From d9b429b5142681adc2c6e86279bc0933ffd7dd54 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Thu, 2 Oct 2008 11:13:34 +0000 Subject: [PATCH] remove some old done items i found in the todo svn:r17030 --- doc/TODO.021 | 22 ---------------------- 1 file changed, 22 deletions(-) diff --git a/doc/TODO.021 b/doc/TODO.021 index 9e8e7968c3..1f5cf8bb71 100644 --- a/doc/TODO.021 +++ b/doc/TODO.021 @@ -92,15 +92,6 @@ Andrew - Should we still be telling you how to use Safari on OS X for Tor, given all the holes that Torbutton-dev solves on Firefox? -Karsten - o Make a hidden services explanation page with the hidden service - diagrams. See img/THS-[1-6].png. These need some text to go along - with them though, so people can follow what's going on. - - We should consider a single config option TorPrivateNetwork that - turns on all the config options for running a private test tor - network. having to keep updating all the tools, and the docs, - just isn't working. - Weasel - Figure out how to make Vidalia and Tor play nicely on Debian, make the necessary modifications, and make some Vidalia debs that pass @@ -108,8 +99,6 @@ Weasel - Fix bug 393. - Get oftc to switch to Tor dns bulk exitlist. Or tell us why it's not suitable yet. - o Take non-Running entries out of the networkstatus consensus. - [proposal 138] - Move proposal 134 forward. - putting port predictions in state file - if tor hasn't been used in a while it stops fetching consensus @@ -118,8 +107,6 @@ Weasel Roger - Finish tor-doc-bridge.wml . Fix FAQ entry on setting up private Tor network - - Review Karsten's hidden service diagrams - - Roger should visit Internews DC sometime. - Did we actually apply Steven's dkimproxy patch? - Brainstorm about safe but effective ways for vidalia to auto-update its user's bridges via Tor in the background. @@ -166,8 +153,6 @@ R - investigate: it looks like if the bridge authority is unreachable, we're not falling back on querying bridges directly? R - if "no running bridges known", an application request should make us retry all our bridges. -R - get matt to make vidalia do a getinfo status/bootstrap-phase to - get caught up after it connects. R d Setting DirPort when acting as bridge will give false Warnings For 0.2.1.x: @@ -214,16 +199,9 @@ R d 128: families of private bridges Named. R d Do we want to maintain our own set of entryguards that we use as next hop after the bridge? - X Add an 'exit-address' line in the descriptor for servers that exit - from something that isn't their published address. - [I think tordnsel solved this. -RD] d Possibly: revise link protocol to allow big circuit IDs, variable-length cells, proposal-110 stuff, and versioned CREATES? - o Eliminate use of v2 networkstatus documents in v3 authority - decision-making. N . Draft proposal for GeoIP aggregation (see external constraints *) - o Separate Guard flags for "pick this as a new guard" and "keep this - as an existing guard". First investigate if we want this. . Figure out how to make good use of the fallback consensus file. Right now many of the addresses in the fallback consensus will be stale, so it will take dozens of minutes to bootstrap from it. This is a