diff --git a/nixos/modules/issuer.nix b/nixos/modules/issuer.nix
new file mode 100644
index 0000000000000000000000000000000000000000..7cb7cde17b180dceb9c0f80d81bbf9325fbe56f8
--- /dev/null
+++ b/nixos/modules/issuer.nix
@@ -0,0 +1,64 @@
+# A NixOS module which can run a Ristretto-based issuer for PrivacyStorage
+# ZKAPs.
+{ lib, pkgs, config, ... }: let
+  pspkgs = pkgs.callPackage ./pspkgs.nix { };
+  zkapissuer = pspkgs.callPackage ../pkgs/zkapissuer.nix { };
+  cfg = config.services.private-storage-issuer;
+in {
+  options = {
+    services.private-storage-issuer.enable = lib.mkEnableOption "PrivateStorage ZKAP Issuer Service";
+    services.private-storage-issuer.package = lib.mkOption {
+      default = zkapissuer.components.exes."PaymentServer-exe";
+      type = lib.types.package;
+      example = lib.literalExample "pkgs.zkapissuer.components.exes.\"PaymentServer-exe\"";
+      description = ''
+        The package to use for the ZKAP issuer.
+      '';
+    };
+    services.private-storage-issuer.issuer = lib.mkOption {
+      default = "Ristretto";
+      type = lib.types.str;
+      example = lib.literalExample "Trivial";
+      description = ''
+        The issuer algorithm to use.  Either Trivial for a fake no-crypto
+        algorithm or Ristretto for Ristretto-flavored PrivacyPass.
+      '';
+    };
+    services.private-storage-issuer.ristrettoSigningKey = lib.mkOption {
+      default = null;
+      type = lib.types.str;
+      description = ''
+        The Ristretto signing key to use.  Required if the issuer is
+        ``Ristretto``.
+      '';
+    };
+  };
+
+  config = lib.mkIf cfg.enable {
+    # Add a systemd service to run PaymentServer.
+    systemd.services.zkapissuer = {
+      enable = true;
+      description = "ZKAP Issuer";
+      wantedBy = [ "multi-user.target" ];
+      after = [ "network.target" ];
+
+      serviceConfig = {
+        ExecStart =
+          let
+            # Compute the right command line arguments to pass to it.  The
+            # signing key is only supplied when using the Ristretto issuer.
+            args =
+              if cfg.issuer == "Trivial"
+                then "--issuer Trivial"
+                else "--issuer Ristretto --signing-key ${cfg.ristrettoSigningKey}";
+          in
+            "${cfg.package}/bin/PaymentServer-exe ${args}";
+        Type = "simple";
+        # It really shouldn't ever exit on its own!  If it does, it's a bug
+        # we'll have to fix.  Restart it and hope it doesn't happen too much
+        # before we can fix whatever the issue is.
+        Restart = "always";
+      };
+    };
+  };
+}
diff --git a/nixos/modules/overlays.nix b/nixos/modules/overlays.nix
index ad41b406e3f7629f1e0765a9230a17c85fdba577..779384ab6914ea4858970f7190780a7543702913 100644
--- a/nixos/modules/overlays.nix
+++ b/nixos/modules/overlays.nix
@@ -1,11 +1,39 @@
+let
+  # Define a Python packageOverride that puts our version of Twisted into
+  # python27Packages.
+  pythonTwistedOverride = python-self: python-super: {
+    # Get our Twisted derivation.  Pass in the old one so it can have pieces
+    # overridden.  It needs to be passed in explicitly because callPackage is
+    # specially crafted to always pull attributes from the fixed-point.  That
+    # is, `python-self.callPackage` and `python-super.callPackage` will *both*
+    # try to pass `python-self.twisted`.  So we take it upon ourselves to pass
+    # the "correct" Twisted (it is correct because we call its override method
+    # and that never converges if it is the fixed point Twisted).
+    twisted = python-self.callPackage ../pkgs/twisted.nix {
+      inherit (python-super) twisted;
+    };
+  };
+in
 self: super: {
-  privatestorage = super.python27.buildEnv.override
+  # Use self.python27 to get the fixed point of all packages (that is, to
+  # respect all of the overrides).  This is important since we want the
+  # overridden Twisted as a dependency of this env, not the original one.
