1. Board Statements
2. General Coop Goals
Unstructured musing on when/what I think the coop ought to be.
- January 2013: New website online, navajos and bog both up with new members using them
February 2013->December 2013: Big push for new members. New website should make us seem more alive, we've finally fixed about 3/4 of the "temporary" hacks from when we first moved to Peer1, etc. mire is gone (less work: we just have to get people off of it), but also work toward getting rid of deleuze. Web services first (low hanging fruit), even if it means punting on fully converting to domtool managed sites (at least packaged and documented). AFAICT other than those we're just left with:
- March 2013: Catch the sales on the last generation Dell 2U/2-socket machines and create a clean counterpart to fritz.
- Minimal KVM host setup for base OS. We might run the KDC and OpenAFS on the bare metal, not entirely certain.
- Create new wheezy based VMs, duplicating (and turning into master) services hosted in VMs on fritz
March 2013->July 2013: Transition remaining services off of deleuze onto KernelVirtualMachines on new kvm host
- April 2013: Election and hopefully 120 members. Mire has been turned off for at least a month at this point.
- Winter 2013: Assuming 150+ members, perhaps more bandwidth is in order. Deleuze should be safe to turn off by now at the latest.
- Spring 2014: Ponies for everyone.
- IPv6, mediagoblin, diaspora, gitorious, xmpp works again (and ability to use vanity domains), ...
<clinton at unknownlamer dot org> (Email)
- unknownlamer (AOL Instant Messenger)
<clinton at hcoop dot net> (Jabber)
unknown_lamer on freenode (IRC) in #hcoop
- +1 443 538 8058 (Phone, SMS preffered)
5. Admin Stuff
5.1. Terrible Things
Since we are having a roll call soon, we need to deal with these.
- phpVersion needs to change
Change DefaultAlias to false in the vain hope it makes gmail like us more. Side effect is less spam for everyone.
- Really need to support $user+$local addresses for this to work well
- Ideally we could drop spam and whatever, but that's a lot of work and possibly not the right thing
x Change SPF for hcoop.net to mandate that all mail come from mail.hcoop.net.
x And something like addHcoopSPF for members to set the same record if they want to forward through us
- "-all" spf for mire/navajos/fritz/hopper.hcoop.net ? Possibly no, need to figure out rewriting to make sure no mail gets out with the hostname
- ? Don't generate backscatter when spammers send mail to users forwarding offsite
- Really not sure how to do this and not violate various RFCs
- Looks basically impossible for gmail, best strategy is to mitigate spam sent to them in the first place
- It appears we actually bounce to the local postmaster so we might be OK
- x Inform members what they can do...
- Add receipt address to send as, exim filter rule to nuke spam, ...
- Can we add SPAM to the subject of all messages going to gmail that are marked as such by SA?
- x Inform members what they can do...
x Change SPF records for hcoop.net and define addDefaultSPF (mx -all, making it effectively universal)
x Recommend DefaultAlias = false
- x Point members at google forwarding docs
- x Directly suggest "send as..." change
- Don't forward spam if possible (solicit an exim rule from a member...)
- Fix exim TLS certificate (deleuze instead of mail)
DONE Update docs with warnings for gmail users about steps they need to take to avoid having all hcoop mail rejected:
MemberManual/Email (new section, canonical location that everywhere else references)
5.2. domtool plans
- Feature backlog
- SSL improvements (SNI, intermediate certificates, ...)
- Networked domtool-tail
Seems like the most straightforward of the fancy CGI to persistent server replacement to gets working, and has wide support. MoinMoin can use it... and it's a lot less tricky for members to get working than proxied servers on another host.
- Ideally, support wsgi and whatnot later, assuming they can do suexec
default CSymbol = Value for binding default environment variable settings
Expands the scope of extensions that can be written in pure DomTool, slight flexibility gains
Improve fwtool as needs become clearer
fwtool regen without node to regen all nodes, fwtool verify and possibly something akin to visudo
- Programmitic interface to adding/removing/etc rules?
- At least need a way to kill rules when destroying the user, ideally just disabling them? (existing code ignores users who do not exist, so it sort of works to ignore it, but cleanliness of the rules file will become a problem).
- "Proper" parser. Read rules into typed structure using the magic of SML, and work on that form (more natural, type safe, etc.)
- groups or similar for common ports
- We need a way to grant users who just want general net access a reasonably unrestrictive firewall, without needlessly opening things for members who don't use our shell services extensively. Since we can't restrict socket permissions generally, defining groups that provide common firewall rules seems like an ok solution.