mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
remove some old done items i found in the todo
svn:r17030
This commit is contained in:
parent
e7f5a07ff4
commit
d9b429b514
22
doc/TODO.021
22
doc/TODO.021
@ -92,15 +92,6 @@ Andrew
|
||||
- Should we still be telling you how to use Safari on OS X for Tor,
|
||||
given all the holes that Torbutton-dev solves on Firefox?
|
||||
|
||||
Karsten
|
||||
o Make a hidden services explanation page with the hidden service
|
||||
diagrams. See img/THS-[1-6].png. These need some text to go along
|
||||
with them though, so people can follow what's going on.
|
||||
- We should consider a single config option TorPrivateNetwork that
|
||||
turns on all the config options for running a private test tor
|
||||
network. having to keep updating all the tools, and the docs,
|
||||
just isn't working.
|
||||
|
||||
Weasel
|
||||
- Figure out how to make Vidalia and Tor play nicely on Debian, make
|
||||
the necessary modifications, and make some Vidalia debs that pass
|
||||
@ -108,8 +99,6 @@ Weasel
|
||||
- Fix bug 393.
|
||||
- Get oftc to switch to Tor dns bulk exitlist. Or tell us why it's
|
||||
not suitable yet.
|
||||
o Take non-Running entries out of the networkstatus consensus.
|
||||
[proposal 138]
|
||||
- Move proposal 134 forward.
|
||||
- putting port predictions in state file
|
||||
- if tor hasn't been used in a while it stops fetching consensus
|
||||
@ -118,8 +107,6 @@ Weasel
|
||||
Roger
|
||||
- Finish tor-doc-bridge.wml
|
||||
. Fix FAQ entry on setting up private Tor network
|
||||
- Review Karsten's hidden service diagrams
|
||||
- Roger should visit Internews DC sometime.
|
||||
- Did we actually apply Steven's dkimproxy patch?
|
||||
- Brainstorm about safe but effective ways for vidalia to
|
||||
auto-update its user's bridges via Tor in the background.
|
||||
@ -166,8 +153,6 @@ R - investigate: it looks like if the bridge authority is unreachable,
|
||||
we're not falling back on querying bridges directly?
|
||||
R - if "no running bridges known", an application request should make
|
||||
us retry all our bridges.
|
||||
R - get matt to make vidalia do a getinfo status/bootstrap-phase to
|
||||
get caught up after it connects.
|
||||
R d Setting DirPort when acting as bridge will give false Warnings
|
||||
|
||||
For 0.2.1.x:
|
||||
@ -214,16 +199,9 @@ R d 128: families of private bridges
|
||||
Named.
|
||||
R d Do we want to maintain our own set of entryguards that we use as
|
||||
next hop after the bridge?
|
||||
X Add an 'exit-address' line in the descriptor for servers that exit
|
||||
from something that isn't their published address.
|
||||
[I think tordnsel solved this. -RD]
|
||||
d Possibly: revise link protocol to allow big circuit IDs,
|
||||
variable-length cells, proposal-110 stuff, and versioned CREATES?
|
||||
o Eliminate use of v2 networkstatus documents in v3 authority
|
||||
decision-making.
|
||||
N . Draft proposal for GeoIP aggregation (see external constraints *)
|
||||
o Separate Guard flags for "pick this as a new guard" and "keep this
|
||||
as an existing guard". First investigate if we want this.
|
||||
. Figure out how to make good use of the fallback consensus file. Right
|
||||
now many of the addresses in the fallback consensus will be stale,
|
||||
so it will take dozens of minutes to bootstrap from it. This is a
|
||||
|
Loading…
Reference in New Issue
Block a user