+  #
+  # This might seem to violate the advice to use super for "library
+  # functionality" but python27.buildEnv should be considered a derivation
+  # instead because it implies a whole mess of derivations (all of the Python
+  # modules available).
+  privatestorage = self.python27.buildEnv.override
   { extraLibs =
-    [ super.python27Packages.tahoe-lafs
-      super.python27Packages.zkapauthorizer
+    [ self.python27Packages.tahoe-lafs
+      self.python27Packages.zkapauthorizer
     ];
-    # Twisted's dropin.cache always collides between different
-    # plugin-providing packages.
-    ignoreCollisions = true;
   };
+
+  # Using super.python27 here causes us to define a python27 that overrides
+  # the value from the previously overlay, not from the fixed point.  This is
+  # important because this override never converges.
+  python27 = super.python27.override (old: {
+    packageOverrides = super.lib.composeExtensions old.packageOverrides pythonTwistedOverride;
+  });
 }
diff --git a/nixos/modules/private-storage.nix b/nixos/modules/private-storage.nix
index d2db7dd661a8a923c04e245e45cad30305ebfe68..58f4ba36bedac2b7b2de626132b831d8cdbdc142 100644
--- a/nixos/modules/private-storage.nix
+++ b/nixos/modules/private-storage.nix
@@ -2,16 +2,7 @@
 # preferred configuration for the Private Storage grid.
 { pkgs, lib, config, ... }:
 let
-  # Derive a brand new version of pkgs which has our overlay applied.  The
-  # overlay defines a new version of Tahoe-LAFS and some of its dependencies
-  # and maybe other useful Private Storage customizations.
-  pspkgs = import pkgs.path
-  { overlays = [
-      # needs fetchFromGitHub to check out zkapauthorizer
-      (pkgs.callPackage ./zkap-overlay.nix { })
-      (import ./overlays.nix)
-    ];
-  };
+  pspkgs = pkgs.callPackage ./pspkgs.nix { };
   # Grab the configuration for this module for convenient access below.
   cfg = config.services.private-storage;
 in
diff --git a/nixos/modules/pspkgs.nix b/nixos/modules/pspkgs.nix
new file mode 100644
index 0000000000000000000000000000000000000000..851f4e71783c3c1dcc9fc596b37722866fef7331
--- /dev/null
+++ b/nixos/modules/pspkgs.nix
@@ -0,0 +1,10 @@
+# Derive a brand new version of pkgs which has our overlays applied.  This
+# includes the ZKAPAuthorizer overlay which defines some Python overrides as
+# well as our own which defines the `privatestorage` derivation.
+{ pkgs }:
+import pkgs.path {
+  overlays = [
+    (import ./zkap-overlay.nix)
+    (import ./overlays.nix)
+  ];
+}
diff --git a/nixos/modules/tests/exercise-storage.py b/nixos/modules/tests/exercise-storage.py
new file mode 100755
index 0000000000000000000000000000000000000000..d56232a4919e415c3331b7c8fc105016ca260b46
--- /dev/null
+++ b/nixos/modules/tests/exercise-storage.py
@@ -0,0 +1,46 @@
+#!/usr/bin/env python3
+
+#
+# Create a new file via the web interface of a Tahoe-LAFS client node and then
+# retrieve the contents of that file.  Exit with success if the retrieved
+# contents match what was uploaded originally.
