wiki:org

Version 3 (modified by karsten, 8 years ago) (diff)

--

Tor development overview

Project-management process

Operations

Projects

#1749
Split relay and link crypto across multiple CPU cores
#2473
Develop a design to support multiple bridge authorities
#2628
Be smarter about launching connections to authorities to learn about clock skew
#3591
We must implement the whole pluggable transports thing
#4565
Enable relays to talk to other relays via IPv6
#4624
Config option to declare whether you're using bridges for reachability or for security
#4682
Deal with 'double door' effects because our read and write rate limiting are independent
#5221
Intelligently use capabilities/privileges and drop what we don't need for Windows
#5456
Defend against path bias and tagging attacks
#5545
Destroy DNT
#5751
Standardize SOCKS extensions to support proxied DNS queries
#5791
Gather apparmor/selinux/seatbelt profiles for each component of TBB
#5992
META: Decentralize directory authorities as far as safely possible
#6198
Make sure that we clear addresses before freeing connections
#6313
Many of Tor's complex functions should be refactored
#6548
Improve the Usability of Tor Browser Bundle
#6549
Implement "Do Not Track" as privacy-by-design
#6583
Create a Tor Communications Bundle/Tor Platform
#6584
Fuzz our automated, sanboxed testing framework
#6585
Automated testing framework for TBB
#6883
Separate configuration options for separate Socks/NATD/Trans/DNS ports
#7004
reduce webserver bandwidth utilization
#7030
build automation for custom tbb build process
#7031
test tbb build automation
#7033
derive plan to mitigate risks found during forensic analysis of tbb on Win7/OSX
#7106
Write "how to be nice to the Tor network" spec
#7134
Add statistics on time spent on crypto operations
#7144
Implement Bridge Guards and other anti-enumeration defenses
#7153
Don't require pluggable transport proxies to be SOCKS proxies
#7174
Refactor node_t and router lists to make it easier to identify bugs
#7177
Understand how accurate the bandwidth authority estimates are
#7256
Explore zoom-based alternatives to fixed window sizes
#7346
Add stream-level pushback into n23 design
#7349
Obfsbridges should be able to "disable" their ORPort
#7679
Test integration of Minion (out-of-order data transmission thing) with Tor relays
#9165
Evaluate datagram-based transports; build and merge as appropriate
#9689
Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery
#9864
Make it easier for users to do file verification
#9966
Work with Debian or another FOSS vendor to provide non-x86 TBB packages
#10071
Highlight Perfect Forward Secrecy
#10393
Torbrowser updates are verified through the Tor consensus
#10397
Torbrowser's updater integrates additional protections from Thandy's threat model
#10970
tor-bridge-relay Debian package
#10974
Turn the “short user manual” into the Tor Browser User Manual
#12131
Measure connectivity patterns between relays
#12631
Tor Browser for ARM architecture
#12807
Implement an anonymous credential system for BridgeDB's Social Distributor
#12820
Test+Recommend Tor Browser with MS EMET (Enhanced Mitigation Experience Toolkit)
#13421
GoodBadISP's Revamp
#13444
"GhostNode" - support relays that cannot accept incoming connections.
#13630
Bandwidth Authority Renovation
#13867
New Bad ISPs Page
#14942
Tor Browser for BSDs
#15279
uMatrix & uBlock to Replace NoScript
#16451
vpn like traffic pluggable-transport
#16538
Limit the impact of a malicious HSDir
#16791
All modules in src/common should have 90-95%+ unit test coverage
#18635
Make a design for circuit- migration in the event of DoS
#18636
Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate.
#19001
Tor Browser with Snowflake
#19229
Canary monitoring
#19280
Replace or fork NoScript in the Tor Browser
#19625
Allow relays to set peering policy
#20348
Allot Communications blocking of vanilla Tor, obfs4, and meek in Kazakhstan, starting 2016-06
#20822
Follow-up tasks for prop271 (new guard API) implementation
#21205
Instrument clients to measure directory usage
#21222
Main ticket for website redesign project
#21518
Pluggable transports for zero-rated services
#21952
.Onion everywhere?: increasing the use of onion services through automatic redirects and aliasing
#22079
Community governance documents
#22716
Write a blog post advocating for getting more relays
#23079
Support 80-bit Onion Model In Perpetuity
#23150
Re-evaluating tor browser's security controls: let's have one place to adjust all per-tab, global, persistent, and per-session security preferences.
#23267
Cross-platform brand and features consistency: make Android and iOS browsers as good as TBB
#23333
Leekspin bug hunting
#23376
Build survey form for Onion Browser branding research
#23658
Improve content sandboxing Tor Browser users on Windows
#24018
Automate measuring connection timeouts per exit
#24061
Collect Baseline Measurements for Different Android Performance Metrics
#24830
Mashup GoodBadISPs with Onionoo to give indications of which providers are oversubscribed
#24985
Preserve circuit-layer confidentiality against a quantum-capable adversary
#25210
Measure how often tor clients fetch the consensus
#25404
Update design to use new styleguide (bootstrap 4)
#25483
Windows reproducible build of snowflake
#25510
Collect feedback on mobile embedding API; resolve issues.
#25537
Integrate Tor BSD Diversity Project's statistics into Tor Metrics
#25550
improve continuous integration support
#25587
Investigate optimizing APK for Smart App Updating
#25658
Activity 2.1: Improve user understanding and user control by clarifying Tor Browser's security features
#25775
Use OnionPerf to measure network partitioning
#25777
Create a new service to help relay operators debug their relay
#25874
DNS-based rendezvous for Snowflake
#25966
Report on Tor in the UAE (and question about Snowflake)
#25985
Snowflake rendezvous using AMP cache
#25986
Add AMP cache fronting option to Moat
