2005-03-23 20:15:10 +01:00
|
|
|
|
2003-03-18 00:19:25 +01:00
|
|
|
Legend:
|
|
|
|
SPEC!! - Not specified
|
|
|
|
SPEC - Spec not finalized
|
|
|
|
NICK - nick claims
|
|
|
|
ARMA - arma claims
|
|
|
|
- Not done
|
|
|
|
* Top priority
|
|
|
|
. Partially done
|
|
|
|
o Done
|
|
|
|
D Deferred
|
|
|
|
X Abandoned
|
|
|
|
|
2005-04-27 07:05:50 +02:00
|
|
|
For sometime soon:
|
2005-01-05 04:02:08 +01:00
|
|
|
- Server instructions for OSX and Windows operators.
|
2005-02-04 06:49:10 +01:00
|
|
|
- Audit all changes to bandwidth buckets for integer over/underflow.
|
2005-03-27 07:13:58 +02:00
|
|
|
- whine if your socks port is an open proxy.
|
2005-04-27 07:05:50 +02:00
|
|
|
N - parse routerinfo->contactinfo into a string we can use.
|
|
|
|
- The goal is to log IP and ContactInfo when the dirserver refuses
|
|
|
|
an uploaded descriptor, so we have some idea of who to contact.
|
2005-01-03 19:34:57 +01:00
|
|
|
|
2005-02-23 22:47:40 +01:00
|
|
|
Refactoring and infrastructure:
|
2004-12-23 02:06:54 +01:00
|
|
|
|
2005-02-23 22:58:05 +01:00
|
|
|
N . Switch to libevent
|
2005-02-23 22:47:40 +01:00
|
|
|
- Hold-open-until-flushed now works by accident; it should work by
|
|
|
|
design.
|
2005-04-27 07:05:50 +02:00
|
|
|
. The logic for reading from TLS sockets is likely to overrun the
|
2005-02-23 22:47:40 +01:00
|
|
|
bandwidth buckets under heavy load. (Really, the logic was
|
|
|
|
never right in the first place.) Also, we should audit all users
|
|
|
|
of get_pending_bytes().
|
|
|
|
|
2005-02-24 22:17:33 +01:00
|
|
|
Security:
|
2005-02-23 22:47:40 +01:00
|
|
|
- Make sure logged info is "safe"ish.
|
|
|
|
|
|
|
|
Functionality
|
2005-03-22 20:36:38 +01:00
|
|
|
- Tests for new controller features
|
2005-03-19 06:07:19 +01:00
|
|
|
N . NT Service code
|
|
|
|
o Clean up NT service code even more.
|
|
|
|
o Enable it by default.
|
|
|
|
o Make sure it works.
|
|
|
|
. Document it.
|
2005-02-23 22:47:40 +01:00
|
|
|
|
|
|
|
Documentation
|
2005-02-28 19:43:20 +01:00
|
|
|
r - Correct and clarify the wiki entry on port forwarding.
|
2005-03-19 00:09:29 +01:00
|
|
|
o Document where OSX logs and torrc go.
|
|
|
|
o Document where windows logs and torrc go.
|
|
|
|
- (Make sure they actually go there.)
|
2005-02-23 22:47:40 +01:00
|
|
|
|
|
|
|
Installers
|
2005-02-23 22:58:05 +01:00
|
|
|
N - Vet all pending installer patches
|
2005-02-23 22:47:40 +01:00
|
|
|
- Win32 installer plus privoxy, sockscap/freecap, etc.
|
2005-02-23 22:59:09 +01:00
|
|
|
- Vet win32 systray helper code
|
2005-03-18 22:45:36 +01:00
|
|
|
N . Make logs go into platform default locations.
|
|
|
|
o OSX
|
2005-03-19 00:09:29 +01:00
|
|
|
- Windows. (?)
|
2005-02-23 22:47:40 +01:00
|
|
|
|
|
|
|
Correctness
|
2005-03-24 02:12:38 +01:00
|
|
|
- how do ulimits work on win32, anyway? (We should handle WSAENOBUFS as
|
|
|
|
needed, look at the MaxConnections registry entry, look at the
|
|
|
|
MaxUserPort entry, and look at the TcpTimedWaitDelay entry. We may also
|
|
|
|
want to provide a way to set them as needed. See bug 98.)
|
2004-12-23 02:06:54 +01:00
|
|
|
|
2005-02-23 22:47:40 +01:00
|
|
|
Arguable
|
2005-04-08 08:15:47 +02:00
|
|
|
- Bug: Why do idle cpuworkers sometimes get thought of as busy?