+#
+
+from sys import argv
+from os import urandom
+from subprocess import check_output
+from io import BytesIO
+
+import requests
+
+def main():
+    (clientDir,) = argv[1:]
+
+    someData = urandom(2 ** 16)
+
+    api_root = get_api_root(clientDir)
+    cap = put(api_root, someData)
+    dataReadBack = get(api_root, cap)
+
+    assert someData == dataReadBack
+
+
+def get_api_root(path):
+    with open(path + u"/node.url") as f:
+        return f.read().strip()
+
+
+def put(api_root, data):
+    response = requests.put(api_root + u"uri", BytesIO(data))
+    response.raise_for_status()
+    return response.text
+
+
+def get(api_root, cap):
+    response = requests.get(api_root + u"uri/" + cap, stream=True)
+    response.raise_for_status()
+    return response.raw.read()
+
+
+if __name__ == u'__main__':
+    main()
diff --git a/nixos/modules/tests/get-passes.py b/nixos/modules/tests/get-passes.py
new file mode 100755
index 0000000000000000000000000000000000000000..ac5cf790fd95d8ce5295879a04d4c19026bf2dba
--- /dev/null
+++ b/nixos/modules/tests/get-passes.py
@@ -0,0 +1,200 @@
+#!/usr/bin/env python3
+
+#
+# Get a paid voucher and tell the Tahoe-LAFS client node to redeem it for some
+# ZKAPs from an issuer.  Exit with success when the Tahoe-LAFS client node
+# reports that the voucher has been redeemed.
+#
+
+from sys import argv
+from requests import post, get, put
+from json import dumps
+from time import sleep
+
+def main():
+    clientAPIRoot, issuerAPIRoot = argv[1:]
+
+    # Construct a voucher that's acceptable to various parts of the system.
+    voucher = "a" * 44
+
+    zkapauthz = clientAPIRoot + "/storage-plugins/privatestorageio-zkapauthz-v1"
+
+    # Simulate a payment for a voucher.
+    post(
+        issuerAPIRoot + "/v1/stripe/webhook",
+        dumps(charge_succeeded_json(voucher)),
+        headers={"content-type": "application/json"},
+    )
+
+    # Tell the client to redeem the voucher.
+    response = put(
+        zkapauthz + "/voucher",
+        dumps({"voucher": voucher}),
+    )
+    if response.status_code // 100 != 2:
+        print("Unexpected response: {}".format(response.content))
+        response.raise_for_status()
+
+    # Poll the vouchers list for a while to see it get redeemed.
+    expected = {"version": 1, "number": voucher, "redeemed": True}
+    def find_redeemed_voucher():
+        response = get(zkapauthz + "/voucher/" + voucher)
+        response.raise_for_status()
+        actual = response.json()
+        print("Actual response: {}".format(actual))
+        return expected == actual
+
+    retry(
+        "find redeemed voucher",
+        find_redeemed_voucher,
+    )
+
+
+def retry(description, f):
+    for i in range(60):
+        print("trying to {}...".format(description))
+        if f():
+            print("{} succeeded".format(description))
+            return
+        sleep(1.0)
+    raise ValueError("failed to {} after many tries".format(description))
+
+
+def charge_succeeded_json(voucher):
+    # This structure copy/pasted from Stripe webhook web interface.
+    base_payload = {
+        "id": "evt_1FKSX2DeTd13VRuuhPaUDA2f",
+        "object": "event",
+        "api_version": "2016-07-06",
+        "created": 1568910660,
+        "data": {
+            "object": {
+                "id": "ch_1FKSX2DeTd13VRuuG9BXbqji",
+                "object": "charge",
+                "amount": 999,
+                "amount_refunded": 0,
+                "application": None,
+                "application_fee": None,
+                "application_fee_amount": None,
+                "balance_transaction": "txn_1FKSX2DeTd13VRuuqO1CJZ1e",
+                "billing_details": {
+                    "address": {
+                        "city": None,
+                        "country": None,
+                        "line1": None,
+                        "line2": None,
+                        "postal_code": None,
+                        "state": None
+                    },
+                    "email": None,
+                    "name": None,
+                    "phone": None
+                },
+                "captured": True,
+                "created": 1568910660,
+                "currency": "usd",
+                "customer": None,
+                "description": None,
+                "destination": None,
+                "dispute": None,
+                "failure_code": None,
+                "failure_message": None,
+                "fraud_details": {
+                },
