Initial stab at a huge tasklist for the SponsorR project.
The tasks were picked from the [tor-dev] thread: https://lists.torproject.org/pipermail/tor-dev/2014-October/007642.html
For now these are just all the ideas that were expressed. Not the actual tasklist.
- Safe statistics collection
- More research on obfuscation techniques for collecting statistics
- Collect additional statistics after security analysis.
- Create Privex-like statistics collection system
- Write tech report about all HS statistics and figure out which ones to do [HALF DONE]
- Tor controller API improvements
- Torperf HS benchmarking (#1944 (closed))
- HS integration tests (e.g. #13494 (moved))
- improve HS privnets (#13401 (moved))
- Expose better HS error messages to users/benchmarking (#13212 (moved), prop292)
- Setup HS using the control port (#1949 (moved), #5976 (moved))
- Edit the authorized clients list of HSes using control port
- client-side: https://trac.torproject.org/projects/tor/ticket/8000 / https://lists.torproject.org/pipermail/tor-dev/2014-November/007735.html
- Improve control port interface of HSes
- "change configuration command" meejah: https://lists.torproject.org/pipermail/tor-dev/2014-October/007693.html
- Performance improvements
- Improve HS circuit establishment performance
- #8239 (moved) Hidden services should try harder to reuse their old intro points
- #3733 (moved) Tor should abandon rendezvous circuits that cause a client request to time out
- #13222 (moved): Clients accessing a hidden service can establish their rend point in parallel to fetching the hsdesc
- #13239 (moved): Maybe we want three preemptive internal circs for hidden services?
- Can we make unsuccessful rendezvous connections less of a burden on the network?
- Gather stats and benchmarks from privnets (#13792 (moved), #13208 (moved), #13209 (moved)) [IN PROGRESS]
- Profile/benchmark busy HSes to find chokepoints (see #8902 (moved))
- Document best practices for crawlers so that they are fast and don't fuck the network
- Further develop tor2web mode.
- Examine magic numbers and constants of HSes, document them and improve them (tech report)
- #8950 (moved) (number of IPs), number of HSDirs, etc.
- ed25519/crypto performance improvements (are HSes CPU bound?)
- batch verification
- more ed25519 tasks: https://trac.torproject.org/projects/tor/ticket/12498#comment:8
- Opt-in HS indexing service
- ahmia.fi / HS auth / GNS / petnames / namecoin
- petname system for gnunet: https://gnunet.org/fcfs/Zoneinfo
- SDSI: http://people.csail.mit.edu/rivest/sdsi10.html
- Better understanding of HSes (new category)
- CA certificates for onion domains (https://lists.torproject.org/pipermail/tor-dev/2014-November/007786.html)
- Encrypted services (https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/ideas/xxx-encrypted-services.txt)
- Enumerate use cases of HSes // Find use cases that are not covered (tech report)
- Onioncat? Bitcoin? Onionshare? Pond? Video?
- Stormy
- Write article on how to setup and secure HSes
- sources
- george's email: https://lists.torproject.org/pipermail/tor-dev/2014-October/007642.html
- Roger's email : https://lists.torproject.org/pipermail/tor-dev/2014-October/007652.html
- Nick's email : https://lists.torproject.org/pipermail/tor-dev/2014-October/007645.html
- John Brooks: https://lists.torproject.org/pipermail/tor-dev/2014-October/007644.html
- meejah : https://lists.torproject.org/pipermail/tor-dev/2014-October/007693.html
- griffin : https://lists.torproject.org/pipermail/tor-dev/2014-October/007653.html
- paul syverson : https://lists.torproject.org/pipermail/tor-dev/2014-October/007660.html
- christopher baines: https://lists.torproject.org/pipermail/tor-dev/2014-November/007797.html