Closed
Bug 603506
Opened 14 years ago
Closed 13 years ago
pipeline host blacklist
Categories
(Core :: Networking: HTTP, enhancement)
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: mcmanus, Assigned: mcmanus)
References
Details
Attachments
(1 file, 4 obsolete files)
(deleted),
patch
|
mayhemer
:
feedback-
|
Details | Diff | Splinter Review |
in addition to the static blacklist of servers, the dynamic blacklisting based on the pipelining feedback module, and the pipeline pretest - we can also add a downloadable list of known-broken-with-pipelining host names.
opera does something very similar.
it makes sense that this list is retrieved as a side effect of a pre-test (603505)
Assignee | ||
Comment 1•14 years ago
|
||
as mentioned in the summary, the lists of hosts is piggybacked onto the pipeline-sanity check (it comes back as the first response body).
how often to update that list is an open question, but one I hope to discuss in 603505.
Attachment #485102 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 2•14 years ago
|
||
minor update for an interface that should have taken nscstring instead of nscautostring
Attachment #485102 -
Attachment is obsolete: true
Attachment #487945 -
Flags: review?(honzab.moz)
Attachment #485102 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 3•14 years ago
|
||
update bitrot, confrom better to style guide, updates based on experience (i.e. bugs and tweaks), etc..
Attachment #487945 -
Attachment is obsolete: true
Attachment #495143 -
Flags: review?(honzab.moz)
Attachment #487945 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 4•14 years ago
|
||
Attachment #495143 -
Attachment is obsolete: true
Attachment #513673 -
Flags: review?(honzab.moz)
Attachment #495143 -
Flags: review?(honzab.moz)
Updated•14 years ago
|
Blocks: pipelining-review
Assignee | ||
Comment 5•13 years ago
|
||
larch bitrot
Attachment #513673 -
Attachment is obsolete: true
Attachment #542084 -
Flags: review?(honzab.moz)
Attachment #513673 -
Flags: review?(honzab.moz)
Comment 6•13 years ago
|
||
As I mentioned earlier in an email thread, we might consider basing this on a web service, something similar to update check or safe browsing updates, but this mostly depends on estimation how long the list might be. If significantly long, then using pretest to fetch it will probably not be the most optimal way, it could get blocked and influenced with a larger response.
LevelDB is a perfect candidate to work with here to persist the list. SQLite is overkill.
This needs to think a bit:
- on what data we base the black list? how do we collect it? just on reported bugs?
- should we allow running Firefox instances around the globe report us the list of hosts that actively fail to pipeline with some other data like topology etc? (probably a privacy issue..)
- how long the list we believe might be? the publishing protocol should be designed based on that
- how often are we going to update it?
- could this be based on bloom filter, transferred compressed on the wire?
Comment 7•13 years ago
|
||
Comment on attachment 542084 [details] [diff] [review]
hostname blacklist 5
Dropping the review flag. Feedback to this attachment in comment 6.
Attachment #542084 -
Flags: review?(honzab.moz) → feedback-
Assignee | ||
Comment 8•13 years ago
|
||
I'm going to mark this as wontfix until we have a demonstrated need for it.
The only model I have for it is opera which has a very short list that appears frankly out of date to me. There isn't a lot of value there as opposed to dynamic problem detection.
I also have concerns about privacy and adding dependencies to a production level services implementation.
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•