+                "invoice": None,
+                "livemode": False,
+                "metadata": {
+                    "Voucher": None,
+                },
+                "on_behalf_of": None,
+                "order": None,
+                "outcome": {
+                    "network_status": "approved_by_network",
+                    "reason": None,
+                    "risk_level": "normal",
+                    "risk_score": 44,
+                    "seller_message": "Payment complete.",
+                    "type": "authorized"
+                },
+                "paid": True,
+                "payment_intent": None,
+                "payment_method": "card_1FKSX2DeTd13VRuus5VEjmjG",
+                "payment_method_details": {
+                    "card": {
+                        "brand": "visa",
+                        "checks": {
+                            "address_line1_check": None,
+                            "address_postal_code_check": None,
+                            "cvc_check": None
+                        },
+                        "country": "US",
+                        "exp_month": 9,
+                        "exp_year": 2020,
+                        "fingerprint": "HTJeRR4MXhAAkctF",
+                        "funding": "credit",
+                        "last4": "4242",
+                        "three_d_secure": None,
+                        "wallet": None
+                    },
+                    "type": "card"
+                },
+                "receipt_email": None,
+                "receipt_number": None,
+                "receipt_url": "https://pay.stripe.com/receipts/acct_198xN4DeTd13VRuu/ch_1FKSX2DeTd13VRuuG9BXbqji/rcpt_Fq8oAItSiNmcm0beiie6lUYin920E7a",
+                "refunded": False,
+                "refunds": {
+                    "object": "list",
+                    "data": [
+                    ],
+                    "has_more": False,
+                    "total_count": 0,
+                    "url": "/v1/charges/ch_1FKSX2DeTd13VRuuG9BXbqji/refunds"
+                },
+                "review": None,
+                "shipping": None,
+                "source": {
+                    "id": "card_1FKSX2DeTd13VRuus5VEjmjG",
+                    "object": "card",
+                    "address_city": None,
+                    "address_country": None,
+                    "address_line1": None,
+                    "address_line1_check": None,
+                    "address_line2": None,
+                    "address_state": None,
+                    "address_zip": None,
+                    "address_zip_check": None,
+                    "brand": "Visa",
+                    "country": "US",
+                    "customer": None,
+                    "cvc_check": None,
+                    "dynamic_last4": None,
+                    "exp_month": 9,
+                    "exp_year": 2020,
+                    "fingerprint": "HTJeRR4MXhAAkctF",
+                    "funding": "credit",
+                    "last4": "4242",
+                    "metadata": {
+                    },
+                    "name": None,
+                    "tokenization_method": None
+                },
+                "source_transfer": None,
+                "statement_descriptor": None,
+                "statement_descriptor_suffix": None,
+                "status": "succeeded",
+                "transfer_data": None,
+                "transfer_group": None
+            }
+        },
+        "livemode": False,
+        "pending_webhooks": 2,
+        "request": "req_5ozjOIAcOkvVUK",
+        "type": "charge.succeeded"
+    }
+    # Indicate the voucher the payment references.
+    base_payload["data"]["object"]["metadata"]["Voucher"] = voucher
+    return base_payload
+
+
+if __name__ == '__main__':
+    main()
diff --git a/nixos/modules/tests/private-storage.nix b/nixos/modules/tests/private-storage.nix
index 30818b3301fc46c1d7f307ef48e11e9ddcdabd27..fd1730b5eb0ef0c4e24c428e4061b69a2835fee6 100644
--- a/nixos/modules/tests/private-storage.nix
+++ b/nixos/modules/tests/private-storage.nix
@@ -1,9 +1,19 @@
 let
-  pkgs = import <nixpkgs> { };
+  pkgs = (import <nixpkgs> { });
+  pspkgs = import ../pspkgs.nix { inherit pkgs; };
+
+  # Separate helper programs so we can write as little perl inside a string
+  # inside a nix expression as possible.
+  run-introducer = ./run-introducer.py;
+  run-client = ./run-client.py;
+  get-passes = ./get-passes.py;
+  exercise-storage = ./exercise-storage.py;
