[tahoe-dev] Dusting off lafs-rpg.

Callme Whatiwant nejucomo at gmail.com
Sun Oct 13 21:09:38 UTC 2013


Hi there,

I just realized issues and pull requests related to lafs-rpg have been
filtered away into an old dusty chest locked in my metaphorical attic.
 So, I just made a pass on the open issues, all of which are about 16
months old.

Here are the remaining open issues:

https://bitbucket.org/nejucomo/lafs-rpg/issues?status=new&status=open

If anyone wants to chip in, almost all of those are quick projects.
Some of them, such as CentOS/ubuntu improvements can probably be done
more efficiently by people using those platforms.

I'd also like to fix the install.sh to not silently fail and to
anticipate more platforms.


Also, there's a pull request from Patrick MacDonald for nailing down
TLS cipher suites:

https://bitbucket.org/nejucomo/lafs-rpg/pull-request/1/added-support-for-strong-ssl-ciphers-with/diff

Thanks Patrick!  Before I accepted this, I was hoping people with more
knowledge of recent TLS vulnerabilities and/or forward secrecy could
take a glance at the cipher list and comment on if it's still "Today's
Best TLS config".


I suspect people who use lafs-rpg use it once to generate a config
file, and there-after they simply edit their config and stop relying
on lafs-rpg.  If anyone using a read-only nginx config took some time
to notice if any changes they've made are generally useful, I'd
appreciate pull requests or issues.

Also, I haven't personally been using nginx + lafs for a while,
although I plan on doing so in the future.  If anyone notices changes
in more recent versions of either nginx or tahoe-lafs that warrant
updates, let me know.


Regards,
Nathan / nejucomo


More information about the tahoe-dev mailing list