#26087
Growth in bridge users in Iran circa 2018-05-01
#26092
Split broker into components
#26151
Snowflake rendezvous using Amazon SQS
#26285
Trac / Github service bot
#26291
find all instances of SHA-1 in our design and implementation and kill them with fire
#26299
Reproducible Tor releases
#26302
Build fonts we ship from source
#26782
TBA: Translation/Localization Support
#26836
Update and refresh the research portal
#26923
Intent to create Pluggable Transport: HTTPS proxy
#27119
Usability Testing: Support Portal
#27353
intern project idea: a chutney or shadow framework for testing bootstrap speed/success
#27364
update ricochet to use hsv3
#27405
New account can't add edit existing ticket
#27632
Get in contact with operators / supporters of hackspaces possibly interested in running a relay
#27694
what happens if we have both a firewall-bypass proxy and a pluggable transport?
#28231
Provide more Gettor distribution methods
#28232
Revive GetTor
#28233
Translate GetTor messages
#28322
Deploy better notification system for operational issues
#28342
Share more code between modules
#28526
Document how NGOs can run private obfs4 bridges, and get some doing it
#28541
Exit
#28556
Detect other installed circumvention tools and offer them as transports
#28672
Android reproducible build of Snowflake
#28841
Write tool for onion service health assessment
#28948
Anonymous/private HTTP alternative.
#29038
Security of host device and OS using Tor in Virtual Monitor
#29096
Run Moat using ptadapter
#29114
Extended ORPort and TransportControlPort spec (#196) is "Finished" but not "Closed"
#29267
CI for pluggable transports
#29274
Get developers using new PT alphas
#29285
Improve the PT spec and how PTs interface with Tor
#29287
Have backup PT in pipeline
#29296
Look into alternatives for distributing bridge info to clients
#29304
Manage the lifecycle of systems
#29318
Drop mingw-w64/gcc toolchain
#29400
Set up a Gitlab instance
#29448
Provide a dir-spec implementation that serves sanitised descriptors
#29590
Smarter bootstrapping for Tor Browser on Android taking censorship into account
#29650
Rewrite exit scanner to produce exit lists according to new format
#29654
Initial MVP for new exit scanner
#29864
consider replacing nagios with prometheus
#29974
move critical services off, and then replace, moly
#29987
clear out unowned files on servers
#29995
Objective 1, Activity 1.1: Make v3 the default on Core Tor stable
#29998
Objective 1, Activity 1.2: Adopt OnionBalance features into onion services v3
#29999
Objective 1, Activity 2: Denial of service defences
#30000
Objective 2, Activity 1: Integrating client-side authorization to onion services v3
#30009
consider trocla for secrets management in puppet
#30020
switch from our custom YAML implementation to Hiera
#30022
Objective 2, Activity 2: Notify users about typo errors when entering .onion addresses
#30024
Objective 2, Activity 3: Notify users if a current website they are visiting on Tor Browser has an onion service version
#30025
Objective 2, Activity 4: Better client-side errors
#30026
move grafana in a docker container
#30029
Objective 2, Activity 5: POC for Human-memorable addresses for .onion services
#30037
Optimizing and clarifying warnings and notifications
#30152
Monitor anti-censorship infrastructure
#30273
improve inventory of hardware resources
#30289
Create a TapDance PT for Tor
#30471
Improve UX for obfs4 bridge operation
#30559
Tor won't start up properly
#30777
Run a "set up new bridges" campaign
#30794
Create lightweight censorship analyser for users
#30857
migrate (some projects? everything?) from trac to gitlab
#30872
Test BridgeDB's distribution channels in controlled experiment
#30939
Use Firefox's Enhanced Tracking Protection as a means for performance improvements
#30986
Understand the "long tail" of unclassifiable network traffic
#31052
Guest accounts in the ticketing system
#31153
Create a "tor-bridge" Debian meta package
#31164
Set up default bridge at Karlstad University
#31265
Sponsor 30 master ticket
#31266
Objective 1: Support censorship circumvention through the improvement of network measurement methodologies aimed at detecting the blocking of circumvention tools.
#31268
Objective O2: Ensure users in target countries have access to the best Tor bridge options for circumventing censorship.
#31269
Objective O3: Improve Tor Browser experience for human rights defenders under censorship.
#31270
O1.2 - Analyze collected censorship circumvention tool test results and integrate them into OONI Explorer and the OONI API.
#31271
O1.3 - Improve censorship circumvention tool methodology to include metrics that are also related to the performance of the tool.
#31272
O1.4 - Make OONI Probe’s reporting logic more resilient to censorship.
#31273
O1.5 - Develop OONI Probe orchestration logic that is specific to circumvention tool testing.
#31274
O2.1 - Create an evaluation framework and collect data to better monitor and evaluate current bridge selection and distribution processes.
#31279
O2.2 - Improve user experience and user interface of bridges.torproject.org.
#31280
O2.3 - Develop new and/or improve existing bridge selection and distribution strategies.
#31281
O2.4 - Boost security by increasing the number of bridges run by volunteers and collective entities through improvements to onboarding and better communications.
#31282
O3.1 - Research different scenarios of how human rights defenders experience censorship.
#31283
O3.2 - Design the flow of how our users can bypass the scenarios of O3.1.
#31284
O3.3 - Implement final design of user flows created on O3.2.
#31289
A3 - Localize bridges.torproject.org.
#31434
Write ANTLR parsers for dir-spec descriptors and benchmark
#31435
Emulate different Fast/Guard cutoffs in historical consensuses
#31686
retire textile
#31690
study trac.torproject.org archival possibilities
#31700
decomission jabber server

Roadmaps

Sponsors