+
   # Here are the preconstructed secrets which we can assign to the introducer.
   # This is a lot easier than having the introducer generate them and then
   # discovering and configuring the other nodes with them.
   pemFile = ./node.pem;
+
   tubID = "rr7y46ixsg6qmck4jkkc7hke6xe4sv5f";
   swissnum = "2k6p3wrabat5jrj7otcih4cjdema4q3m";
   introducerPort = 35151;
@@ -19,6 +29,7 @@ let
     # I thought we might need to statically asssign IPs but we can just use
     # the node names, "introducer", etc, instead.
     networking.firewall.enable = false;
+    networking.dhcpcd.enable = false;
   };
 in
 # https://nixos.org/nixos/manual/index.html#sec-nixos-tests
@@ -29,8 +40,12 @@ import <nixpkgs/nixos/tests/make-test.nix> {
     client =
       { config, pkgs, ... }:
       { environment.systemPackages = [
-          pkgs.tahoe-lafs
           pkgs.daemonize
+          # A Tahoe-LAFS configuration capable of using the right storage
+          # plugin.
+          pspkgs.privatestorage
+          # Support for the tests we'll run.
+          (pkgs.python3.withPackages (ps: [ ps.requests ]))
         ];
       } // networkConfig;
 
@@ -46,7 +61,24 @@ import <nixpkgs/nixos/tests/make-test.nix> {
         services.private-storage.enable = true;
         services.private-storage.publicIPv4 = "storage";
         services.private-storage.introducerFURL = introducerFURL;
+        services.private-storage.issuerRootURL = "http://issuer:8081/";
       } // networkConfig;
+
+    # Operate an issuer as well.
+    issuer =
+    { config, pkgs, ... }:
+    { imports =
+      [ ../issuer.nix
+      ];
+      services.private-storage-issuer = {
+        enable = true;
+        issuer = "Ristretto";
+        # Notionally, this is a secret key.  This is only the value for this
+        # system test though so I don't care if it leaks to the world at
+        # large.
+        ristrettoSigningKey = "wumQAfSsJlQKDDSaFN/PZ3EbgBit8roVgfzllfCK2gQ=";
+      };
+    } // networkConfig;
   };
 
   # Test the machines with a Perl program (sobbing).
@@ -55,35 +87,18 @@ import <nixpkgs/nixos/tests/make-test.nix> {
       # Start booting all the VMs in parallel to speed up operations down below.
       startAll;
 
-      #
       # Set up a Tahoe-LAFS introducer.
-      #
-      my ($code, $version) = $introducer->execute("tahoe --version");
-      $introducer->log($version);
-
-      $introducer->succeed(
-          'tahoe create-introducer ' .
-          '--port tcp:${toString introducerPort} ' .
-          '--location tcp:introducer:${toString introducerPort} ' .
-          '/tmp/introducer'
-      );
       $introducer->copyFileFromHost(
           '${pemFile}',
-          '/tmp/introducer/private/node.pem'
-      );
-      $introducer->copyFileFromHost(
-          '${introducerFURLFile}',
-          '/tmp/introducer/private/introducer.furl'
-      );
-      $introducer->succeed(
-          'daemonize ' .
-          '-e /tmp/stderr ' .
-          '-o /tmp/stdout ' .
-          '$(type -p tahoe) run /tmp/introducer'
+          '/tmp/node.pem'
       );
 
       eval {
-        $introducer->waitForOpenPort(${toString introducerPort});
+        $introducer->succeed(
+          'set -eo pipefail; ' .
+          '${run-introducer} /tmp/node.pem ${toString introducerPort} ${introducerFURL} | ' .
+          systemd-cat'
+        );
         # Signal success. :/
         1;
       } or do {
@@ -96,7 +111,7 @@ import <nixpkgs/nixos/tests/make-test.nix> {
       #
       # Get a Tahoe-LAFS storage server up.
       #
-      my ($code, $version) = $storage->execute("tahoe --version");
+      my ($code, $version) = $storage->execute('tahoe --version');
       $storage->log($version);
 
       # The systemd unit should reach the running state.
@@ -114,39 +129,31 @@ import <nixpkgs/nixos/tests/make-test.nix> {
       #
       # Storage appears to be working so try to get a client to speak with it.
       #
-      my ($code, $version) = $client->execute("tahoe --version");
-      $client->log($version);
-
-      # Create a Tahoe-LAFS client on it.
-      $client->succeed(
-          'tahoe create-client ' .
-          '--shares-needed 1 ' .
-          '--shares-happy 1 ' .
-          '--shares-total 1 ' .
-          '--introducer ${introducerFURL} /tmp/client'
-      );
-
-      # Launch it
-      $client->succeed(
-          'daemonize ' .
-          '-e /tmp/stderr ' .
-          '-o /tmp/stdout ' .
-          '$(type -p tahoe) run /tmp/client'
-      );
+      $client->succeed('set -eo pipefail; ${run-client} ${introducerFURL} | systemd-cat');
       $client->waitForOpenPort(3456);
 
-      my ($code, $out) = $client->execute(
-          'tahoe -d /tmp/client ' .
-          'put /etc/issue'
-      );
-      ($code == 0) or do {
-          my ($code, $log) = $client->execute('cat /tmp/stdout /tmp/stderr');
-          $client->log($log);
-          die "put failed";
+      # Get some ZKAPs from the issuer.
+      eval {
+        $client->succeed('set -eo pipefail; ${get-passes} http://127.0.0.1:3456 http://issuer:8081 | systemd-cat');
+        # succeed() is not success but 1 is.
+        1;
+      } or do {
+        my $error = $@ || 'Unknown failure';
+        my ($code, $log) = $client->execute('cat /tmp/stdout /tmp/stderr');
+        $client->log($log);
+        die $@;
       };
-      $client->succeed(
-          'tahoe -d /tmp/client ' .
-          "get $out"
-      );
-    '';
+
+      # The client should be prepped now.  Make it try to use some storage.
+      eval {
+        $client->succeed('set -eo pipefail; ${exercise-storage} /tmp/client | systemd-cat');
+        # nothing succeeds like ... 1.
+        1;
+      } or do {
+        my $error = $@ || 'Unknown failure';
+        my ($code, $log) = $client->execute('cat /tmp/stdout /tmp/stderr');
+        $client->log($log);
+        die $@;
+      };
+      '';
 }
diff --git a/nixos/modules/tests/run-client.py b/nixos/modules/tests/run-client.py
new file mode 100755
index 0000000000000000000000000000000000000000..a246a737232007c95cd364ce5f6566843050a882
--- /dev/null
+++ b/nixos/modules/tests/run-client.py
@@ -0,0 +1,55 @@
+#!/usr/bin/env python3
+
+#
+# Create a PrivateStorage.io-enabled Tahoe-LAFS client node and run it as a
+# daemon.  Exit with success when we think we've started it.
+#
+
+from os import environ
+from sys import argv
+from shutil import which
+from subprocess import check_output
+from configparser import ConfigParser
+
+def main():
+    (introducerFURL,) = argv[1:]
+
+    # PYTHONHOME set for Python 3 for this script breaks Python 2 used by
+    # Tahoe. :/ This is kind of a NixOS Python packaging bug.
+    del environ["PYTHONHOME"]
+
+    run(["tahoe", "--version"])
+    run([
+        "tahoe", "create-client",
+        "--shares-needed", "1",
+        "--shares-happy", "1",
+        "--shares-total", "1",
+        "--introducer", introducerFURL,
+        "/tmp/client",
+    ])
+
+    # Add necessary ZKAPAuthorizer configuration bits.
+    config = ConfigParser()
+    with open("/tmp/client/tahoe.cfg") as cfg:
+        config.read_file(cfg)
+
+    config.set(u"client", u"storage.plugins", u"privatestorageio-zkapauthz-v1")
+    config.add_section(u"storageclient.plugins.privatestorageio-zkapauthz-v1")
+    config.set(u"storageclient.plugins.privatestorageio-zkapauthz-v1", u"redeemer", u"ristretto")
+
+    with open("/tmp/client/tahoe.cfg", "wt") as cfg:
+        config.write(cfg)
+
+    run([
+        "daemonize",
+        "-o", "/tmp/stdout",
+        "-e", "/tmp/stderr",
+        which("tahoe"), "run", "/tmp/client",
+    ])
+
+def run(argv):
+    print("{}: {}".format(argv, check_output(argv)))
+
+
+if __name__ == '__main__':
+    main()
diff --git a/nixos/modules/tests/run-introducer.py b/nixos/modules/tests/run-introducer.py
new file mode 100755
index 0000000000000000000000000000000000000000..7a69bdb8240b5dc6b347b960762dd4e2ef0cdde1
--- /dev/null
+++ b/nixos/modules/tests/run-introducer.py
@@ -0,0 +1,75 @@
+#!/usr/bin/env python3
+
+#
+# Create a Tahoe-LAFS introducer node and run it as a daemon.  Exit with
+# success when it is accepting introducer client connections.
