pkgsrc-WIP-review archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Please review wip/iodine



Moritz Wilhelmy <ml+pkgsrc%wzff.de@localhost> writes:

> Well, since the administrator would have to edit the parameters[1]
> anyway, and iodine is something I - and I suppose most users - would
> start on demand (e.g. while traveling), I decided not to create an rc.d
> script for neither iodined nor iodine.

I think an rc.d should be provided.   While it may make sense to start
it manually, that's what '/etc/rc.d/iodine onestart' is for; half the
point of rc.d scripts is so the user doesn't have to understand how to
start and stop a program.

> Another question would be if the MESSAGE is really any useful or
> necessary. Is it possible to expand ${VARBASE} while printing the
> MESSAGE?

I would say that creating the chroot dir and users are sufficiently
normal that MESSAGE is unwarranted.

> [1] In order to use iodine, you need to create an NS record for a domain
>     and supply it as a parameter to iodine. Also, you may want to set an
>     environment variable for IODINE_PASSWORD or IODINED_PASSWORD,
>     depending on whether your machine is the client or server.
>     Otherwise, it prompts for the password, which may be annoying,
>     especially in non-interactive scenarios, and it would also affect
>       an rc-script. There's also a commandline switch available to set the
>       password, but since it is by default visible to all users with a
>     login on the machine this way (via ps), I'd advise against using it.

It sounds like iodine needs a config file to get this from, but that's
an upstream bug.

Attachment: pgpfxYvJtEJpK.pgp
Description: PGP signature

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
pkgsrc-wip-review mailing list
pkgsrc-wip-review%lists.sourceforge.net@localhost
https://lists.sourceforge.net/lists/listinfo/pkgsrc-wip-review


Home | Main Index | Thread Index | Old Index