Skip to content

Latest commit

 

History

History
153 lines (98 loc) · 4.08 KB

TODO.org

File metadata and controls

153 lines (98 loc) · 4.08 KB

Domotica / dashboards

control and interaction via web

node-red

arduino

ESP 8266

raspberry pi

http://nodered.org/docs/hardware/raspberrypi

ifttt module

Facebook/Twitter

MySQL

telegram module

visualisation

others

https://github.com/Freeboard/freeboard

http://connectsdk.com/discover/

http://jpmens.net/2014/01/14/a-story-of-home-automation/

Wanted

implementations wishes for new daemons and modules

Modules

proper tor module

performance monitoring (netdata)

https://github.com/firehol/netdata

Listeners

mosquitto (MQTT)

websockets (libwebsockets + mosquitto)

liblo (OSC)

gource (realtime)

Web frontend

Kore.io (HTTP server)

HTML templating

(LATER) daemon modules

e2guardian

polipo (no cache)

i2p (java)

i2p (c++)

ipfs

transmission (web)

mopidy (web / music)

unbound (dnssec)

dnscrypt-proxy (new, include source)

oops 1.5.24 (website down, consider maint.)

nsd (advanced dns server + dnssec))

credns (external zone verifier)

conf export and routing description

network object discovery

oui sanitized list: http://linuxnet.ca/ieee/oui/

arp-scan (most used, packaged): http://www.nta-monitor.com/wiki/index.php/Arp-scan_User_Guide

netdiscovery (passive listening): http://nixgeneration.com/~jaime/netdiscover/releases/

domain filtering and categorization

on github: dyne/domain-list

make list importers based on redis, reachable from multiple programs

import this list for public tld and domain lists https://publicsuffix.org/list/public_suffix_list.dat

make a dnscrypt-proxy plugin to filter domains

use lists in the dnscap plugin for visualizations

top500 domains: https://moz.com/top500 some categories: http://traffikd.com/social-media-websites/

blacklists: http://www.shallalist.de https://isc.sans.edu/suspicious_domains.html http://contentfilter.futuragts.com/wiki/doku.php?id=downloadable_blacklists http://www.urlblacklist.com/?sec=download

domain, url and ip blacklists https://ransomwaretracker.abuse.ch/blocklist/

domain filtering hosts file: http://someonewhocares.org/hosts/zero/hosts

authentication

as every node will store its own public configurations in the k/v store, other nodes will need to autenticate if the information is really inserted by that node. this can be done with asymmetrical key encryption and kept short and fast using a small ECC algo. http://kmackay.ca/micro-ecc/ micro-ECC seems the most portable option

To encrypt streamed data and to make it secret, cr3 is interesting https://github.com/stef/cr3

old notes (transparent proxy related)

Scalable tor processes: http://www.mightycomputers.com/2012/02/04/how-to-create-an-advanced-proxy-server-using-tor-privoxy-and-squid/ https://www.torservers.net/wiki/setup/server#multiple_tor_processes

running multiple tor and privoxy on the same machine, use cache-peer round-robin in squid:

cache_peer localhost parent 8118 0 round-robin no-query cache_peer localhost2 parent 8129 0 round-robin no-query cache_peer localhost3 parent 8230 0 round-robin no-query cache_peer localhost4 parent 8321 0 round-robin no-query cache_peer localhost5 parent 8421 0 round-robin no-query cache_peer localhost6 parent 8522 0 round-robin no-query cache_peer localhost7 parent 8623 0 round-robin no-query cache_peer localhost8 parent 8724 0 round-robin no-query

HTTPS everywhere: https://github.com/mikecardwell/perl-HTTPSEverywhere rules: git://git.torproject.org/https-everywhere.git in: src/chrome/content/rules

CHROOT binary distribution (for x86 32bit? works everywhere then??)

Log rotation or so (log only on debug?)

UPNP port forwarding using miniupnpc (upnpc) to allow connections via ssh to the dowse box

Watchdog to restart processess if they crash (a la restartd)

DDOS protection (when used as DMZ)