+#
+
+from sys import argv
+from os import environ, makedirs, rename
+from shutil import which
+from subprocess import check_output
+from socket import socket
+from time import sleep
+
+log = print
+
+def main():
+    pemFile, introducerPort, introducerFURL = argv[1:]
+
+    # PYTHONHOME set for Python 3 for this script breaks Python 2 used by
+    # Tahoe. :/ This is kind of a NixOS Python packaging bug.
+    del environ["PYTHONHOME"]
+
+    run(["tahoe", "--version"])
+    run([
+        "tahoe", "create-introducer",
+        "--port", "tcp:" + introducerPort,
+        "--location", "tcp:introducer:" + introducerPort,
+        "/tmp/introducer",
+    ])
+    rename(pemFile, "/tmp/introducer/private/node.pem")
+    with open("/tmp/introducer/private/introducer.furl", "w") as f:
+        f.write(introducerFURL)
+    run([
+        "daemonize",
+        "-o", "/tmp/stdout",
+        "-e", "/tmp/stderr",
+        which("tahoe"), "run", "/tmp/introducer",
+    ])
+
+    retry(
+        "waiting for open introducer port",
+        lambda: checkOpen(int(introducerPort)),
+    )
+
+
+def checkOpen(portNumber):
+    s = socket()
+    try:
+        s.connect(("127.0.0.1", portNumber))
+    except:
+        return False
+    else:
+        return True
+    finally:
+        s.close()
+
+
+def retry(description, f):
+    for i in range(60):
+        log("trying to {}...".format(description))
+        if f():
+            log("{} succeeded".format(description))
+            return
+        sleep(1.0)
+    raise ValueError("failed to {} after many tries".format(description))
+
+
+def run(argv):
+    log("Running {}".format(argv))
+    log("{}: {}".format(argv, check_output(argv)))
+
+
+if __name__ == '__main__':
+    main()
diff --git a/nixos/modules/zkap-overlay.nix b/nixos/modules/zkap-overlay.nix
index 75433f0fc10663aecbd16593fea9ba40073281fa..c606b47bcfa267fba29c23fb4577ea79fd2de03b 100644
--- a/nixos/modules/zkap-overlay.nix
+++ b/nixos/modules/zkap-overlay.nix
@@ -1,5 +1,4 @@
-{ fetchFromGitHub }:
 let
-  zkapauthorizer = import ../pkgs/zkapauthorizer-repo.nix { inherit fetchFromGitHub; };
+  zkapauthorizer = import ../pkgs/zkapauthorizer-repo.nix;
 in
   import "${zkapauthorizer}/overlays.nix"
diff --git a/nixos/pkgs/twisted.nix b/nixos/pkgs/twisted.nix
new file mode 100644
index 0000000000000000000000000000000000000000..efa56cd0c924880559f554636f7ea5975e8df56e
--- /dev/null
+++ b/nixos/pkgs/twisted.nix
@@ -0,0 +1,11 @@
+{ twisted }:
+twisted.overrideAttrs (old: {
+  prePatch = old.patchPhase;
+  patchPhase = null;
+  # Add a patch which adds more logging to a namer resolver failure case.  The
+  # NixOS system test harness might be setting up a weird semi-broken system
+  # that provokes a weird behavior out of getaddrinfo() that Twisted doesn't
+  # normally handle.  The logging can help with debugging this case.  We
+  # should think about upstreaming something related to this.
