You are not logged in. Login Now
 0-24   25-49   50-51        
 
Author Message
jp2
Shared Services with M-Net Mark Unseen   Jan 26 05:06 UTC 2002

This item has been erased.

51 responses total.
krj
response 1 of 51: Mark Unseen   Jan 26 05:31 UTC 2002

>*giggle*<

<krj stifles himself>
steve
response 2 of 51: Mark Unseen   Jan 26 06:41 UTC 2002

  No.  We will not use NFS.

  Sorry.
cmcgee
response 3 of 51: Mark Unseen   Jan 26 14:58 UTC 2002

(oh my god.  The image of krj giggling is almost too much for my brain this
morning)
i
response 4 of 51: Mark Unseen   Jan 26 15:06 UTC 2002

If i recall correctly, a project to do this got "most of the way done" a
bunch of years ago, but then derailed over unfixable security issues with
NFS.
gull
response 5 of 51: Mark Unseen   Jan 26 18:46 UTC 2002

NFS over Internet == bad idea.
gelinas
response 6 of 51: Mark Unseen   Jan 27 00:27 UTC 2002

Could possibly be done with AFS, though.  However, there were some things in
AFS that killed this idea for Confer at UM.  I never asked about the details,
but I would guess it was a caching problem; it's kinda hard to keep current
when a file is constantly changing.
jp2
response 7 of 51: Mark Unseen   Jan 27 01:40 UTC 2002

This response has been erased.

jp2
response 8 of 51: Mark Unseen   Jan 27 01:40 UTC 2002

This response has been erased.

gelinas
response 9 of 51: Mark Unseen   Jan 27 02:02 UTC 2002

Well, I've used AFS on SunOS 4 and 5 boxes, as clients.  UM was looking to
migrate its AFS servers from AIX to Solaris; I don't know that they did,
though.  (I _should_ know, but I don't.  I _think_ they migrated.)
jep
response 10 of 51: Mark Unseen   Jan 27 04:08 UTC 2002

Revive Picolink, which worked via e-mail.  Surely no one mistrusts e-
mail as a means of transmitting data, and with the fast Internet these 
days, it would work better than it did in the 1980's.
davel
response 11 of 51: Mark Unseen   Jan 27 19:50 UTC 2002

There are lots of people who mistrust email as a means of transmitting data.
But if we're talking about Grex conferences, well, ... who are you afraid
might read it?
russ
response 12 of 51: Mark Unseen   Jan 28 00:21 UTC 2002

Re #11:  More like what might be corrupted in transit, either
accidentally or deliberately.

Going to e-mail would simply create a broken system (broken by
design) but it is reminiscent of Usenet News.  One wonders why
anyone would bother re-creating something that already exists...

Oh, a jp2 proposal.  NEVER MIND!
krj
response 13 of 51: Mark Unseen   Jan 28 01:43 UTC 2002

This sort of made sense in the pre-consumer-Internet days when 
it might have been M-net linking with Fish-net in Florida.
But in 2002 I wonder what the point is.
aruba
response 14 of 51: Mark Unseen   Jan 28 05:08 UTC 2002

I don't think it's bad, in principle, to have a common forum between the two
systems.  But I don't know enough about the technical issues to know whether
it can be implemented.
slynne
response 15 of 51: Mark Unseen   Jan 30 18:03 UTC 2002

Oh come on. Anyone on Mnet who cares anything about Grex is already here 
and vice versa. There is little point in a link. 
remmers
response 16 of 51: Mark Unseen   Jan 31 17:12 UTC 2002

Exactly.
janc
response 17 of 51: Mark Unseen   Feb 7 03:25 UTC 2002

I agree that no purpose would be served by doing this.

On the technical front:  Fronttalk.

Install the fronttalk client on M-Net and any user will be able to use it
to read and post to (if they have a grex account) the conferences on Grex,
through an interface very similar to Yapp/Picospan.  That's trivial to do.
To be able to read the M-Net conferences via fronttalk (either from M-Net
or Grex) you'd need to install backtalk on M-Net.  This is probably not
extremely difficult, since Backtalk is supposed to be able to co-exist
with Yapp.  However Backtalk's Yapp compatibility isn't fully tested,
and there are likely to be at least some issues to work out there.

