August 2009 Volume 34 Number 4
Total Page:16
File Type:pdf, Size:1020Kb
AUGUST 2009 VOLUME 34 NUMBER 4 OPINION Musings 2 Rik Farrow FILE SYSTEMS Cumulus: Filesystem Backup to the Cloud 7 Michael VR able, SteFan SaVage, and geoffrey M. VoelkeR THE USENIX MAGAZINE PROGRAMMinG Rethinking Browser Performance 14 leo MeyeRoVich Programming Video Cards for Database Applications 21 tiM kaldewey SECURITY Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up? 35 daVid dittRich HARDWARE A Home-Built NTP Appliance 45 Rudi Van dRunen CoLUMns Practical Perl Tools: Scratch the Webapp Itch with CGI::Application, Part 1 56 daVid n. blank-edelMan Pete’s All Things Sun: T Servers—Why, and Why Not 61 PeteR baeR galVin iVoyeur: Who Invited the Salesmen? 67 daVe JoSePhSen /dev/random 71 RobeRt g. Ferrell BooK REVIEWS Book Reviews 74 elizabeth zwicky et al. USEniX NOTES USENIX Lifetime Achievement Award 78 STUG Award 79 USENIX Association Financial Report for 2008 79 ellie young Writing for ;login: 83 ConfERENCES NSDI ’09 Reports 84 Report on the 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) 97 Report on the First USENIX Workshop on Hot Topics in Parallelism (HotPar ’09) 99 Report on the 12th Workshop on Hot Topics in Operating Systems (HotOS XII) 109 The Advanced Computing Systems Association aug09covers.indd 1 7.13.09 9:21:47 AM Upcoming Events 22n d ACM Sy M p o S i u M o n op e r A t i n g Sy S t e ms 7t H uSENIX Sy M p o S i u M o n ne t w o r k e d Sy S t e ms prinCipleS (SoSp ’09) de S i g n A n d iM p l e M e n t A t i o n (nSDI ’10) Sponsored by ACM SIGOPS in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGCOMM and OCTOBER 11–14, 2009, BIG SKY, MT, USA ACM SIGOPS http://www.sigops.org/sosp/sosp09/ April 28–30, 2010, San Jose, CA, USA http://www.usenix.org/nsdi10 Submissions due: October 2, 2009 23r d lA r g e in S t A l l A t i o n Sy S t e M Ad M i n i S t r A t i o n Co n f e r e n C e (LISA ’09) 2n d uSENIX wo r k sh o p o n Ho t to p i cs in Sponsored by USENIX and SAGE in cooperation with LOPSA pA r A l l e l i sm (Ho t pA r ’10) NOvember 1–6, 2009, BALTIMORE, MD, USA June 14–15, berkeley, CA, USA http://www.usenix.org/lisa09 http://www.usenix.org/hotpar10 Submissions due: January 24, 2010 Sy M p o S i u M o n Co M p u t e r -Hu ma n in t e r ac t i o n f o r MA n A g e M e n t o f in f o r ma t i o n te ch n o l o g y uSENIX Co n f e r e n C e o n we b Ap p l i ca t i o n (CHiMIT 09) de v e l o p M e n t (we b Ap p S ’10) Sponsored by ACM in association with USENIX Co-located with USENIX ’10 NOvember 7–8, 2009, BALTIMORE, MD, USA June 20–25, 2010, Boston, MA, USA http://www.chimit09.org/ http://www.usenix.org/webapps10 Submissions due: January 11, 2010 ACM/IFIP/uSENIX 10t H in t e r n A t i o n A l Mi d d l e w A r e Co n f e r e n C e 2010 uSENIX An n u A l te ch n i ca l Co n f e r e n C e NOv. 30–Dec. 4, 2009, Urbana Champaign, IL (uSENIX ’10) http://middleware2009.cs.uiuc.edu/ June 20–25, 2010, boston, MA, USA 8t H uSENIX Co n f e r e n C e o n fi l e A n d St o r A g e 19t H uSENIX Se C u r i t y Sy M p o S i u M te ch n o l o g i e S (fASt ’10) (uSENIX Se C u r i t y ’10) Sponsored by USENIX in cooperation with ACM SIGOPS august 9–13, 2010, washington, D.C. february 23–26, 2010, San Jose, CA , USA http://www.usenix.org/fast10 Submissions due: September 10, 2009 9t H uSENIX Sy M p o S i u M o n op e r A t i n g Sy S t e ms de S i g n A n d iM p l e M e n t A t i o n (oSDI ’10) october 4–6, 2010, Vancouver, B.C. For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. aug09covers.indd 2 7.13.09 9:21:48 AM OPINION Musings 2 RIk Farrow FILE SYSTEMS Cumulus: Filesystem Backup to the Cloud 7 Michael Vrable, stefan Savage, and Geoffrey M. Voelker PROGRAMMinG Rethinking Browser Performance 14 Leo MEyerovich Programming Video Cards for Database contents Applications 21 Tim KaldEwEy SECURITY Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up? 35 David dIttrich HARDWARE A Home-Built NTP Appliance 45 RudI VAN dRunen CoLUMns Practical Perl Tools: Scratch the Webapp Itch with CGI::Application, Part 1 56 David N. Blank-Edelman VOL. 34, #4, August 2009 Pete’s All Things Sun: T Servers—Why, and Why Not 61 ;login: is the official Editor PEtER Baer Galvin Rik Farrow magazine of the [email protected] USENIX Association. iVoyeur: Who Invited the Salesmen? 