How about ACL(user id) + (user password or USB security device or external security token) as decryption key?rdos wrote:Might be so, but the users lists probably is in an ordinary file. If the ACL-less OS knows about the ACL-using OS ways of handling these ACL, it could simulate everything, including user login, and just discard any restrictions setup. Unless the file contents use keys that include the passwords, but then you cannot change passwords without recrypting file contents.bluemoon wrote:Some system uses ACL as key for "one-way" decryption, unless you have a supercomputer to crack it.
It would be really nice to have a couple of these ACL-using filesystems in RDOS, and just multiboot to be able to read anything without restrictions.
Suggest the "best" FS
Re: Suggest the "best" FS
-
- Member
- Posts: 81
- Joined: Wed Nov 09, 2011 2:21 am
- Location: Behind a keyboard located in The Netherlands
Re: Suggest the "best" FS
That is a personal experience, I know i've used Reiser plenty of times but it doesn't fit the profile of what one wants for a NFS system.brain wrote:while on the subject of cleanup tools, beware of some things regarding reiser, at least version 3.
I used reiser 3 for quite some time on linux and i never will use it or any later version ever again. My friends told me it was amazing in performance and reliable etc. Well one day my system powered off unexpectedly due to power failure and upon powering back up i had a software disk error, e.g. corrupted filesystem.
So i ran fsck on the disk and it gave up 40 minutes later, saying something like:
fsck.reiser cant fix this disk. only a certain subset of errors in the inode tree can be fixed. if you want to you can call our premium support line on <blah> which is charged at $3 per minute.
Needless to say, i went to my backup cursing reiser and never ever used it again.
If you are implementing it, be aware of these reliability issues and code a BETTER recovery tool!!!
Reiser is perfect when you have thousands of small files.
I would cache a file index in RAM and check which files system has a low latency and high through put.
Re: Suggest the "best" FS
That's called soft-update. See http://en.wikipedia.org/wiki/Soft_updatesrdos wrote:I would prefer a FS that never needs recovery, regardless of when I turn-off my computer.
As for the OP: why don't you design your own fs? Isn't this OS writing is all about? Rolling your own?
I did not find any fs that would meet my needs, so I've designed my own, here's a brief list of features:
- unlimited storage capacity (several million yotabytes, up to 2^330 bytes)
- unlimited file size (with 4096 sector size 2^76 bytes, up to 2^128 bytes)
- unlimited number of files and directories, dynamic inode allocation
- scales really well (random access in a 1MiB file requires 1 plus sector read, in 8TiB only 4 plus reads)
- very small footprint (fs meta info requires averagely less than 5%, but scales in inverse ratio to storage size)
- data integrity (system blocks have internal checksums, data sectors external)
- resistant to fragmentation (random access in a new file is the same as in a file that modified thousand times)
- per file snapshots, recoverable history up to 6 versions
- copy on write allocation for each version
- supports extended file information (key+value database in BSON format)*
- directory entries are fixed in size and ordered, ideal for fast logarithmic search
- consistent directory hierarchy (made after FHS)
- stores mime type of content along with file
- encryption support*
- mixes win, unix and vms style paths
- disk pool and RAID support*
- clear soft-update api
(* not fully implemented yet, only partial support)
Re: Suggest the "best" FS
The general understanding of system security is that, if a person has control of the boot sequence, there is nothing you can do to keep your system secure.rdos wrote:What exactly is the point of ACLs if you can multiboot the machine with an OS that supports the FS but not the ACLs?
You should know that.
Every good solution is obvious once you've found it.
Re: Suggest the "best" FS
To get control of the boot process all you need to do is to load a bootable CD/DVD/floppy, and possibly change BIOS to make it boot. If FS security was simply this, why bother with requiring users to authenticate?Solar wrote:The general understanding of system security is that, if a person has control of the boot sequence, there is nothing you can do to keep your system secure.rdos wrote:What exactly is the point of ACLs if you can multiboot the machine with an OS that supports the FS but not the ACLs?
You should know that.
- amd64pager
- Member
- Posts: 73
- Joined: Fri Nov 25, 2011 8:27 am
- Location: In the 266 squadron of the RFC,near Maranique in the Southern Front in the WW1
Re: Suggest the "best" FS
The ACLs are supposed to be set in the firmware.
Would you like any more features?
Would you like any more features?
It's surprising what the semiconductor industry's definition of macro is and what the CS description is.
Re: Suggest the "best" FS
Alas, it appears you don't know.rdos wrote:To get control of the boot process all you need to do is to load a bootable CD/DVD/floppy, and possibly change BIOS to make it boot. If FS security was simply this, why bother with requiring users to authenticate?Solar wrote:The general understanding of system security is that, if a person has control of the boot sequence, there is nothing you can do to keep your system secure.
You should know that.
No file system feature whatsoever can reliably prevent a system from being hacked by someone who has physical access to a system.
That's a generally accepted fact of system security design, and the reason why stuff like locked server rooms and Intrusion Detection exist.
Every good solution is obvious once you've found it.
Re: Suggest the "best" FS
UEFI's secure boot is trying to prevent this however, by making it a requirement for everything to be cryptographically signed. In a perfect world, it would work. Unfortunately, the UEFI spec is ~2200 pages long, and there's bound to be a bug in there somewhere.
As for as file systems worth implementing for a NAS system, today I watched a conference presentation by one of the folks developing btrfs, which looks really cool. It would most likely be a tonne of implementation work, but it supports a huge featureset: different RAID levels for different individual files, copy-on-write, subvolumes, and much more. Worth looking into using some of the feature ideas, at the very least.
As for as file systems worth implementing for a NAS system, today I watched a conference presentation by one of the folks developing btrfs, which looks really cool. It would most likely be a tonne of implementation work, but it supports a huge featureset: different RAID levels for different individual files, copy-on-write, subvolumes, and much more. Worth looking into using some of the feature ideas, at the very least.
- gravaera
- Member
- Posts: 737
- Joined: Tue Jun 02, 2009 4:35 pm
- Location: Supporting the cause: Use \tabs to indent code. NOT \x20 spaces.
Re: Suggest the "best" FS
If a firmware rootkit has installed itself on your board, no number of signed checks can stop it from rooting your system. It's a firmware rootkit. Even if somehow the signing and everything were impenetrable (they most certainly are not), the very first SMI would invalidate all of that "chain of trust" mess and...root the system. Secure boot is nonsense.JackScott wrote:...
In a perfect world, it would work. ...
Firmware rootkits are highly specific and are used in very sohpisticated attacks on chosen targets. A general purpose OS like Windows has no business trying to weasel itself in there acting like it has relevance somewhere in the fray. For example, where does windows' secure boot fit into the Stuxnet attacks on Iran? And if they had been using Windows on the machines, and Secure boot was implemented back then, what difference would it have made? None. Stuxnet was a highly specific firmware rootkit. I don't know if MS has changed their approach to promoting it, but they seemed to be using that "firmware rootkit" buzzword a lot at first.
17:56 < sortie> Paging is called paging because you need to draw it on pages in your notebook to succeed at it.