[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r9820: ask santa for five new ponies (website/trunk/en)
Author: arma
Date: 2007-03-15 00:03:00 -0400 (Thu, 15 Mar 2007)
New Revision: 9820
Modified:
website/trunk/en/volunteer.wml
Log:
ask santa for five new ponies
Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml 2007-03-15 03:15:34 UTC (rev 9819)
+++ website/trunk/en/volunteer.wml 2007-03-15 04:03:00 UTC (rev 9820)
@@ -103,6 +103,9 @@
<a id="Coding"></a>
<h2><a class="anchor" href="#Coding">Coding and Design</a></h2>
+<p>Want to spend your Google Summer of Code working on Tor? Great. More
+details coming soon. In the mean time, see if any of these ideas catch
+your eye.</p>
<ol>
<li>Tor servers don't work well on Windows XP. On
Windows, Tor uses the standard <tt>select</tt> system
@@ -120,11 +123,41 @@
design, where we have many smaller buffers that link to each other,
rather than monolithic buffers?</li>
<li>We need an official central site to answer "Is this IP address a Tor
-server?" questions. This should provide several interfaces, including
+exit server?" questions. This should provide several interfaces, including
a web interface and a DNSBL-style interface. It can provide the most
up-to-date answers by keeping a local mirror of the Tor directory
-information. Bonus points if it does active testing through each exit
-node to find out what IP address it's really exiting from.</li>
+information. The tricky point is that being an exit server is not a
+boolean: so the question is actually "Is this IP address a Tor exit
+server that can exit to my IP address:port?" The DNSBL interface
+will probably receive hundreds of queries a minute, so some smart
+algorithms are in order. Bonus points if it does active testing through
+each exit node to find out what IP address it's really exiting from.</li>
+<li>It would be great to have a LiveCD that includes the latest
+versions of Tor, Polipo or Privoxy, Firefox, Gaim+OTR, etc. There are
+two challenges here: first is documenting the system and choices well
+enough that security people can form an opinion on whether it should be
+secure, and the second is figuring out how to make it easily maintainable,
+so it doesn't become quickly obsolete like AnonymOS. Bonus points if
+the CD image fits on one of those small-form-factor CDs.</li>
+<li>Related to the LiveCD image, we should work on an intuitively secure
+and well-documented USB image for Tor and supporting applications. A
+lot of the hard part here is deciding what configurations are secure,
+documentating these decisions, and making something that is easy to
+maintain going forward.</li>
+<li>We need to actually start building our <a href="<page
+documentation>#DesignDoc">blocking-resistance design</a>. This involves
+fleshing out the design, modifying many different pieces of Tor, working
+on a <a href="http://vidalia-project.net/">GUI</a> that's intuitive,
+and planning for deployment.</li>
+<li>We need a flexible simulator framework for studying end-to-end
+traffic confirmation attacks. Many researchers have whipped up ad hoc
+simulators to support their intuition either that the attacks work
+really well or that some defense works great. Can we build a simulator
+that's clearly documented and open enough that everybody knows it's
+giving a reasonable answer? This will spur a lot of new research.
+See the entry <a href="#Research">below</a> on confirmation attacks for
+details on the research side of this task — who knows, when it's
+done maybe you can help write a paper or three also.</li>
<li>We need a measurement study of <a
href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a>
vs <a href="http://www.privoxy.org/">Privoxy</a>. Is Polipo in fact
@@ -132,16 +165,13 @@
results the same on both Linux and Windows? Related, does Polipo handle
more web sites correctly than Privoxy, or vice versa? Are there stability
issues on any common platforms, e.g. Windows?</li>
-<li>It would be great to have a LiveCD that includes the latest
-versions of Tor, Polipo or Privoxy, Firefox, Gaim+OTR, etc. There are
-two challenges here: first is documenting the system and choices well
-enough that security people can form an opinion on whether it should be
-secure, and the second is figuring out how to make it easily maintainable,
-so it doesn't become quickly obsolete like AnonymOS. Bonus points if
-the CD image fits on one of those small-form-factor CDs.</li>
+<li>Related on the above, would you like to help port <a
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> so it
+runs stably and efficiently on Windows?</li>
<li>We need a distributed testing framework. We have unit tests,
but it would be great to have a script that starts up a Tor network, uses
it for a while, and verifies that at least parts of it are working.</li>
+<!--
<li>Right now the hidden service descriptors are being stored on just a
few directory servers. This is bad for privacy and bad for robustness. To
get more robustness, we're going to need to make hidden service
@@ -156,6 +186,7 @@
into giving out fake ones. Second, any reliable distributed storage
system will do, as long as it allows authenticated updates, but as far
as we know no implemented DHT code supports authenticated updates.</li>
+-->
<li>Tor 0.1.1.x and later include support for hardware crypto accelerators
via
OpenSSL. Nobody has ever tested it, though. Does somebody want to get
@@ -171,7 +202,8 @@
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP">list
of reasons why we haven't shifted to UDP transport</a>, but it would
be great to see that list get shorter. We also have a proposed <a
-href="<svnsandbox>doc/tor-spec-udp.txt">specification for Tor and
+href="<svnsandbox>doc/spec/proposals/100-tor-spec-udp.txt">specification
+for Tor and
UDP</a> — please let us know what's wrong with it.</li>
<li>We're not that far from having IPv6 support for destination addresses
(at exit nodes). If you care strongly about IPv6, that's probably the