Anyone wanting to know more about fronttalk is invited to read the item
in the garage conference.
mdw
response 18 of 51: Mark Unseen   Feb 12 08:43 UTC 2002

The "technical" problem with Confer in AFS is that AFS doesn't have any
exact analog to "SUID" programs.  This turns out to be a fundemental
design problem, inherent in *any* networked filesystem, and not really
the fault of AFS.  The basic problem is that, in a networked
environment, you can no longer assume that a workstation provides a
secure environment; it's possible the workstation's owner has hacked the
cache manager or other parts to their own evil ends.  NFS gets around
this problem by being mostly insecure and only slightly broken.  AFS
does actually work just fine with SunOS, and UM's Confer machine
actually had AFS and used AFS for user home directories, as well as user
passwords.
styles
response 19 of 51: Mark Unseen   Feb 24 07:18 UTC 2002

why would data files need to be suid anything?
just install the clients seperately, read/write items to/from a networked
filesystem.  nfs would blow, afs would probably work fine, coda would be cool
except from what i see i can't tell if it's been modified at any time in the
past 5 years or so.  set up ipsec (dunno how easy that would be with the
current grex, although i'm sure it wouldn't be a problem with the move to
sparc/openbsd), mount an m-net volume or m-net mount a grec volume, and poof!
there's a shared filesystem.  the big problem i see is in concurrency: the
lag will be so severe that there's the possibility that something as simple
as a slip might cause a problem, no?  i'm guessing a hack or three to get
around that (if it were to be a problem, even) wouldn't take much effort.
mdw
response 20 of 51: Mark Unseen   Feb 25 02:40 UTC 2002

Generally, the SUID bit applies to the executable, not the data file.  A
monolithic time-shared machine can guarantee the security of
executables.  A dorm full of students using AFS, some using Solaris,
some using Linux, and some using NT, can't be relied upon in the same
way.
styles
response 21 of 51: Mark Unseen   Feb 25 23:34 UTC 2002

right, i know the suid bit applies to executables.  my point is: why would
the executables need to exist within the actual net mounted filesystem?  for
instance, if both machines had a client (yapp, picospan, whatever) residing
in /usr/local/bin, and that client is setuid cfadm, what other binaries would
you need to lie on the shared filesystem?  both clients would store the data
in the same shared filesystem, and that filesystem shouldn't need *any*
executables whatever, right?  plus, even if we were to want to share
executables for whatever reason, binary executables wouldn't be compatible
(sparc <---> x86?  nope...), and shell scripts can't be setuid anything (or
at least that's been the case for a long time...dunno if grex still has setuid
scripts).  and even if there is worry, just mount the thing nosuid.

since no binaries need to reside on the shared filesystem, i see no reason
why we don't just toss that aside as irrelevant.
mdw
response 22 of 51: Mark Unseen   Feb 26 02:21 UTC 2002

The SUID only applies to the effective UID bit on the local machine.
Now, how does the fileserver know this?
styles
response 23 of 51: Mark Unseen   Feb 26 02:43 UTC 2002

how does the fileserver know what?
that the user accessing files being served actually should be accessing them
and that that user is not really someone pretending to be someone else?  it
doesn't.  it assumes just as a monolithic machine does that the euid of the
running process should actually be that euid and that no one has messed with
it maliciously.  i understand your concern, but a proper exports file along
with a proper ethers file and maybe even some firewall rules will lock things
down enough that you really don't have to worry about some random joe spoofing
m-net's or grex's ip with the goal of accessing a secluded filesystem and
doing damage to it in mind.  a cron job to back up the conference(s) residing
on that filesystem nightly onto a non-nfs-exported filesystem will ensure that
very little data will be lost in the case of a data deletion attack, however
unlikely the success of such an attack might be.

i don't think security is as much of an issue here as is concurrency.  will
the conferencing software be able to handle, say, 10 simultaneous responses
locally and remotely?  how does the software handle locking?  would the
locking semantics be somewhat different if the filesystem it's writing to is
a network filesystem?  how do we deal with time synchronization?  does the
conferencing software work exclusively with locks, or with timestamps, or with
both?
cross
response 24 of 51: Mark Unseen   Feb 26 15:51 UTC 2002

I frequently read some folks on grex saying, essentially, ``NFS is bad!
It's insecure!''  Okay, I won't debate the truth of this statement, but
I'd like to know what those folks are basing that judgement on.  How
about it, folks?  Why is NFS so bad?
 0-24   25-49   50-51        
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss