Tc Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

Tc Proceedings TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions Michael Demmer, Bowei Du, and Eric Brewer University of California, Berkeley {demmer,bowei,brewer}@cs.berkeley.edu Abstract To address these challenges, various groups have used novel approaches for connectivity in real-world applica- TierStore is a distributed filesystem that simplifies the de- tions. The Wizzy Digital Courier system [36] distributes velopment and deployment of applications in challenged educational content among schools in South Africa by network environments, such as those in developing re- delaying dialup access until night time, when rates are gions. For effective support of bandwidth-constrained cheaper. DakNet [22] provides e-mail and web connec- and intermittent connectivity, it uses the Delay Toler- tivity by copying data to a USB drive or hard disk and ant Networking store-and-forward network overlay and then physically carrying the drive, sometimes via mo- a publish/subscribe-based multicast replication protocol. torcycles. Finally, Ca:sh [1] uses PDAs to gather rural TierStore provides a standard filesystem interface and a health care data, also relying on physical device trans- single-object coherence approach to conflict resolution port to overcome the lack of connectivity. These projects which, when augmented with application-specific han- demonstrate the value of information distribution appli- dlers, is both sufficient for many useful applications and cations in developing regions, yet they all essentially simple to reason about for programmers. In this paper, started from scratch and thus use ad-hoc solutions with we show how these properties enable easy adaptation little leverage from previous work. and robust deployment of applications even in highly in- This combination of demand and obstacles reveals termittent networks and demonstrate the flexibility and the need for a flexible application framework for “chal- bandwidth savings of our prototype with initial evalua- lenged” networks. Broadly speaking, challenged net- tion results. works lack the ability to support reliable, low-latency, end-to-end communication sessions that typify both the 1 Introduction phone network and the Internet. Yet many important applications can still work well despite low data rates The limited infrastructure in developing regions both and frequent or lengthy disconnections; examples in- hinders the deployment of information technology and clude e-mail, voicemail, data collection, news distribu- magnifies the need for it. In spite of the challenges, a tion, e-government, and correspondence education. The variety of simple information systems have shown real challenge lies in implementing systems and protocols to impact on health care, education, commerce and produc- adapt applications to the demands of the environment. tivity [19, 34]. For example, in Tanzania, data collection Thus our central goal is to provide a general purpose related to causes of child deaths led to a reallocation of framework to support applications in challenged net- resources and a 40% reduction in child mortality (from works, with the following key properties: First, to adapt 16% to 9%) [4, 7]. existing applications and develop new ones with mini- Yet in many places, the options for network connec- mal effort, the system should offer a familiar and easy- tivity are quite limited. Although cellular networks are to-use filesystem interface. To deal with intermittent net- growing rapidly, they remain a largely urban and costly works, applications must operate unimpeded while dis- phenomenon, and although satellite networks have cov- connected, and easily resolve update conflicts that may erage in most rural areas, they too are extremely expen- occur as a result. Finally, to address the networking chal- sive [30]. For these and other networking technologies, lenges, replication protocols need to be able to leverage a power problems and coverage gaps cause connectivity to range of network transports, as appropriate for particular vary over time and location. environments, and efficiently distribute application data. USENIX Association FAST ’08: 6th USENIX Conference on File and Storage Technologies 35 As we describe in the remainder of this paper, Tier- Based in part on these observations, TierStore imple- Store is a distributed filesystem that offers these prop- ments a single-object coherence policy for conflict man- erties. Section 2 describes the high-level design of the agement, meaning that only concurrent