Changes between Initial Version and Version 1 of org/sponsors/SponsorU/Tor

Feb 25, 2015, 4:08:07 PM (4 years ago)



  • org/sponsors/SponsorU/Tor

    v1 v1  
     1=== Guard node improvements (task 4.1) ===
     3* Further design and discussion, along with at least one whitepaper, discussing guard node design and improvements based on the reactions of researchers in the field.
     4* A more formal set of specification documents describing our guard selection and path selection algorithms, so that researchers can better analyze their security properties, so that we can better validate the correctness of our implementation, and so that other implementations of Tor and other anonymity tools can take advantage of our findings.
     5* An implementation of our improved guard node design, included in our codebase, with improvements as found necessary during research.
     6* Improvements to the testing of our route selection infrastructure. Risks and contingencies for guard redesign.
     8=== Improved public identity keys for Tor relays (task 4.2) ===
     10* An updated design document to handle all pending questions in the design proposal with a complete specification for key algorithms currently described in English.
     11* Additional design proposals for handling key revocation, and future identity key types if they should prove to be needed.
     12* Support for offline identity key storage, so that a relay’s most sensitive key material no longer needs to be stored unencrypted on the same computer as the relay.
     13* Directory system support for improved identity key infrastructure: relays must publish cross-certified [14] server descriptors including new identity key types [13] as well as old ones. Authorities must track and certify all key types, and prevent later changes in binding between identity keys.
     14* Protocol support for improved identity key infrastructure: clients connecting to a server can verify that they are connecting to the server with the desired identity key(s), and can instruct midpoint servers to extend to the server with the desired identity key(s).
     16=== Better DoS resistance throughout the Tor protocol (task 4.3) ===
     18* A whitepaper identifying and classifying kinds of DoS against onion routing networks; evaluating them for importance; identifying already-proposed fixes, and identifying problems for which new fixes are still needed.
     19* One or more design proposals for improvements to the Tor protocol to avoid the most important denial-of-service attacks against Tor networks. These will provide sufficient detail and rationale so that other implementations of the Tor protocols, and designers of other anonymity tools, can use them to strengthen their systems as well.
     20* Implementations of the most beneficial of these proposals (in terms of cost-benefit ratio), so as to render Tor servers and the Tor network less susceptible to denial of service. The details of these will be defined more fully after the analysis in the steps above.
     22=== Rigorous developer documentation (task 4.4) ===
     24* A quick-start guide for new developers to Tor, covering the layout of the Tor source code, our coding practices, development methodology, testing strategies, and other information that new developers frequently take time to learn.
     25* A quick-start guide to writing tests for the Tor codebase.
     26* A high-level overview of the structure of the Tor codebase, explaining the relationships between the key modules in Tor and the data flows through each one.
     27* A user’s manual for the compatibility and cryptographic layers at the bottom of the Tor code stack.
     28* A detailed high- and low-level overview of all modules in Tor, their data flows, their intended interactions, and their actual behaviors.