+  patches = (if old ? "patches" then old.patches else []) ++ [ ./twisted.patch ];
+})
diff --git a/nixos/pkgs/twisted.patch b/nixos/pkgs/twisted.patch
new file mode 100644
index 0000000000000000000000000000000000000000..9f50368c8cffe60a819306687b5f78df228d4b61
--- /dev/null
+++ b/nixos/pkgs/twisted.patch
@@ -0,0 +1,23 @@
+diff --git a/src/twisted/internet/_resolver.py b/src/twisted/internet/_resolver.py
+index 1c16174a2..8c8249db4 100644
+--- a/src/twisted/internet/_resolver.py
++++ b/src/twisted/internet/_resolver.py
+@@ -74,6 +74,8 @@ class GAIResolver(object):
+     L{getaddrinfo} in a thread.
+     """
+ 
++    _log = Logger()
++
+     def __init__(self, reactor, getThreadPool=None, getaddrinfo=getaddrinfo):
+         """
+         Create a L{GAIResolver}.
+@@ -124,6 +126,9 @@ class GAIResolver(object):
+                                          socketType)
+             except gaierror:
+                 return []
++            except Exception as e:
++                self._log.failure("Problem resolving {hostName}", hostName=hostName)
++                return []
+         d = deferToThreadPool(self._reactor, pool, get)
+         resolution = HostResolution(hostName)
+         resolutionReceiver.resolutionBegan(resolution)
diff --git a/nixos/pkgs/zkapauthorizer-repo.nix b/nixos/pkgs/zkapauthorizer-repo.nix
index dc50d589f36da17d6bf24fbb6b441fc326b6d13f..44947fc2ba9c3e49c0f97d15a5a0b7b7b92ed45b 100644
--- a/nixos/pkgs/zkapauthorizer-repo.nix
+++ b/nixos/pkgs/zkapauthorizer-repo.nix
@@ -1,7 +1,9 @@
-{ fetchFromGitHub }:
-fetchFromGitHub {
-  owner = "PrivateStorageio";
-  repo = "ZKAPAuthorizer";
-  rev = "36dd4c2cffa2e9df651dda4c9ac8977bafe2ed64";
-  sha256 = "sha256:1i5nli73gk56r5brmimcd97dkf7wd4mf6viw4vbcssa7xj6s84af";
-}
+let
+  pkgs = import <nixpkgs> {};
+in
+  pkgs.fetchFromGitHub {
+    owner = "PrivateStorageio";
+    repo = "ZKAPAuthorizer";
+    rev = "00387ea1d02a5800ff4480a3a177ecc87b34532f";
+    sha256 = "053bzpq68fz1y0qzyryxjmbpvpzshhxhkp404pviqdi18xyqgzyc";
+  }
\ No newline at end of file
diff --git a/nixos/pkgs/zkapauthorizer.nix b/nixos/pkgs/zkapauthorizer.nix
index fe12cb60a0ad4edaf6e499be0b581a6d70fb5996..95fc177419e26a88cb0156e1ad32fe2127746ef9 100644
--- a/nixos/pkgs/zkapauthorizer.nix
+++ b/nixos/pkgs/zkapauthorizer.nix
@@ -1,5 +1,5 @@
-{ fetchFromGitHub, python27Packages }:
+{ python27Packages }:
 let
-  zkapauthorizer = import ./zkapauthorizer-repo.nix { inherit fetchFromGitHub; };
+  zkapauthorizer = import ./zkapauthorizer-repo.nix;
 in
   python27Packages.callPackage "${zkapauthorizer}/zkapauthorizer.nix" { }
diff --git a/nixos/pkgs/zkapissuer.nix b/nixos/pkgs/zkapissuer.nix
new file mode 100644
index 0000000000000000000000000000000000000000..2cee8ea49f242adf31f8114a2a7d688d6cb87c17
--- /dev/null
+++ b/nixos/pkgs/zkapissuer.nix
@@ -0,0 +1,10 @@
+{ fetchFromGitHub, callPackage }:
+let
+  paymentServer = fetchFromGitHub {
+    owner = "PrivateStorageio";
+    repo = "PaymentServer";
+    rev = "6fbaac7a14d2a03b74e10a4a82b1147ee1dd7d49";
+    sha256 = "0z8mqmns3fqbjy765830s5q6lhz3lxmslxahjc155jsv5b46gjip";
+  };
+in
+  (callPackage "${paymentServer}/nix" { }).PaymentServer