updates to the system, followed by a discussion of related work in Sec- same file are flagged as conflicts. We have found that this tion 3. Section 4 describes the details of how the system simple model, coupled with application-specific conflict operates. Section 5 discusses some applications we have resolution handlers, is both sufficient for many useful ap- developed to demonstrate flexibility. Section 6 presents plications and easy to reason about for programmers. It an initial evaluation, and we conclude in Section 7. is also a natural consequence from offering a filesystem interface, as UNIX filesystems do not naturally expose a 2 TierStore Design mechanism for multiple-file atomic updates. When conflicts do occur, TierStore exposes all infor- The goal of TierStore is to provide a distributed filesys- mation about the conflicting update through the filesys- tem service for applications in bandwidth-constrained tem interface, allowing either automatic resolution by and/or intermittent network environments. To achieve application-specific scripts or manual intervention by a these aims, we claim no fundamentally new mechanisms, user. For more complex applications for which single- however we argue that TierStore is a novel synthesis of file coherence is insufficient, the base system is exten- well-known techniques and most importantly is an effec- sible to allow the addition of application-specific meta- tive platform for application deployment. objects (discussed in Section 4.12). These objects can be TierStore uses the Delay Tolerant Networking (DTN) used to group a set of user-visible files that need to be bundle protocol [11, 28] for all inter-node messag- updated atomically into a single TierStore object. ing. DTN defines an overlay network architecture for To distribute data efficiently over low-bandwidth net- challenged environments that forwards messages among work links, TierStore allows the shared data to be par- nodes using a variety of transport technologies, includ- titioned into fine-grained publications, currently defined ing traditional approaches and long-latency “sneakernet” as disjoint subtrees of the filesystem namespace. Nodes links. Messages may also be buffered in persistent stor- can then subscribe to receive updates to only their pub- age during connection outages and/or retransmitted due lications of interest, rather than requiring all shared state to a message loss. Using DTN allows TierStore to adapt to be replicated. This model maps quite naturally to naturally to a range of network conditions and to use so- the needs of real applications (e.g. users’ mailboxes lution(s) most appropriate for a particular environment. and folders, portions of web sites, or regional data col- To simplify application development, TierStore im- lection). Finally, TierStore nodes are organized into a plements a standard filesystem interface that can be ac- multicast-like distribution tree to limit redundant update cessed and updated at multiple nodes in the network. transmissions over low-bandwidth links. Any modifications to the shared filesystem state are both applied locally and encoded as update messages that are 3 Related Work lazily distributed to other nodes in the network. Because nodes may be disconnected for long periods of time, the Several existing systems offer distributed storage ser- design favors availability at the potential expense of con- vices with varying network assumptions; here we briefly sistency [12]. This decision is critical to allow applica- discuss why none fully satisfies our design goals. tions to function unimpeded in many environments. One general approach has been to adapt traditional The filesystem layer implements traditional NFS-like network file systems such as NFS and AFS for use in semantics, including close-to-open consistency, hard and constrained network environments. For example, the soft links, and standard UNIX group, owner, and per- Low-Bandwidth File System (LBFS) [18] implements mission semantics. As such, many interesting and useful a modified NFS protocol that significantly reduces the applications can be deployed on a TierStore system with- bandwidth consumption requirements. However, LBFS out (much) modification, as they often already use the maintains NFS’s focus on consistency rather than avail- filesystem for communication of shared state between ability in the presence of partitions [12], thus even application instances. For example, several implemen- though it addresses the bandwidth problems, it is unsuit- tations of e-mail, log collection, and wiki packages are able for intermittent connectivity. already written to use the filesystem for shared state and Coda [16] extends AFS to support disconnected oper- have simple data distribution patterns, and are therefore ation. In Coda, clients register for a subset of files to be straightforward to deploy using TierStore. Also, these “hoarded”, i.e. to be available when offline, and modi- applications are either already conflict-free in the ways fications made while disconnected are merged
