Remove TODO items that are either done or moved to the tracker

This commit is contained in:
Nick Mathewson 2010-07-06 18:10:53 -04:00
parent a9edb0b4f6
commit f72c6f91de
2 changed files with 4 additions and 28 deletions

View File

@ -8,29 +8,16 @@ NOTE 2: It's easy to list stuff like this with no time estimates and
0.2.2, figure out how long the stuff we want will take, and 0.2.2, figure out how long the stuff we want will take, and
triage accordingly, or vice versa. triage accordingly, or vice versa.
- Design only
- Begin design work for UDP transition; identify areas where we need to
make changes or instrument stuff early.
[multiple weeks, ongoing. Need to do a draft early.]
- Performance, mostly protocol-neutral. - Performance, mostly protocol-neutral.
- Work with Libevent 2.0's bufferevent interface
- Identify any performance stuff we need to push back into
libevent to make it as fast as we want.
- Get a decent rate-limiting feature into Libevent
- Get openssl support into Libevent.
- Revise how we do bandwidth limiting and round-robining between o Revise how we do bandwidth limiting and round-robining between
circuits on a connection. circuits on a connection.
- Revise how we do bandwidth limiting and round-robining between . Revise how we do bandwidth limiting and round-robining between
connections. connections.
- Better flow-control to avoid filling buffers on routers. - Better flow-control to avoid filling buffers on routers.
- Split AES across cores if possible.
- Split SSL across cores (reach; may require Libevent 2.1).
- Figure out good ways to instrument Tor internals so we can tell - Figure out good ways to instrument Tor internals so we can tell
how well our bandwidth and flow-control stuff is actually working. how well our bandwidth and flow-control stuff is actually working.
- What ports eat the bandwidth? - What ports eat the bandwidth?
@ -58,10 +45,6 @@ NOTE 2: It's easy to list stuff like this with no time estimates and
- 158: microdescriptors - 158: microdescriptors
o Revise proposal o Revise proposal
- Implement - Implement
o 160: list bandwidth in consensus
o Finish proposal
o and actually set it reasonably
o and actually use it.
- Proposals to improve and implement if not broken - Proposals to improve and implement if not broken
D IPv6 support. (Parts of 117, but figure out how to handle DNS D IPv6 support. (Parts of 117, but figure out how to handle DNS
@ -104,6 +87,6 @@ M? - Write proposal
- Switch to MSI on win32 - Switch to MSI on win32
- Use Thandy, perhaps? - Use Thandy, perhaps?
- Deprecations o Deprecations
- Make .exit safe, or make it off-by-default. o Make .exit safe, or make it off-by-default.

View File

@ -22,7 +22,6 @@ K - Karsten claims
======================================================================= =======================================================================
Later, unless people want to implement them now: Later, unless people want to implement them now:
- tor as a socks proxy should accept (and ignore) password auth
- Actually use SSL_shutdown to close our TLS connections. - Actually use SSL_shutdown to close our TLS connections.
- Include "v" line in networkstatus getinfo values. - Include "v" line in networkstatus getinfo values.
[Nick: bridge authorities output a networkstatus that is missing [Nick: bridge authorities output a networkstatus that is missing
@ -30,10 +29,6 @@ Later, unless people want to implement them now:
bridgedb gives out bridges with certain characteristics. -RD] bridgedb gives out bridges with certain characteristics. -RD]
[Okay. Is this a separate item, or is it the same issue as the lack of [Okay. Is this a separate item, or is it the same issue as the lack of
a "v" line in response to the controller GETINFO command? -NM] a "v" line in response to the controller GETINFO command? -NM]
- Let tor dir mirrors proxy connections to the tor download site, so
if you know a bridge you can fetch the tor software.
- when somebody uses the controlport as an http proxy, give them
a "tor isn't an http proxy" error too like we do for the socks port.
- MAYBE kill stalled circuits rather than stalled connections. This is - MAYBE kill stalled circuits rather than stalled connections. This is
possible thanks to cell queues, but we need to consider the anonymity possible thanks to cell queues, but we need to consider the anonymity
implications. implications.
@ -45,8 +40,6 @@ Later, unless people want to implement them now:
online config documentation from a single source. online config documentation from a single source.
- It would be potentially helpful to respond to https requests on - It would be potentially helpful to respond to https requests on
the OR port by acting like an HTTPS server. the OR port by acting like an HTTPS server.
- Make the timestamp granularity on logs configurable, with default
of "1 second". This might make some kinds of after-the-fact attack harder.
- We should get smarter about handling address resolve failures, or - We should get smarter about handling address resolve failures, or
addresses that resolve to local IPs. It would be neat to retry addresses that resolve to local IPs. It would be neat to retry