67 Managing Editor ;login: (ISSN 1044-6397) is Dave JOsEPhsEN published bi-monthly by the Jane-Ellen Long /dev/random 71 [email protected] USENIX Association, 2560 Ninth Street, Suite 215, RObert G. Ferrell Copy Editor Berkeley, CA 94710. Steve Gilmartin [email protected] $90 of each member’s annual BooK REVIEWS dues is for an annual sub- Book Reviews 74 produCtion scription to ;login:. Subscrip- ElizAbEth zwicky Et al. Casey Henderson tions for nonmembers are Jane-Ellen Long $125 per year. Jennifer Peterson USEniX NOTES USENIX Lifetime Achievement Award 78 Periodicals postage paid at typEsEttEr Berkeley, CA, and additional STUG Award 79 Star Type offices. [email protected] USENIX Association Financial Report POSTMASTER: Send address for 2008 79 USEniX assoCiation changes to ;login:, 2560 Ninth Street, USENIX Association, Ellie Young Suite 215, Berkeley, 2560 Ninth Street, Writing for ;login: 83 California 94710 Suite 215, Berkeley, Phone: (510) 528-8649 CA 94710. FAX: (510) 548-5738 ConfERENCES NSDI ’09 Reports 84 ©2009 USENIX Association http://www.usenix.org Report on the 8th International Workshop http://www.sage.org USENIX is a registered trade- mark of the USENIX Associa- on Peer-to-Peer Systems (IPTPS ’09) 97 tion. Many of the designations Report on the First USENIX Workshop on used by manufacturers and sellers to distinguish their Hot Topics in Parallelism (HotPar ’09) 99 products are claimed as trade- Report on the 12th Workshop on Hot Topics marks. USENIX acknowledges all trademarks herein. Where in Operating Systems (HotOS XII) 109 those designations appear in this publication and USENIX is aware of a trademark claim, the designations have been printed in caps or initial caps. ;LOGIN: AuGust 2009 ARtICLE tItLE 1 Login_articlesAUGUST9_final.indd 1 7.13.09 8:46:06 AM I’ve decIded to use thIs column to defend the ordinary person—certainly a Rik Farrow monumental task, one requiring volumes instead of a couple of pages. Yet I believe I can make a dent in the project by focusing on just one group: the part of the human population that does not include most USENIX members or other computer secu- musings rity professionals and CS researchers. Rik is the Editor of ;login:. The days when I spent a large part of my life stand- [email protected] ing in front of MIS and IT folk attempting to ex- plain Internet security are long past, but they have left me with a strong feeling about the people who run both the public and the private computer and network infrastructures in North America. Keep in mind that I was either teaching classes or lecturing at conferences that focus on bringing in business and government IT people, I can say that under- standing computer security is a black art for most of these people. There, I’ve said it. Not having to stand in front of such an audience again will hopefully protect me from being stoned to death. But the very people in charge of administering our all-important cyber- infrastructure are largely clueless about what re- ally matters. (N.B.: I use the adjective “cyber,” even though I loathe it, as it has become popular.) I do not mean this as an attack on anyone’s intelligence: if it was easy to get this stuff right, we wouldn’t continue to have security problems. After all, the idea behind malware goes back to NSA research in the ’70s, and viruses became popular in the late ’80s—20 years ago. Now let’s broaden the potential lack of clue a bit. I suggest that most people who use computers and similar networked devices such as cell phones know just as little about computer security as, and likely less than, the managers of our cyber-industry.