Recommended publications
  • Synology Mailplus Security White Paper
    White Paper Secure Your Business Mail Service with Synology MailPlus Based on DSM 6.2 1 Synology White Paper Table of Contents Executive Summary 02 Secure your data with the self-hosted email service 03 Synology MailPlus Software Architecture 04 Incoming Mail Process Supported Mail Client Types Email Security Best Practice for Email Security Configuration Summary About Synology 10 References News Stories, Articles and Reviews Email and Open Source Solutions Information Executive Summary Executive Summary Cloud-based email services have become part of the IT landscape since Hotmail launched in 1996. Hosted email solutions have set the standard for features such as flexibility, consistency of use, integration with productivity tools, security, expandability, and administrative ease. However, the fact remains that for business users, using a hosted service means that all the organization's email data is migrated to the cloud and gets out of your direct control1. Even with robust safeguards, organizations may prefer to host their own email services to maintain complete control over all their confidential data. This white paper shows how your daily email services are protected by the software architecture of Synology MailPlus and explains the corresponding email security features, along with all the benefits associated with a self-hosted email server. Security is multi-leveled, enabling MailPlus Server to combat spam, phishing threats, viruses, and other email-borne threat vectors, while still maintaining high processing performance and allowing for high-level configurability and customization. Synology MailPlus server and client solution offer the advantages of the cloud in terms of expandability, flexibility, integration, and ease-of-use, while still retaining the privacy and security that can only come from hosting your own data and hardware.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Vdirsyncer Documentation Release 0.18.1.Dev82+Gdb6da70
    vdirsyncer Documentation Release 0.18.1.dev82+gdb6da70 Markus Unterwaditzer Sep 22, 2021 Users 1 When do I need Vdirsyncer?3 2 Installation 5 3 Tutorial 9 4 SSL and certificate validation 15 5 Storing passwords 17 6 Syncing with read-only storages 19 7 Full configuration manual 21 8 Other tutorials 31 9 Known Problems 39 10 Contributing to this project 41 11 The Vdir Storage Format 45 12 Packaging guidelines 47 13 Support and Contact 49 14 Changelog 51 15 Credits and License 65 16 Donations 67 Bibliography 69 Index 71 i ii vdirsyncer Documentation, Release 0.18.1.dev82+gdb6da70 • Documentation • Source code Vdirsyncer is a command-line tool for synchronizing calendars and addressbooks between a variety of servers and the local filesystem. The most popular usecase is to synchronize a server with a local folder and use a set of other programs to change the local events and contacts. Vdirsyncer can then synchronize those changes back to the server. However, vdirsyncer is not limited to synchronizing between clients and servers. It can also be used to synchronize calendars and/or addressbooks between two servers directly. It aims to be for calendars and contacts what OfflineIMAP is for emails. Users 1 vdirsyncer Documentation, Release 0.18.1.dev82+gdb6da70 2 Users CHAPTER 1 When do I need Vdirsyncer? 1.1 Why not Dropbox + todo.txt? Projects like todo.txt criticize the complexity of modern productivity apps, and that rightfully. So they set out to create a new, super-simple, human-readable format, such that vim suffices for viewing the raw data.
    [Show full text]
  • IMAP-Clients Im Vergleich Postlagernd © Loiic, Fotolia.Com Loiic, ©
