#1007 new enhancement

HTTP proxy support for node to node communication — at Initial Version

Reported by: duck Owned by:
Priority: minor Milestone: soon
Component: code-network Version: 1.6.1
Keywords: privacy anonymity firewall foolscap anti-censorship i2p Cc: warner, killyourtv@…, skydrome@…
Launchpad Bug:

Description

To use Tahoe-LAFS over the I2P anonymous network I have added HTTP proxy support to the Foolscap library. Most of the work is in Foolscap, but within Tahoe it must also be possible to enable this functionality and specify which HTTP proxy to use. All I2P nodes have this HTTP proxy enabled by default on 127.0.0.1:4444.

For the anonymous network use case, every connection to storage nodes and introducers will have to be through the anonymous network; it is not acceptable to mix anonymous and non-anonymous connections. The intention is to provide anonymity to both clients and node operators.

A reference implementation is available on http://duck.i2p.to/tahoe-lafs/ , as of today (2010-03-27) a test grid is operating inside I2P with 21 nodes, of which 6 storage nodes and 1 introducer.

Example of configuration in tahoe.cfg:

    [node]
    ...
    http_proxy = 127.0.0.1:4444

Snippit showing how this is used in node.py:

    http_proxy = self.get_config("node", "http_proxy", "")
    if http_proxy:
        self.tub.setOption("httpProxy", http_proxy)

Change History (1)

Changed at 2010-03-27T21:06:05Z by duck

HTTP Proxy support to Foolscap

Note: See TracTickets for help on using tickets.