[tor-bugs] #9974 [Flashproxy]: packaging and installation scripts for facilitator
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Nov 15 10:26:23 UTC 2013
#9974: packaging and installation scripts for facilitator
-----------------------------+--------------------------
Reporter: infinity0 | Owner: dcf
Type: enhancement | Status: needs_review
Priority: normal | Milestone:
Component: Flashproxy | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-----------------------------+--------------------------
Comment (by dcf):
Good job on this. I paid for a new server to try installing this new code
on, but I haven't tried setting it up yet. I will try to do so today or
tomorrow.
It's not clear to me in what order I should read the different howto
documents to set up a new facilitator. I guess it is:
1. facilitator/doc/server-howto.txt
2. facilitator/doc/http-howto.txt
3. facilitator/INSTALL
(Followed by facilitator/doc/appspot-howto.txt and facilitator/doc/email-
howto.txt if those were not already set up.) What is your imagined
narrative of someone reading and following the instructions? What will
they naturally try reading first, and what steps do you want them to take?
I checked facilitator/INSTALL first; maybe that file should contain
references to the others.
[https://github.com/infinity0/flashproxy/commit/aafd15b8927e0d7519152d3e88f655b571037f04
#diff-2751e08e60a242b8ab992d77d774e405L13 Setting FP_FACILITATOR in fp-
reg.go.] It's good to make this externally configurable. I think it's
better, however, to make the the configurable part a whole URL, and not
just the domain part. We should support facilitators running on different
ports and with different base paths. Run `go fmt` after making changes to
Go files.
[https://github.com/infinity0/flashproxy/commit/7ed4f653df3b7b6ec92fef41efd3f2295bd097d8
Removing separate mention of the url registration method.] I think of url
as being distinct from the the http method. http is a relict from an
earlier age--we could get rid of http but still keep url. url and appspot
are more alike than are url and http. http uses a POST with plaintext
parameters in the request body. url uses a GET with an encrypted payload
in the path. With the http method, you contact the facilitator yourself,
while with the url method the URL is retrieved by some third party. url
isn't very nice by itself because it can't find out your external address
and therefore can't work automatically, but I think it makes sense to
discuss it separately in the context of someone operating a facilitator.
[https://github.com/infinity0/flashproxy/commit/a310c1d0f893ebd18a128a9d92684b3cf51d70a4
Changes to name resolution in facilitator-email-poller.]
> - smarter default IMAP host; and resolve DNS by default - previously one
had to use an IP address
> - add a nameOk option to parse_addr_spec as certificate verification
requires imap host to be a name
This is a good bug you found. I'm not wild about the new more complicated
interface to `parse_addr_spec` with the `nameOk` parameter. It's a
reasonable thing to add, but I wonder if there is a better way. Maybe add
a new lower-level function that additionally returns the host part string
along with what `parse_addr_spec` normally returns--then `parse_addr_spec`
could call the lower-level function and throw the extra information away.
I don't think we need the heuristic of guessing imap.<domain> based on the
email address. Just make the user be explicit. (Realistically, zero people
are ever going to change the IMAP host, because the program simply won't
work with any other mail provider than Gmail. If we were to add another
provider, it might be a good design to have a separate poller program to
do that, tailored for that other provider's idiosyncrasies.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9974#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list