Received: with ECARTIS (v1.0.0; list gopher); Sun, 14 Mar 2004 22:36:59 -0600 (CST) Return-Path: X-Original-To: gopher@complete.org Delivered-To: gopher@complete.org Received: from localhost (localhost [127.0.0.1]) by glockenspiel.complete.org (Postfix) with ESMTP id 622537E for ; Sun, 14 Mar 2004 22:36:54 -0600 (CST) Received: from glockenspiel.complete.org ([127.0.0.1]) by localhost (glockenspiel [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 22516-02 for ; Sun, 14 Mar 2004 22:36:48 -0600 (CST) Received: from floodgap.com (netblock-66-159-214-137.dslextreme.com [66.159.214.137]) by glockenspiel.complete.org (Postfix) with ESMTP id 099E67C for ; Sun, 14 Mar 2004 22:36:47 -0600 (CST) Received: (from spectre@localhost) by floodgap.com (8.9.1/2003.05.26) id UAA13420 for gopher@complete.org; Sun, 14 Mar 2004 20:50:34 -0800 From: Cameron Kaiser Message-Id: <200403150450.UAA13420@floodgap.com> Subject: [gopher] "groxies" To: gopher@complete.org Date: Sun, 14 Mar 2004 20:50:34 -0800 (PST) X-Mailer: ELM [version 2.4ME+ PL39 (25)] MIME-Version: 1.0 Content-type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit X-Virus-Scanned: by amavisd-new-20030616-p7 (Debian) at complete.org X-archive-position: 894 X-ecartis-version: Ecartis v1.0.0 Sender: gopher-bounce@complete.org Errors-to: gopher-bounce@complete.org X-original-sender: spectre@floodgap.com Precedence: bulk Reply-to: gopher@complete.org List-help: List-unsubscribe: List-software: Ecartis version 1.0.0 List-Id: Gopher X-List-ID: Gopher List-subscribe: List-owner: List-post: List-archive: X-list: gopher Due to some research on a project I'm working on (sssh! all will be revealed very soon), I'm looking at methods of proxying Gopher through today's firewalls. Myself, I use SOCKS on my own internal firewall (I get arguably higher throughput than NAT with it), but I like the simplicity of HTTP proxies and how very little work has to be done for the client. The scheme I'm proposing for a "groxy" is simple. Instead of request\r\n a groxy accepts host\tport\trequest\r\n and does The Right Thing with it. This won't break Gopher+, either, because the idea scales right along: host\tport\g+request\t+\r\n Even if a data flag and block follow, you should be able to see it won't interfere with that either. Any concerns over an implementation like this for a prototypical "groxy"? One other idea I had was allowing gopher to tunnel through HTTP as a method of getting around ignorant site administrators that block port 70. A HTTP groxy could accept GET requests to it in the same form an HTTP *P*roxy would, but would execute a gopher request on the other side and return the document with the right MIME type or application/gopher-menu as appropriate. Comments? -- ---------------------------------- personal: http://www.armory.com/~spectre/ -- Cameron Kaiser, Floodgap Systems Ltd * So. Calif., USA * ckaiser@floodgap.com -- People who buy computers from TV commercials *deserve* PCs. ----------------