    netzwerk imAP-Clients Vier IMAP-Clients im Vergleich Postlagernd © loiic, Fotolia.com loiic, © wer von unterwegs mit wechselnden Clients mail lesen will, kommt am imAP-Protokoll nicht vorbei. Hier müssen vier mailclients ihre imAP- und Caching-Fähigkeiten unter beweis stellen. Florian effenberger Der Wechsel von POP zur IMAP bringt Leider passiert dies nur dann, wenn ein der Anwender den Wert »mail.check_all_ viele Vorteile, zum Beispiel synchroni- Anwender einen Ordner öffnet. Auf der imap_folders_for_new« auf »true«. Even- sierte Postfächer und Server-seitige Fil- anderen Seite vermeidet Thunderbird so tuell ist es ebenfalls erforderlich, »mail. ter. Die Nachrichten verbleiben auf dem aber auch lange Download-Orgien beim imap.use_status_for_biff« auf »false« zu Server, sofern der Anwender diese nicht ersten Start. Mozillas Mailclient erlaubt setzen, falls der IMAP-Server den Status explizit zum Download auswählt. Das es, die Offline-Ordner im Assistenten nicht korrekt zurückschickt. dürfte Nutzer von mobilen Geräten und über die erweiterten Eigenschaften zu Die Ordnerverwaltung selbst ist recht langsamen oder teuren Internetverbin- deaktivieren. Dann speichert der Mailer spartanisch, bietet aber eine Suchfunktion dungen besonders freuen. nur die Kopfzeilen lokal. (siehe Abbildung 2). Äußerst praktisch ist Um in den Genuss der IMAP-Features zu Alle Konten und Ordner sind individuell dagegen der Offline-Modus. In diesem lädt kommen, sollte der Mailclient die wich- konfigurierbar (siehe Abbildung 1). Op- Thunderbird alle entsprechenden
    [Show full text]
  • Vdirsyncer Documentation Release 0.18.0
    vdirsyncer Documentation Release 0.18.0 Markus Unterwaditzer Sep 13, 2021 Users 1 When do I need Vdirsyncer?3 2 Installation 5 3 Tutorial 9 4 SSL and certificate validation 15 5 Storing passwords 17 6 Syncing with read-only storages 19 7 Full configuration manual 21 8 Other tutorials 31 9 Known Problems 39 10 Contributing to this project 41 11 The Vdir Storage Format 45 12 Packaging guidelines 47 13 Support and Contact 49 14 Changelog 51 15 Credits and License 65 16 Donations 67 Bibliography 69 Index 71 i ii vdirsyncer Documentation, Release 0.18.0 • Documentation • Source code Vdirsyncer is a command-line tool for synchronizing calendars and addressbooks between a variety of servers and the local filesystem. The most popular usecase is to synchronize a server with a local folder and use a set of other programs to change the local events and contacts. Vdirsyncer can then synchronize those changes back to the server. However, vdirsyncer is not limited to synchronizing between clients and servers. It can also be used to synchronize calendars and/or addressbooks between two servers directly. It aims to be for calendars and contacts what OfflineIMAP is for emails. Users 1 vdirsyncer Documentation, Release 0.18.0 2 Users CHAPTER 1 When do I need Vdirsyncer? 1.1 Why not Dropbox + todo.txt? Projects like todo.txt criticize the complexity of modern productivity apps, and that rightfully. So they set out to create a new, super-simple, human-readable format, such that vim suffices for viewing the raw data. However, when they’re faced with the question how to synchronize that data across multiple devices, they seemed to have reached the dead end with their novel idea: “Let’s just use Dropbox”.
    [Show full text]
  • Afew Documentation Release 1.3.1.Dev49+Gbb04977
    afew Documentation Release 1.3.1.dev49+gbb04977 Justus Winter Mar 14, 2019 Contents 1 Quick Start 3 1.1 Install...................................................3 1.2 Initial Config...............................................3 1.3 Next Steps................................................4 2 Installation 5 2.1 Requirements...............................................5 2.2 Unprivileged Install...........................................5 3 Command Line Usage 7 3.1 Initial tagging...............................................7 3.2 Move Mode................................................8 3.3 Commandline help............................................8 4 Configuration 9 4.1 Configuration File............................................9 4.2 NotMuch Config.............................................9 4.3 Filter Configuration...........................................9 4.4 Full Sample Config............................................ 10 4.5 More Filter Examples.......................................... 11 5 Filters 13 5.1 ArchiveSentMailsFilter......................................... 13 5.2 DKIMValidityFilter........................................... 13 5.3 DMARCReportInspectionFilter..................................... 13 5.4 FolderNameFilter............................................ 14 5.5 HeaderMatchingFilter.......................................... 15 5.6 InboxFilter................................................ 15 5.7 KillThreadsFilter............................................. 15 5.8 ListMailsFilter.............................................