|
|
|
|
- IP-based blacklisting of which servers get recommended by dirservers.
|
|
|
|
|
|
|
|
|
2005-04-01 09:04:40 +02:00
|
|
|
N - tor-resolve script should use socks5 to get better error messages.
|
2005-04-27 07:05:50 +02:00
|
|
|
o Script to try pulling bytes through slow-seeming servers so they can
|
2005-03-11 22:49:29 +01:00
|
|
|
notice that they might be fast.
|
2005-03-02 20:26:46 +01:00
|
|
|
N . Reverse DNS
|
|
|
|
o specify
|
|
|
|
- implement
|
2005-02-28 19:43:20 +01:00
|
|
|
r - make min uptime a function of the available choices (say, choose 60th
|
2005-02-23 22:47:40 +01:00
|
|
|
percentile, not 1 day.)
|
2005-02-28 19:43:20 +01:00
|
|
|
r - kill dns workers more slowly
|
|
|
|
r - build testing circuits? going through non-verified nodes?
|
2005-02-23 22:47:40 +01:00
|
|
|
- config option to publish what ports you listen on, beyond ORPort/DirPort
|
2005-02-23 22:58:05 +01:00
|
|
|
N - It would be nice to have a FirewalledIPs thing that works like
|
2005-02-23 22:47:40 +01:00
|
|
|
FirewallPorts.
|
|
|
|
- If we have a trusted directory on port 80, stop falling back to
|
|
|
|
forbidden ports when fascistfirewall blocks all good dirservers.
|
2005-02-23 22:58:05 +01:00
|
|
|
N - Code cleanup
|
2005-02-23 22:47:40 +01:00
|
|
|
- Make configure.in handle cross-compilation
|
|
|
|
- Have NULL_REP_IS_ZERO_BYTES default to 1.
|
|
|
|
- Make with-ssl-dir disable search for ssl.
|
|
|
|
- Efficiency/speed improvements.
|
|
|
|
- Write limiting; configurable token buckets.
|
|
|
|
- Make it harder to circumvent bandwidth caps: look at number of bytes
|
|
|
|
sent across sockets, not number sent inside TLS stream.
|
2005-04-04 06:09:34 +02:00
|
|
|
o Hidden service improvements
|
|
|
|
o Investigate hidden service performance/reliability
|
2005-03-22 06:18:44 +01:00
|
|
|
- Add private:* alias in exit policies to make it easier to ban all the
|
|
|
|
fiddly little 192.168.foo addresses.
|
2005-03-24 02:12:38 +01:00
|
|
|
- controller should have an event to learn about new addressmappings?
|
2005-03-22 06:18:44 +01:00
|
|
|
|
2005-02-23 22:47:40 +01:00
|
|
|
|
|
|
|
No
|
2005-04-08 08:15:47 +02:00
|
|
|
Todo: when you connect and get a guy you didn't expect, tell him hey i wasn't
|
|
|
|
expecting you i'm going to go now bye, instead of just hanging up. This lets
|
2005-04-27 07:05:50 +02:00
|
|
|
him know that he's doing something funny.
|
2005-02-23 22:47:40 +01:00
|
|
|
- choose entry node to be one you're already connected to?
|
|
|
|
- Convert man pages to pod, or whatever's right.
|
|
|
|
- support hostnames as well as IPs for authdirservers.
|
|
|
|
- GPSLocation optional config string.
|
|
|
|
- Windows
|
|
|
|
- Make millisecond accuracy work on win32
|
|
|
|
- IPv6 support
|
2004-12-23 02:06:54 +01:00
|
|
|
- teach connection_ap_handshake_socks_reply() about ipv6 and friends
|
|
|
|
so connection_ap_handshake_socks_resolved() doesn't also need
|
|
|
|
to know about them.
|
2005-02-23 22:59:09 +01:00
|
|
|
- Let more config options (e.g. ORPort) change dynamically.
|
|
|
|
- hidserv offerers shouldn't need to define a SocksPort
|
|
|
|
* figure out what breaks for this, and do it.
|
2005-03-11 22:42:45 +01:00
|
|
|
- Destroy and truncated cells should have reasons.
|
2004-12-23 02:06:54 +01:00
|
|
|
- Packaging
|
|
|
|
- Figure out how to make the rpm not strip the binaries it makes.
