control and interaction via web
http://nodered.org/docs/hardware/raspberrypi
https://github.com/Freeboard/freeboard
http://connectsdk.com/discover/
http://jpmens.net/2014/01/14/a-story-of-home-automation/
implementations wishes for new daemons and modules
https://github.com/firehol/netdata
- http://netjson.org/ use to export current configuration standard shaping up
- graph app: https://github.com/interop-dev/netjsongraph.js
notice also netsukuku
oui sanitized list: http://linuxnet.ca/ieee/oui/
arp-scan (most used, packaged): http://www.nta-monitor.com/wiki/index.php/Arp-scan_User_Guide
netdiscovery (passive listening): http://nixgeneration.com/~jaime/netdiscover/releases/
on github: dyne/domain-list
make list importers based on redis, reachable from multiple programs
import this list for public tld and domain lists https://publicsuffix.org/list/public_suffix_list.dat
make a dnscrypt-proxy plugin to filter domains
use lists in the dnscap plugin for visualizations
top500 domains: https://moz.com/top500 some categories: http://traffikd.com/social-media-websites/
blacklists: http://www.shallalist.de https://isc.sans.edu/suspicious_domains.html http://contentfilter.futuragts.com/wiki/doku.php?id=downloadable_blacklists http://www.urlblacklist.com/?sec=download
domain, url and ip blacklists https://ransomwaretracker.abuse.ch/blocklist/
domain filtering hosts file: http://someonewhocares.org/hosts/zero/hosts
as every node will store its own public configurations in the k/v store, other nodes will need to autenticate if the information is really inserted by that node. this can be done with asymmetrical key encryption and kept short and fast using a small ECC algo. http://kmackay.ca/micro-ecc/ micro-ECC seems the most portable option
To encrypt streamed data and to make it secret, cr3 is interesting https://github.com/stef/cr3
Scalable tor processes: http://www.mightycomputers.com/2012/02/04/how-to-create-an-advanced-proxy-server-using-tor-privoxy-and-squid/ https://www.torservers.net/wiki/setup/server#multiple_tor_processes
running multiple tor and privoxy on the same machine, use cache-peer round-robin in squid:
cache_peer localhost parent 8118 0 round-robin no-query cache_peer localhost2 parent 8129 0 round-robin no-query cache_peer localhost3 parent 8230 0 round-robin no-query cache_peer localhost4 parent 8321 0 round-robin no-query cache_peer localhost5 parent 8421 0 round-robin no-query cache_peer localhost6 parent 8522 0 round-robin no-query cache_peer localhost7 parent 8623 0 round-robin no-query cache_peer localhost8 parent 8724 0 round-robin no-query
HTTPS everywhere: https://github.com/mikecardwell/perl-HTTPSEverywhere rules: git://git.torproject.org/https-everywhere.git in: src/chrome/content/rules
CHROOT binary distribution (for x86 32bit? works everywhere then??)
Log rotation or so (log only on debug?)
UPNP port forwarding using miniupnpc (upnpc) to allow connections via ssh to the dowse box
Watchdog to restart processess if they crash (a la restartd)
DDOS protection (when used as DMZ)