    [Show full text]
  • Latest/Offlineimap/Ui/__Init__.Py’> Contains the Current Offlineimap.Ui, and Can Be Used for Logging Etc
    OfflineIMAP Documentation Release 7.0.14 OfflineIMAP contributors Apr 03, 2017 Contents 1 offlineimap's API documentation3 2 offlineimap – The OfflineImap module5 3 offlineimap.account 7 3.1 OfflineImapError – A Notmuch execution error.........................9 4 offlineimap.globals – module with global variables 11 5 offlineimap.repository – Email repositories 13 6 offlineimap.repository.Base.BaseRepository – Representation of a mail repository 15 7 offlineimap.folder – Basic representation of a local or remote Mail folder 19 8 offlineimap.ui – A flexible logging system 27 8.1 Base UI plugin.............................................. 27 Python Module Index 31 i ii OfflineIMAP Documentation, Release 7.0.14 License dco (dco) Documented APIs Contents 1 OfflineIMAP Documentation, Release 7.0.14 2 Contents CHAPTER 1 offlineimap's API documentation Within offlineimap, the classes OfflineImap provides the high-level functionality. The rest of the classes should usually not needed to be touched by the user. Email repositories are represented by a offlineimap. repository.Base.BaseRepository or derivatives (see offlineimap.repository for details). A folder within a repository is represented by a offlineimap.folder.Base.BaseFolder or any derivative from offlineimap.folder. This page contains the main API overview of OfflineImap 7.0.14. OfflineImap can be imported as: from offlineimap import OfflineImap 3 OfflineIMAP Documentation, Release 7.0.14 4 Chapter 1. offlineimap's API documentation CHAPTER 2 offlineimap – The OfflineImap module class OfflineImap(cmdline_opts = None) The main class that encapsulates the high level use of OfflineImap. To invoke OfflineImap you would call it with: oi= OfflineImap() oi.run() _OfflineImap__deletefolder(options) _OfflineImap__dumpstacks(context=1, sighandler_deep=2) Signal handler: dump a stack trace for each existing thread.
    [Show full text]
  • Managing Messaging Systems – Class Overview Introductions, Review, Class Structure, Class Activities
    [Script=Arabic]XB Zar Managing Messaging Systems – Class Overview Introductions, Review, Class Structure, Class Activities Mohsen Banan: http://mohsen.banan.1.byname.net/ContactMe http://mohsen.banan.1.byname.net/PLPC/120048 January 03, 2017 Varbatim Copying Permitted . Mohsen Banan Managing Messaging Systems – Class Overview Part 1: Introductions 1 Class Information 2 About Me 3 About You . .. .. .... ... .. .. .... ... Class Information About Me About You Class Information Class Portal: http://mohsen.banan.1.byname.net/teaching/bc-isit442 We May Also Use Canvas Occasionally For now mohsen.banan bellevuecollege.edu is the best way to reach me . Mohsen Banan Managing Messaging Systems – Class Overview Class Information About Me About You About Me An Engineer, Not A Teacher Occasionally I Teach Google “Mohsen Banan” . Mohsen Banan Managing Messaging Systems – Class Overview Class Information About Me About You About You It is a small class. To teach you well, I need to get to know you. Mohsen Banan Managing Messaging Systems – Class Overview Part 2: Relevant Concepts Review 4 Relevant Concepts Review . .. .. .... ... .. .. .... ... Relevant Concepts Review Relevant Concepts Review Unix/Linux Command Line Virtualization OSI Messaging Wireshark . Mohsen Banan Managing Messaging Systems – Class Overview Class Structure Class Overview Part III Class Structure And Class Overview . Mohsen Banan Managing Messaging Systems – Class Overview Part 3: Class Structure And Class Overview 5 Class Structure Theory: Model, Terminology, Protocols Practice: Hands-On 6 Class Overview Basic Model for email (Inter-personal Message Handeling System (MHS) Some Basic MHS (email) Terminology Review MTA Comparisons – qmail is our choice of ultimate MTA The ByStar Mail Server Configuration – Hosted And In-House The Right qmail Autonomous Client Configuration .
