[tahoe-lafs-trac-stream] [tahoe-lafs] #1007: HTTP proxy support for node to node communication
tahoe-lafs
trac at tahoe-lafs.org
Wed Aug 7 15:41:32 UTC 2013
#1007: HTTP proxy support for node to node communication
-------------------------+-------------------------------------------------
Reporter: duck | Owner: davidsarah
Type: | Status: new
enhancement | Milestone: soon
Priority: minor | Version: 1.6.1
Component: code- | Keywords: privacy anonymity firewall foolscap
network | anti-censorship
Resolution: |
Launchpad Bug: |
-------------------------+-------------------------------------------------
Old description:
> To use Tahoe-LAFS over the [http://www.i2p2.de/ I2P anonymous network] I
> have added HTTP proxy support to the Foolscap library. Most of the work
> is in Foolscap, but within Tahoe it must also be possible to enable this
> functionality and specify which HTTP proxy to use. All I2P nodes have
> this HTTP proxy enabled by default on `127.0.0.1:4444`.
>
> For the anonymous network use case, every connection to storage nodes and
> introducers will have to be through the anonymous network; it is not
> acceptable to mix anonymous and non-anonymous connections. The intention
> is to provide anonymity to both clients and node operators.
>
> A reference implementation is available on http://duck.i2p.to/tahoe-lafs/
> , as of today (2010-03-27) a test grid is operating inside I2P with 21
> nodes, of which 6 storage nodes and 1 introducer.
>
> Example of configuration in `tahoe.cfg`:
> {{{
> [node]
> ...
> http_proxy = 127.0.0.1:4444
> }}}
>
> Snippit showing how this is used in `node.py`:
> {{{
> http_proxy = self.get_config("node", "http_proxy", "")
> if http_proxy:
> self.tub.setOption("httpProxy", http_proxy)
> }}}
New description:
To use Tahoe-LAFS over the [http://www.i2p2.de/ I2P anonymous network] I
have added HTTP proxy support to the Foolscap library. Most of the work is
in Foolscap, but within Tahoe it must also be possible to enable this
functionality and specify which HTTP proxy to use. All I2P nodes have this
HTTP proxy enabled by default on `127.0.0.1:4444`.
For the anonymous network use case, every connection to storage nodes and
introducers will have to be through the anonymous network; it is not
acceptable to mix anonymous and non-anonymous connections. The intention
is to provide anonymity to both clients and node operators.
A reference implementation is available on http://duck.i2p.to/tahoe-lafs/
, as of today (2010-03-27) a test grid is operating inside I2P with 21
nodes, of which 6 storage nodes and 1 introducer.
Example of configuration in `tahoe.cfg`:
{{{
[node]
...
http_proxy = 127.0.0.1:4444
}}}
Snippit showing how this is used in `node.py`:
{{{
http_proxy = self.get_config("node", "http_proxy", "")
if http_proxy:
self.tub.setOption("httpProxy", http_proxy)
}}}
--
Comment (by killyourtv):
Attached is an updated patch (0001-outbound-proxy-support.patch ) that
changes the config option to outbound-proxy. The patch applies cleanly to
current trunk.
(I'm still trying to learn Python so please forgive any n00b errors. I
also need to learn how to write unit tests).
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1007#comment:24>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list