</ul></li>
+</ul>
<li>Buffer size pool: allocate a maximum size for all buffers, not a maximum size for each buffer. So we don't have to give up as quickly (and kill the thickpipe!) when there's congestion.</li>
<li>Add alternative versions of crypto.c and tortls.c to use libnss or libgcrypt+gnutls.</li>
<li>Implement a way to stop falling back to forbidden ports when FascistFirewall blocks all good dirservers, if there is already a good, cached directory locally.</li>
<li>Extend our NSIS-based windows installer to include FreeCap and/or Privoxy.</li>
<li>Develop a way to handle OS X installation and uninstallation.</li>
<li>Develop a GUI or other controller program, to do configuration, etc. See our <a href="cvs/tor/doc/control-spec.txt">control specification</a> for details, and the rudimentary demonstration <a href="cvs/tor/contrib/TorControl.py">Python control script</a>. </li>
-<li><ul>
+<ul>
<li>Design an interface for the control program. You can use any license you want, but we'd recommend 3-clause BSD or maybe GPL; and we can only help out if your license conforms to the <a href="http://www.debian.org/social_contract.html#guidelines">DFSG</a>.</li>
<li>Periodically people running servers tells us they want to have one
BandwidthRate during some part of the day, and a different
@@ -95,7 +95,7 @@
until appropriate times and then do its tweak (that's probably more
portable). Can somebody write one for us and we'll put it inside
<a href="cvs/tor/contrib/">tor/contrib/</a>?</li>
-</ul></li>
+</ul>
<li>Develop a way to become a Windows NT service. </li>
<li>Develop a systray app for Tor under MS Windows (all versions). </li>
<li>Integrate a good (portable, fast, clean, BSD-free) asynchronous DNS library so we don't have to keep forking DNS worker threads to do gethostbyname.</li>
@@ -104,40 +104,39 @@
<h2>Documentation Challenges</h2>
<ul>
<li>Write server instructions for OSX and Windows operators.</li>
-<li>Improve and clarify the wiki entry on port forwarding. url?</li>
+<li>Improve and clarify the wiki entry on <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">port forwarding</a>.</li>
<li>Document how to do exit node caching: tie into squid or other caching web proxy.</li>
<li>Help maintain this website; code, content, css, overall layout,</li>
<li>Help with documentation </li>
<li>Help consolidate documentation. We may have too much documentation. It's spread out too far and duplicates itself in places. </li>
<li>Help translate the web page and documentation into other languages. See the <a href="translation.html">translation guidelines</a> if you want to help out. (Examples: <a href="http://membres.lycos.fr/geolemalin/anonymat_garantit.htm">French</a> , <a href="http://tor.freesuperhost.com/">Persian</a> and <a href="http://www.gamevn.com/forum/showthread.php?t=103346">Vietnamese</a>.)</li>
+<li>If you know a question that should go on <a
+href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>, please
+add it and answer it.</li>
<li>If you know the answer to a <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">Wiki question</a> in the "unanswered FAQs" list, please answer it. </li>
<li>Take a look at <a
href="http://wiki.noreply.org/wiki/TheOnionRouter/SquidProxy">Martin's
Squid and Tor page</a>, and update it to reflect Tor's <a
href="http://tor.eff.org/tor-manual.html">RedirectExit</a> config option. </li>
<li>Help translate the web page and documentation into other languages. See the translation guidelines if you want to help out. (Examples: French , Persian and Vietnamese.)</li>
-<li>If you know a question that should go on <a
-href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>, please
-add it and answer it.</li>
<li>Update website to include the country flags for each language into which the website has been translated.</li>
-<li>Replace the old tor-manual.html and replace it with the new tor stable manual.</li>
</ul>
<h2>Testing Challenges</h2>
<ul>
<li>Test out why some of our tor servers have dns resolvers that resolve
unknown addresses to 127.0.0.1.</li>
-<li><ul>
+<ul>
<li>Identify the servers that experience this issue. </li>
<li>Identify how to cause and repair the issue in BIND, DJBDNS, or
whatever daemon the misconfigured servers use.</li>
-</ul></li>
+</ul>
<li>Figure out how to setup web proxy gateways to let normal people
browse hidden services. (This has been done a few times, but nobody has
sent us code.)</li>
<li>Investigate privoxy vs. freecap for win32 clients</li>
<li>Evaluate, create, and <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">document a list of programs</a> that work with Tor. </li>
-<li>Perform a security analysis of Tor with <a href="http://en.wikipedia.org/wiki/Fuzz_testing">fuzz</a>"fuzz"</a>. Determine if there good libraries out there for what we want. Win fame by getting credit when we put out a new release because of you!</li>
+<li>Perform a security analysis of Tor with <a href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>". Determine if there good libraries out there for what we want. Win fame by getting credit when we put out a new release because of you!</li>
<li>Website volume fingerprinting attacks (<a href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). Defenses include a large cell size, <a href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>, etc. How well does each approach work?</li>
<li>The end-to-end traffic confirmation attack. We need to study
long-range dummies more, along with traffic shaping. How much traffic of
@@ -151,14 +150,14 @@
<h2>Research Challenges</h2>
<ul>
<li>Arranging membership management for independence.</li>
-<li><ul>
+<ul>
<li>Sybil defenses without having a human bottleneck.</li>
<li>How to gather random sample of nodes.</li>
<li>How to handle nodelist recommendations.</li>
<li>Consider incremental switches: a p2p tor with only 50 users has
different anonymity properties than one with 10k users, and should be
treated differently.</li>
-</ul></li>
+</ul>
<li>Incentives to relay; incentives to exit.</li>
<li>Allowing dissidents to relay through Tor clients.</li>
<li>Experiment with mid-latency systems. How do they impact usability,
@@ -171,7 +170,7 @@
<li>Attacking freenet-gnunet/timing-delay-randomness-arguments.</li>
<li>Is exiting from the middle of the circuit always a bad idea?</li>
<li>IPv6 support (For exit addresses)</li>
-<li><ul>
+<ul>
<li>Spec issue: if a resolve returns an IP4 and an IP6 address,
which to use?</li>
<li>Add to exit policy code</li>
@@ -180,7 +179,7 @@
a generalize address struct.</li>
<li>Change relay cell types to accept new addresses.</li>
<li>Add flag to serverdescs to tell whether IPv6 is supported.</li>
-</ul></li>
+</ul>
<li>patch tsocks with our current patches + gethostbyname, getpeername,
etc.</li>
<li>make freecap (or whichever) do what we want.</li>