|
2005-01-16 03:49:58 +01:00
|
|
|
- Integrate an http proxy into Tor (maybe as a third class of worker
|
|
|
|
process), so we can stop shipping with the beast that is Privoxy.
|
2005-02-23 22:47:40 +01:00
|
|
|
- Implement If-Modified-Since for directories.
|
2004-12-23 02:06:54 +01:00
|
|
|
- Big, incompatible re-architecting and decentralization of directory
|
|
|
|
system.
|
|
|
|
- Only the top of a directory needs to be signed.
|
|
|
|
- Windows
|
|
|
|
- Get a controller to launch tor and keep it on the system tray.
|
|
|
|
|
2005-03-11 22:42:45 +01:00
|
|
|
|
2005-02-23 23:42:17 +01:00
|
|
|
For 0.1.1.x:
|
|
|
|
|
|
|
|
Decentralizing:
|
|
|
|
- self-measurement
|
|
|
|
- remote measurement
|
2005-02-28 19:43:20 +01:00
|
|
|
- you've been running for an hour
|
|
|
|
- it's sufficiently satisfied with its bandwidth
|
2005-02-23 23:42:17 +01:00
|
|
|
- remove approval crap, add blacklisting by IP
|
|
|
|
- gather more permanent dirservers and put their keys into the code
|
|
|
|
- ship with a master key, and implement a way to query dirservers for
|
|
|
|
a blob which is a timestamped signed newest pile of dirservers. put
|
|
|
|
that on disk and use it on startup rather than the built-in default.
|
|
|
|
- threshold belief from clients about up-ness
|
|
|
|
- a way for clients to get fresh enough server descriptors
|
|
|
|
- a way for clients to partition the set of servers in a safe way:
|
|
|
|
so they don't have to learn all of them but so they're not easily
|
|
|
|
partitionable.
|
|
|
|
|
2005-02-23 22:47:40 +01:00
|
|
|
Tier two:
|
2004-12-23 02:06:54 +01:00
|
|
|
|
2004-10-27 05:14:54 +02:00
|
|
|
N - Handle rendezvousing with unverified nodes.
|
|
|
|
- Specify: Stick rendezvous point's key in INTRODUCE cell.
|
|
|
|
Bob should _always_ use key from INTRODUCE cell.
|
|
|
|
- Implement.
|
2004-12-23 02:06:54 +01:00
|
|
|
|
|
|
|
N - IPv6 support (For exit addresses)
|
2004-10-27 05:14:54 +02:00
|
|
|
- Spec issue: if a resolve returns an IP4 and an IP6 address,
|
|
|
|
which to use?
|
2004-12-23 02:06:54 +01:00
|
|
|
- Add to exit policy code
|
|
|
|
- Make tor_gethostbyname into tor_getaddrinfo
|
|
|
|
- Make everything that uses uint32_t as an IP address change to use
|
|
|
|
a generalize address struct.
|
|
|
|
- Change relay cell types to accept new addresses.
|
|
|
|
- Add flag to serverdescs to tell whether IPv6 is supported.
|
|
|
|
|
|
|
|
- Security fixes
|
|
|
|
- christian grothoff's attack of infinite-length circuit.
|
|
|
|
the solution is to have a separate 'extend-data' cell type
|
|
|
|
which is used for the first N data cells, and only
|
|
|
|
extend-data cells can be extend requests.
|
|
|
|
|
|
|
|
- Code cleanup
|
2005-02-27 08:23:42 +01:00
|
|
|
o fix router_get_by_* functions so they can get ourselves too ...
|
|
|
|
- and audit everything to make sure rend and intro points are
|
2004-12-23 02:06:54 +01:00
|
|
|
just as likely to be us as not.
|
|
|
|
|
2004-12-02 10:27:24 +01:00
|
|
|
- tor should be able to have a pool of outgoing IP addresses
|
|
|
|
that it is able to rotate through. (maybe)
|
2004-08-21 02:28:58 +02:00
|
|
|
|
2004-12-02 10:27:24 +01:00
|
|
|
Packaging, docs, etc:
|
|
|
|
- Exit node caching: tie into squid or other caching web proxy.
|
|
|
|
|
|
|
|
Deferred until needed:
|
|
|
|
- Do something to prevent spurious EXTEND cells from making middleman
|
|
|
|
nodes connect all over. Rate-limit failed connections, perhaps?
|
|
|
|
- Limit to 2 dir, 2 OR, N SOCKS connections per IP.
|
|
|
|
- Handle full buffers without totally borking
|
|
|
|
* do this eventually, no rush.
