some deliverables and timeline for the directory overhead project

svn:r14556
This commit is contained in:
Roger Dingledine 2008-05-04 10:46:31 +00:00
parent 755cbe5d44
commit 0c46f1eaea

View File

@ -94,12 +94,14 @@ N - Additional TLS-camouflage work (spoofing FF cipher suite, etc.)
- investigate the feasibility of handing connections off to a - investigate the feasibility of handing connections off to a
local apache if they don't look like Tor or if they don't local apache if they don't look like Tor or if they don't
portknock or whatever. portknock or whatever.
W - Get closer to downloading far fewer descriptors - Get closer to downloading far fewer descriptors
- Instrument the code to track how many descriptors we download vs how W - Instrument the code to track how many descriptors we download vs how
many times we extend a circuit. many times we extend a circuit. Guess a few other things to
- Write a proposal for how to fetch far fewer descriptors; assess instrument, like cache activity, and do those too.
anonymity attacks, like from looking at the size of the W - Start a proposal for how to fetch far fewer descriptors;
descriptor you fetch. identify and start assessing anonymity attacks, like from looking
at the size of the descriptor you fetch. See xxx-grand-plan.txt
for some early thoughts.
I - Translation portal I - Translation portal
- Vidalia installer translations - Vidalia installer translations
- Find/make a script to convert NSI strings into PO files - Find/make a script to convert NSI strings into PO files
@ -118,6 +120,13 @@ KS - Investigate where the slowdown occurs for making hidden service
areas that can be improved, and make some guesses about which we areas that can be improved, and make some guesses about which we
should focus on. should focus on.
- mid July
W - Take the results from instrumenting directory downloads on Tor
clients, and analyze/simulate some alternate approaches. Finish
proposal for how to improve things, iterate based on feedback,
convince us that the anonymity tradeoffs and/or scalability
tradeoffs are acceptable.
- mid August - mid August
KS - Design hidden service improvements, evaluate them and consider KS - Design hidden service improvements, evaluate them and consider
security properties: write some proposals, get feedback, revise security properties: write some proposals, get feedback, revise
@ -139,10 +148,14 @@ I - Figure out a good PKI, document the design, assess security issues:
- mid October - mid October
KS - Finish implementation of hidden service improvements: have a set KS - Finish implementation of hidden service improvements: have a set
of patches that you think work. of patches that you think work.
W - Finish implementation of directory overhead changes: have a set
of patches that you think work.
- mid January - mid January
KS - Finish testing, debugging, unit testing, etc the hidden service KS - Finish testing, debugging, unit testing, etc the hidden service
changes. Have it in the development version and in use. changes. Have it in the development version and in use.
W - Finish testing, debugging, unit testing, etc the directory overhead
changes. Have it in the development version and in use.
======================================================================= =======================================================================