move the december feature list up into the 0.2.0 section of

the todo list. the feature freeze is off. better luck in 2008!


svn:r12675
This commit is contained in:
Roger Dingledine 2007-12-05 05:46:52 +00:00
parent 569ade5143
commit 9cb8a4940c

View File

@ -20,6 +20,37 @@ For Tor 0.2.0.13-alpha:
- Put a consensus in place of the empty fallback-consensus file in
src/config and see what breaks.
- let bridges set relaybandwidthrate as low as 5kb
- config option FetchDirInfoEagerly so the dnsel can fetch dir
info like a mirror without needing to be a tor server.
- nick has to pick a name for it
Features blocking 0.2.0.x:
- mirror tor downloads on (via) tor dir caches
R . spec
d deploy
- geoip caching and publishing for bridges
R . spec
- deploy
d let Vidalia use the geoip data too rather than doing its own
anonymized queries
- bridge address disbursal strategies
o get the cached-descriptors* to bridges@moria
- parse out bridge addresses from cached-descriptors*
(or parse them out before Tonga sends them)
(or get Tonga's Tor to write them out better in the first place)
N * answer by IP/timestamp
- run a little web server on moria?
N d answer by answering email to bridges@torproject
- keep track of which addresses have been answered already
R d some sort of reachability testing on bridges
R - families of bridges
- interface for letting soat modify flags that authorities assign
R . spec
- deploy
S * tor usb windows image (vidalia, polipo, tor, firefox)
S/M - vidalia can launch firefox
- build a community version of firefox
- pick our favorite extensions
Things we'd like to do in 0.2.0.x:
- See also Flyspray tasks.
@ -146,7 +177,7 @@ R - drop 'authority' queries if they're to our own identity key; accept
o be more robust to bridges being marked as down and leaving us
stranded without any known "running" bridges.
- Bridges operators (rudimentary version)
* Ability to act as dir cache without a dir port.
o Ability to act as dir cache without a dir port.
o Bridges publish to bridge authorities
o Fix BEGIN_DIR so that you connect to bridge of which you only
know IP (and optionally fingerprint), and then use BEGIN_DIR to learn
@ -211,34 +242,6 @@ Nice-to-have items for 0.2.0.x, time permitting:
servers. but sometimes our entry node is the same for multiple
test circuits. this defeats the point.
Planned for 0.2.1.x, December:
- mirror tor downloads on (via) tor dir caches
R - spec
d deploy
- geoip caching and publishing for bridges
R - spec
- deploy
d let Vidalia use the geoip data too rather than doing its own
anonymized queries
- bridge address disbursal strategies
o get the cached-descriptors* to bridges@moria
- parse out bridge addresses from cached-descriptors*
(or parse them out before Tonga sends them)
(or get Tonga's Tor to write them out better in the first place)
* answer by IP/timestamp
- run a little web server on moria?
d answer by answering email to bridges@torproject
- keep track of which addresses have been answered already
d some sort of reachability testing on bridges
- families of bridges
- interface for letting soat modify flags that authorities assign
R - spec
- deploy
S * tor usb windows image (vidalia, polipo, tor, firefox)
S/M - vidalia can launch firefox
- build a community version of firefox
- pick our favorite extensions
Planned for 0.2.1.x:
- enforce a lower limit on MaxCircuitDirtiness and CircuitBuildTimeout.
- configurable timestamp granularity. defaults to 'seconds'.
@ -313,8 +316,8 @@ Deferred from 0.2.0.x:
local_routerstatus (or equivalent) subsume all places to go for "what
router is this?"
- Blocking/scanning-resistance
- It would be potentially helpful to https requests on the OR port by
acting like an HTTPS server.
- It would be potentially helpful to respond to https requests on
the OR port by acting like an HTTPS server.
- Do we want to maintain our own set of entryguards that we use as
next hop after the bridge? Open research question; let's say no
for 0.2.0 unless we learn otherwise.