|
2004-10-27 05:14:54 +02:00
|
|
|
- Rate-limit OR and directory connections overall and per-IP and
|
|
|
|
maybe per subnet.
|
2004-12-02 10:27:24 +01:00
|
|
|
- DoS protection: TLS puzzles, public key ops, bandwidth exhaustion.
|
2004-10-27 05:14:54 +02:00
|
|
|
- Have clients and dirservers preserve reputation info over
|
|
|
|
reboots.
|
|
|
|
- authdirserver lists you as running iff:
|
|
|
|
- he can connect to you
|
|
|
|
- he has successfully extended to you
|
|
|
|
- you have sufficient mean-time-between-failures
|
|
|
|
* keep doing nothing for now.
|
2004-11-13 05:31:46 +01:00
|
|
|
- Include HTTP status messages in logging (see parse_http_response).
|
2004-07-22 03:35:52 +02:00
|
|
|
|
2004-12-02 10:27:24 +01:00
|
|
|
Blue sky or deferred indefinitely:
|
|
|
|
- Support egd or other non-OS-integrated strong entropy sources
|
|
|
|
- password protection for on-disk identity key
|
2004-10-27 05:14:54 +02:00
|
|
|
- Possible to get autoconf to easily install things into ~/.tor?
|
2004-12-02 10:27:24 +01:00
|
|
|
- server descriptor declares min log level, clients avoid servers
|
|
|
|
that are too loggy.
|
|
|
|
- put expiry date on onion-key, so people don't keep trying
|
|
|
|
old ones that they could know are expired?
|
|
|
|
- Add a notion of nickname->Pubkey binding that's not 'verification'
|
|
|
|
- Conn key rotation.
|
|
|
|
- Need a relay teardown cell, separate from one-way ends.
|
2004-06-16 07:18:51 +02:00
|
|
|
|
2004-12-02 10:27:24 +01:00
|
|
|
Big tasks that would demonstrate progress:
|
2004-04-22 05:50:42 +02:00
|
|
|
|
2004-12-02 10:27:24 +01:00
|
|
|
- Facility to automatically choose long-term helper nodes; perhaps
|
|
|
|
on by default for hidden services.
|
|
|
|
- patch privoxy and socks protocol to pass strings to the browser.
|
|
|
|
- patch tsocks with our current patches + gethostbyname, getpeername, etc.
|
|
|
|
- make freecap (or whichever) do what we want.
|
|
|
|
- scrubbing proxies for protocols other than http.
|
|
|
|
- Find an smtp proxy?
|
|
|
|
. Get socks4a support into Mozilla
|
|
|
|
- figure out enclaves, e.g. so we know what to recommend that people
|
|
|
|
do, and so running a tor server on your website is helpful.
|
|
|
|
- Do enclaves for same IP only.
|
|
|
|
- Resolve first, then if IP is an OR, extend to him first.
|
|
|
|
- implement a trivial fun gui to demonstrate our control interface.
|
|
|
|
|
|
|
|
************************ Roadmap for 2004-2005 **********************
|
|
|
|
|
|
|
|
Hard problems that need to be solved:
|
|
|
|
|
|
|
|
- Separating node discovery from routing.
|
|
|
|
- Arranging membership management for independence.
|
|
|
|
Sybil defenses without having a human bottleneck.
|
|
|
|
How to gather random sample of nodes.
|
|
|
|
How to handle nodelist recommendations.
|
|
|
|
Consider incremental switches: a p2p tor with only 50 users has
|
|
|
|
different anonymity properties than one with 10k users, and should
|
|
|
|
be treated differently.
|
|
|
|
- Measuring performance of other nodes. Measuring whether they're up.
|
|
|
|
- Choosing exit node by meta-data, e.g. country.
|
|
|
|
- Incentives to relay; incentives to exit.
|
|
|
|
- Allowing dissidents to relay through Tor clients.
|
|
|
|
- How to intercept, or not need to intercept, dns queries locally.
|
|
|
|
- Improved anonymity:
|
|
|
|
- Experiment with mid-latency systems. How do they impact usability,
|
|
|
|
how do they impact safety?
|
|
|
|
- Understand how powerful fingerprinting attacks are, and experiment
|
|
|
|
with ways to foil them (long-range padding?).
|
|
|
|
- Come up with practical approximations to picking entry and exit in
|
|
|
|
different routing zones.
|
|
|
|
- Find ideal churn rate for helper nodes; how safe is it?
