| 1 | = [wiki:Summit 2nd Summit] Day 2 = |
| 2 | |
| 3 | 09-Nov-2011, Mozilla SF. |
| 4 | |
| 5 | == Attendees == |
| 6 | * Zack Weinberg |
| 7 | * Zooko |
| 8 | * David-Sarah |
| 9 | * Brian |
| 10 | * Shawn |
| 11 | * Mark Seaborn |
| 12 | |
| 13 | == Ideas == |
| 14 | - Shawn: would be nice to have a more traditional username/password web frontend |
| 15 | - I (warner)'m imagining an IService, listening for HTTP on a different port |
| 16 | than the main WEBAPI port, with a public URL. You submit |
| 17 | username+password, get a cookie, present a filename. The gateway |
| 18 | translates that into a filecap. |
| 19 | - maybe store one rootcap per username. use bcrypt/scrypt to defer |
| 20 | exposure until user submits password. |
| 21 | - adding ACLs: either put a table in the frontend (username->file |
| 22 | list), or put ACL data in dirnode edge metadata and have frontend |
| 23 | compare it against a username |
| 24 | - sharing to public: tell frontend a filename/dirname and ask to make |
| 25 | it public, it returns a tinyurl. Just like a tinyurl except it's a |
| 26 | proxy instead of a redirect. |
| 27 | - sharing to an individual: maybe have an encryption pubkey for each |
| 28 | account, Alice tells frontend "share my ~/foo with user=Bob", |
| 29 | frontend encrypts a note to itself with Kbob, later when Bob logs in, |
| 30 | his password bcrypt-unlocks the decryption key Kbobpriv, decrypts the |
| 31 | note, gets the dircap, adds to a table for Bob, lets him enumerate a |
| 32 | list of inbound shared directories |
| 33 | - zwol describing a Tor project, making Tor traffic look like other |
| 34 | traffic: WoW, other web browsing. "Stegatorus"? |
| 35 | - zwol thinking about censorship-resistance, content-centric networking |
| 36 | |
| 37 | == Control Panel == |
| 38 | - Brian explained requirements for a tahoe web-control-panel: |
| 39 | - examine/control Agent things like periodic backup jobs (local dir, |
| 40 | dircap, schedule, status, progress), lease-renewal/repair jobs |
| 41 | (dircap, schedule, status, progress) |
| 42 | - not using browser ambient authority, accessed through NODEDIR (iff |
| 43 | you can read/write to NODEDIR/private, you should be able to get to |
| 44 | the Web Control Panel), |
| 45 | - not scoped to a particular filecap/dircap |
| 46 | - yes scoped to "client authority" (i.e. an "Account", q.v. Accounting, |
| 47 | for general uploads and maybe repair), or local-disk-authority |
| 48 | (backup jobs), or server admin (for the server side of Accounting) |
| 49 | - ok to have no-JS and yes-JS options, ok if the no-JS option is less |
| 50 | pleasant |
| 51 | - David-Sarah, Zack, Shawn designed a scheme |
| 52 | - writes a "control.html" into NODEDIR/private/ |
| 53 | - "tahoe control" launches browser with {{{file://.../control.html}}} |
| 54 | - yes-JS version: |
| 55 | - it contains one big {{{<iframe src="http://WUI/control#SECRET">}}} |
| 56 | - that page contains JS which pulls the secret out of the fragment, |
| 57 | then does lots of XHR with the secret to present the control panel |
| 58 | - no-JS version: |
| 59 | - it contains a form with a big "Start" button and a secret in a |
| 60 | hidden form-post argument |
| 61 | - that returns a page with lots of forms, secrets in hidden |
| 62 | post-args. All links are POSTs. "back" won't be pleasant (requires |
| 63 | a 're-submit form?' confirmation each time). |
| 64 | - benefits: keep secret out of address bar, out of Referrer header |
| 65 | - other useful techniques: |
| 66 | - to limit the lifetime of a powerful secret, 'tahoe control' can write |
| 67 | a new secret into NODEDIR just before launching the browser, and the |
| 68 | node can erase or change the secret just after accepting the |
| 69 | resulting browser hit. |
| 70 | - splitting the webapi into multiple origins is becoming more |
| 71 | important: probably starting with one port for (control-panel, |
| 72 | welcome, node-status, WUI-dirnodes, download-only WAPI), and a second |
| 73 | one for (WUI-documents) that could be executable. |
| 74 | |
| 75 | == Accounting Review == |
| 76 | - Brian presented his Accounting branch |
| 77 | (https://github.com/warner/tahoe-lafs/tree/accounting) , only looking |
| 78 | at the delta between the '466-ed25519' branch and the 'accounting' |
| 79 | branch (it builds upon the #466 work) |
| 80 | - deferred discussion of leasedb crawler and race conditions, that |
| 81 | requires more serious design work. David-Sarah and Brian will huddle on |
| 82 | it, probably online later |
| 83 | - approach seemed good, code is still incomplete |
| 84 | - needs: more tests, usable control panel, refinement of "account |
| 85 | message" concept |
| 86 | - need to carefully plan the merge with LAE's s3-backend: they overlap a |
| 87 | lot. Removing leases from shares helps a bunch. s3-backend introduces |
| 88 | async share-crawlers, accounting removes one big crawler but adds a new |
| 89 | small one, which might need to be async-ified if that still seems like |
| 90 | a good idea. |
| 91 | - consensus was that #466 should definitely land first. But then whether |
| 92 | accounting should land before s3-backend, or other way around, was |
| 93 | unclear. accounting needs more development work before it's ready for |
| 94 | landing, s3-backend might be closer. But some co-evolution and |
| 95 | anticipatory refactoring should make things easier for everybody. |
| 96 | - brief discussion about branches in Git vs Darcs, specifically for |
| 97 | working on projects like this. Brian anticipates pain and suffering |
| 98 | trying to test merges of s3-backend (managed in a darcs branch) with |
| 99 | his accounting work (managed in git branches). David-Sarah suggested |
| 100 | applying the git/darcs bridge on a branch too, brian skeptical. |