[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r8907: Remove some completed or in-progress items from the voluntee (website/trunk/en)
- To: or-cvs@xxxxxxxxxxxxx
- Subject: [or-cvs] r8907: Remove some completed or in-progress items from the voluntee (website/trunk/en)
- From: nickm@xxxxxxxx
- Date: Sun, 5 Nov 2006 12:59:49 -0500 (EST)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Sun, 05 Nov 2006 12:59:58 -0500
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-cvs@xxxxxxxxxxxxx
Author: nickm
Date: 2006-11-05 12:59:48 -0500 (Sun, 05 Nov 2006)
New Revision: 8907
Modified:
website/trunk/en/volunteer.wml
Log:
Remove some completed or in-progress items from the volunteer.wml page
Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml 2006-11-05 15:52:33 UTC (rev 8906)
+++ website/trunk/en/volunteer.wml 2006-11-05 17:59:48 UTC (rev 8907)
@@ -10,9 +10,6 @@
<ol>
<li>Please consider <a href="<page docs/tor-doc-server>">running
a server</a> to help the Tor network grow.</li>
-<li>Take a look at the <a href="<page gui/index>">Tor GUI Competition</a>, and
-contribute to making Tor's interface
-and usability better. Free Tor T-shirt for each submission!</li>
<li>Tell your friends! Get them to run servers. Get them to run hidden
services. Get them to tell their friends.</li>
<li>We are looking for funding and sponsors. If you like Tor's goals, please
@@ -64,7 +61,9 @@
its tweak (that's probably more portable). Can somebody write one for us
and we'll put it into <a href="<svnsandbox>contrib/">contrib/</a>?
This is a good entry for the <a href="<page gui/index>">Tor GUI
-competition</a>.</li>
+competition</a>.
+ <!-- We have a good script to adjust stuff now, right? -NM -->
+</li>
<li>Tor can <a
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ChooseEntryExit">exit
the Tor network from a particular exit node</a>, but we should be able
@@ -91,13 +90,15 @@
functionality for Firefox 1.5+? We hear Tor is much faster when you take
Privoxy out of the loop.</li>
<li>Please help Matt Edman with the documentation and how-tos for his
-<a href="http://vidalia-project.net/">Tor Controller</a>.</li>
+Tor controller,
+<a href="http://vidalia-project.net/">Vidalia</a>.</li>
<li>Evaluate and document
<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">our
list of programs</a> that can be configured to use Tor.</li>
<li>We need better documentation for dynamically intercepting
connections and sending them through Tor. tsocks (Linux), dsocks (BSD),
-and freecap (Windows) seem to be good candidates.</li>
+and freecap (Windows) seem to be good candidates, as would better
+use of our new TransPort feature.</li>
<li>We have a huge list of <a href="http://wiki.noreply.org/noreply/TheOnionRouter/SupportPrograms">potentially useful
programs that interface to Tor</a>. Which ones are useful in which
situations? Please help us test them out and document your results.</li>
@@ -126,20 +127,6 @@
into giving out fake ones. Second, any reliable distributed storage
system will do, as long as it allows authenticated updates, but as far
as we know no implemented DHT code supports authenticated updates.</li>
-<li>Tor exit servers need to do many DNS resolves in parallel. But
-gethostbyname() is poorly designed --- it blocks until it has finished
-resolving a query --- so it requires its own thread or process. So Tor
-is forced to spawn many separate DNS "worker" threads. There are some
-asynchronous DNS libraries out there, but historically they are buggy and
-abandoned. Are any of them stable, fast, clean, and free software? (Remember,
-Tor uses OpenSSL, and OpenSSL is (probably) not compatible with the GPL, so
-any GPL libraries are out of the running.) If so
-(or if we can make that so), we should integrate them into Tor. See <a
-href="http://archives.seul.org/or/talk/Sep-2005/msg00001.html">Agl's
-post</a> for one potential approach. Also see
-<a href="http://daniel.haxx.se/projects/c-ares/">c-ares</a> and
-<a href="http://www.monkey.org/~provos/libdnsres/">libdnsres</a>.
-</li>
<li>Tor 0.1.1.x includes support for hardware crypto accelerators via
OpenSSL. Nobody has ever tested it, though. Does somebody want to get
a card and let us know how it goes?</li>
@@ -149,17 +136,10 @@
buffers. Maybe this should be modelled after the Linux kernel buffer
design, where you have many smaller buffers that link to each other,
rather than monolithic buffers?</li>
-<li>Implement reverse DNS requests inside Tor (already specified in
-Section 5.4 of <a href="<svnsandbox>doc/tor-spec.txt">tor-spec.txt</a>).</li>
<li>Perform a security analysis of Tor with <a
href="http://en.wikipedia.org/wiki/Fuzz_testing">"fuzz"</a>. Determine
if there are good fuzzing libraries out there for what we want. Win fame by
getting credit when we put out a new release because of you!</li>
-<li>How hard is it to patch bind or a
-DNS proxy to redirect requests to Tor via our <a
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CompatibleApplications">tor-resolve
-socks extension</a>? dsocks already does this on BSD. What about to
-convert UDP DNS requests to TCP requests and send them through Tor?</li>
<li>Tor uses TCP for transport and TLS for link
encryption. This is nice and simple, but it means all cells
on a link are delayed when a single packet gets dropped, and