Skip to content

Commit

Permalink
Update todo
Browse files Browse the repository at this point in the history
  • Loading branch information
anderspitman committed Nov 25, 2020
1 parent 58e38d7 commit 7f45316
Showing 1 changed file with 36 additions and 26 deletions.
62 changes: 36 additions & 26 deletions todo.md
Original file line number Diff line number Diff line change
@@ -1,47 +1,31 @@
# 31 Oct 2020 Launch List

- [ ] Better docker setup
- [ ] CLI help
- [ ] Client restart on panic
- [ ] Don't require username for client
- [ ] Requires OpenSSH 7.7+ for PermitListen option
- [ ] Improve SSH key download UI.
- [ ] Improve token list UI.
- [ ] Invalid database is wiping out tunnels
- [x] Head can be rendered before h.headHtml is ever set, ie if login page is visited before any other page
- [x] Responses to unauthorized requests are leaking information about the current tunnels through the generated CSS.
- [x] I think it's possible to create tokens for arbitrary user, even if you're not that user.
- [x] Anyone can delete tunnels
- [x] Anyone can delete tokens
- [x] QR codes for admin are broken
- [x] General security review.
- [x] Demo instance
- [x] Demo auto email signup
- [x] Delete tokens when user is deleted
- [x] Finish website
- [x] Publish releases
- [x] Demo video
- [x] Post on /r/selfhosted


# Eventually

* Fix /logo.png in rice box
* If client crashes, it sometimes can't restart tunnels. I think this is
because the server still has the sshd processes on the other side running.
`killall sshd` works but also boots you out of your live ssh session.
* Implement custom server bind addresses and ports
* Useful for running servers on same machine as boringproxy server, like a
normal reverse proxy.
* On unknown page, redirect to referer if possible
* Apparently multiple tunnels can bind to a single server port. Looks like
maybe only the first one is used to actually tunnel to the clients?
* CSS-only delete buttons don't show up as targets for links like Vimium
* Wrapping labels in buttons and adding a bit of CSS seems to do the trick.
* Eh buttons aren't actually doing anything apparently (when hit by
keyboard).
* See if WebSockets tunnel correctly
* Implement WebSockets tunneling
* Getting new certs isn't working behind Cloudflare. Might be able to fix by
using the HTTP challenge and allowing HTTP on the Cloudflare side.
* We might need some sort of a transaction or atomicity system on the db to
prevent things like 2 people setting the user at the same time and one losing
their changes.
* Endpoint for getting user ID from token
* CLI help
* Client restart on panic
* Don't require username for client
* Invalid database is wiping out tunnels


# Maybe
Expand All @@ -50,3 +34,29 @@
to manually combine them for custom keys.
* Send public key back to clients, so they can automatically try to find the
matching private key.

# 31 Oct 2020 Launch List

- [ ] Better docker setup
- [ ] CLI help
- [ ] Client restart on panic
- [ ] Don't require username for client
- [ ] Requires OpenSSH 7.7+ for PermitListen option
- [ ] Improve SSH key download UI.
- [ ] Improve token list UI.
- [ ] Invalid database is wiping out tunnels
- [x] Head can be rendered before h.headHtml is ever set, ie if login page is visited before any other page
- [x] Responses to unauthorized requests are leaking information about the current tunnels through the generated CSS.
- [x] I think it's possible to create tokens for arbitrary user, even if you're not that user.
- [x] Anyone can delete tunnels
- [x] Anyone can delete tokens
- [x] QR codes for admin are broken
- [x] General security review.
- [x] Demo instance
- [x] Demo auto email signup
- [x] Delete tokens when user is deleted
- [x] Finish website
- [x] Publish releases
- [x] Demo video
- [x] Post on /r/selfhosted

0 comments on commit 7f45316

Please sign in to comment.