    [Show full text]
  • Leap.Mail Documentation Release 0.4.0
    leap.mail Documentation Release 0.4.0 Kali Kaneko Sep 27, 2017 Contents 1 How does this all work? 3 2 Data model 5 3 Documentation index 7 3.1 Hacking..................................................7 3.2 API documentation............................................ 10 4 Indices and tables 13 i ii leap.mail Documentation, Release 0.4.0 decentralized and secure mail delivery and synchronization This is the documentation for the leap.mail module. It is a twisted package that allows to receive, process, send and access existing messages using the LEAP platform. One way to use this library is to let it launch two standard mail services, smtp and imap, that run as local proxies and interact with a remote LEAP provider that offers a soledad syncronization endpoint and receives the outgoing email. This is what Bitmask client does. From the release 0.4.0 on, it’s also possible to use a protocol-agnostic email public API, so that third party mail clients can manipulate the data layer. This is what the awesome MUA in the Pixelated project is using. Contents 1 leap.mail Documentation, Release 0.4.0 2 Contents CHAPTER 1 How does this all work? All the underlying data storage and sync is handled by a library called soledad, which handles encryption, storage and sync. Based on u1db, documents are stored locally as local sqlcipher tables, and syncs against the soledad sync service in the provider. OpenPGP key generation and keyring management are handled by another leap python library: keymanager. See the life cycle of a leap email for an overview of the life cycle of an email through LEAP providers.
    [Show full text]
  • The Woodnotes Guide to the Mutt Email Client
    The Woodnotes Guide to the Mutt Email Client Randall Wood (www.therandymon.com) December 2, 2009 Contents 1 Introduction – Why Mutt? 3 2 Usage: The Basics 4 2.1 GettingHelp..................................... ...... 4 2.2 ReadingMessages ................................. ...... 5 2.2.1 YourInbox(IndexView). ...... 5 2.2.2 SortingandThreadingMessagesintheIndexView . ............. 6 2.2.3 ReadingMessages(PagerView) . ........ 6 2.2.4 DeletingMessages .............................. ..... 7 2.3 Composing Messages and Saving Drafts (Postponing Messages) ............... 7 2.4 Attachments..................................... ...... 8 2.4.1 ForwardingAttachments . ....... 9 2.4.2 DeletingandUndeletingAttachments . ........... 9 2.5 PrintingMessages................................ ........ 9 2.6 ReadingMailinOtherFolders . .......... 9 2.7 SavingMessagestoFiles . ......... 10 2.8 OperatingonMultipleMessages . ........... 11 2.8.1 SelectionPatterns. ....... 11 2.8.2 TaggingandFlags ............................... .... 12 2.8.3 LimitingMessagesShown . ...... 12 2.8.4 UsingPatternstoArchiveGroupsofMessages . ............ 12 2.9 UsingtheAddressBook ............................. ....... 13 1 2 CONTENTS 3 Configuring Mutt 13 3.1 BasicConfiguration............................... ........ 13 3.2 SettingUpYourMailAccounts. .......... 14 3.2.1 Downloadingfromaserver(POP3) . ........ 15 3.2.2 AccessingyourMailattheServer(IMAP) . .......... 15 3.2.3 OfflineIMAP.................................... .. 16 3.3 SendingMail:SendmailandFriends . ............ 17 3.4
    [Show full text]
  • Bitmask Documentation Release 0.10.7
    Bitmask Documentation Release 0.10.7 LEAP Encryption Access Project Sep 29, 2018 Contents 1 What is Bitmask? 3 2 Understood! Show me the docs!5 2.1 Building the docs.............................................5 3 Contents 7 3.1 Installation................................................7 3.2 Testing & QA..............................................9 3.3 Known Issues............................................... 10 3.4 Hacking.................................................. 11 3.5 Bitmask CLI............................................... 13 3.6 Bitmask VPN............................................... 14 3.7 Bitmask Core............................................... 16 3.8 Bonafide................................................. 23 3.9 Keymanager............................................... 23 3.10 Bitmask Mail............................................... 25 3.11 Changelog................................................ 29 3.12 List of design docs............................................ 33 3.13 List of contributors............................................ 33 i ii Bitmask Documentation, Release 0.10.7 Release v0.10. (Installation and Known Issues) Contents 1 Bitmask Documentation, Release 0.10.7 2 Contents CHAPTER 1 What is Bitmask? Bitmask is the client for the services offered by the LEAP Platform. The services currently deployed are Encrypted Internet Proxy (VPN) and Encrypted Mail. Bitmask offers a command-line interface and a multiplatform desktop client. It can be also used as a set of libraries to communicate with
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]