|
|
|
|
- What info squeaks by Privoxy? Are other scrubbers better?
|
|
|
|
- Attacking freenet-gnunet/timing-delay-randomness-arguments.
|
|
|
|
- Is abandoning the circuit the only option when an extend fails, or
|
|
|
|
can we do something without impacting anonymity too much?
|
|
|
|
- Is exiting from the middle of the circuit always a bad idea?
|
|
|
|
|
|
|
|
Sample Publicity Landmarks:
|
|
|
|
|
|
|
|
- we have N servers / N users
|
|
|
|
- we have servers at epic and aclu and foo
|
|
|
|
- hidden services are robust and fast
|
|
|
|
- a more decentralized design
|
|
|
|
- tor win32 installer works
|
|
|
|
- win32 tray icon for end-users
|
|
|
|
- tor server works on win32
|
|
|
|
- win32 service for servers
|
|
|
|
- mac installer works
|
2004-05-10 11:40:44 +02:00
|
|
|
|
|
|
|
***************************Future tasks:****************************
|
|
|
|
|
|
|
|
Rendezvous and hidden services:
|
|
|
|
make it fast:
|
2005-01-20 21:25:55 +01:00
|
|
|
o preemptively build and start rendezvous circs.
|
|
|
|
o preemptively build n-1 hops of intro circs?
|
|
|
|
o cannibalize general circs?
|
2004-05-10 11:40:44 +02:00
|
|
|
make it reliable:
|
|
|
|
- standby/hotswap/redundant services.
|
|
|
|
- store stuff to disk? dirservers forget service descriptors when
|
|
|
|
they restart; nodes offering hidden services forget their chosen
|
|
|
|
intro points when they restart.
|
|
|
|
make it robust:
|
|
|
|
- auth mechanisms to let midpoint and bob selectively choose
|
|
|
|
connection requests.
|
|
|
|
make it scalable:
|
2004-12-02 10:27:24 +01:00
|
|
|
- robust decentralized storage for hidden service descriptors.
|
|
|
|
make it accessible:
|
|
|
|
- web proxy gateways to let normal people browse hidden services.
|
2004-05-10 11:40:44 +02:00
|
|
|
|
|
|
|
Tor scalability:
|
|
|
|
Relax clique assumptions.
|
|
|
|
Redesign how directories are handled.
|
|
|
|
- Resolve directory agreement somehow.
|
|
|
|
Find and remove bottlenecks
|
|
|
|
- Address linear searches on e.g. circuit and connection lists.
|
|
|
|
Reputation/memory system, so dirservers can measure people,
|
|
|
|
and so other people can verify their measurements.
|
|
|
|
- Need to measure via relay, so it's not distinguishable.
|
|
|
|
Let dissidents get to Tor servers via Tor users. ("Backbone model")
|
|
|
|
|
|
|
|
Make it more correct:
|
|
|
|
Handle half-open connections: right now we don't support all TCP
|
|
|
|
streams, at least according to the protocol. But we handle all that
|
|
|
|
we've seen in the wild.
|
|
|
|
Support IPv6.
|
|
|
|
|
|
|
|
Efficiency/speed/robustness:
|
|
|
|
Congestion control. Is our current design sufficient once we have heavy
|
|
|
|
use? Need to measure and tweak, or maybe overhaul.
|
|
|
|
Allow small cells and large cells on the same network?
|
|
|
|
Cell buffering and resending. This will allow us to handle broken
|
|
|
|
circuits as long as the endpoints don't break, plus will allow
|
|
|
|
connection (tls session key) rotation.
|
|
|
|
Implement Morphmix, so we can compare its behavior, complexity, etc.
|
|
|
|
Use cpuworker for more heavy lifting.
|
|
|
|
- Signing (and verifying) hidserv descriptors
|
|
|
|
- Signing (and verifying) intro/rend requests
|
|
|
|
- Signing (and verifying) router descriptors
|
|
|
|
- Signing (and verifying) directories
|
|
|
|
- Doing TLS handshake (this is very hard to separate out, though)
|
|
|
|
Buffer size pool: allocate a maximum size for all buffers, not
|
|
|
|
a maximum size for each buffer. So we don't have to give up as
|
|
|
|
quickly (and kill the thickpipe!) when there's congestion.
|
|
|
|
Other transport. HTTP, udp, rdp, airhook, etc. May have to do our own
|
|
|
|
link crypto, unless we can bully openssl into it.
|
|
|
|
|