hi
has somebody an idea of the possiblity to protect afs / coda server behind tor?
thanks greetings alex
On Mon, Jan 19, 2015 at 7:39 PM, Mueller, Alex alex.mueller@lrz.tu-muenchen.de wrote:
has somebody an idea of the possiblity to protect afs / coda server behind tor?
As a Hidden Service? Most anything TCP should be possible, if you need UDP or to present IP binding and embedded semantics to applications, you may want to try onioncat (at least for now), or use a different [anonymity] network that is more IP[v6] friendly like CJDNS or Phantom or somesuch.
http://en.wikipedia.org/wiki/OpenAFS http://www.openafs.org/ https://www.onioncat.org/
As you mentioned filesystems, I'll include a recent thread below which you may further look into...
======== On Fri, Jan 16, 2015 at 7:40 AM, Greg Troxel gdt@ir.bbn.com wrote:
ianG iang@iang.org writes:
grarpamp wrote:
I've come up with a problem that needs a secure cloudy (handwavy) data storage solution.
The only think I can think of is Tahoe-LAFS. I get the feeling that it is the only game in town... but why not ask? Is there a plausible "competitor" to Tahoe?
Please explain your actual requirements. Tahoe does well at not storing plaintext and redundancy across large numbers of servers. However, it doesn't do well at:
- mixing storage from different users (accounting)
- garbage collection (expiration vs lease renewal)
- acting like a posix filesystem (FUSE interface is weak)
- speed
You might find something here... https://en.wikipedia.org/wiki/MaidSafe https://en.wikipedia.org/wiki/Comparison_of_file_sharing_applications https://en.wikipedia.org/wiki/Anonymous_P2P https://en.wikipedia.org/wiki/Comparison_of_distributed_file_systems https://en.wikipedia.org/wiki/List_of_file_systems#Distributed_file_systems
I'm looking for something that will run entirely within an anonymous p2p network, has data redundancy minimums on the storage automatically handled by the system, some number of redundant access points, and mounts posix-like (nfs/zfs/iscsi/smb/cifs) for all participants. At least readonly for everyone, and readwrite for the owner of any particular subtree, like AFS. ========
thanks, very good and usfull response.. the problem was realy the vpn version.. as an hidden service.. i give the advice a try
Am 2015-01-20 02:16, schrieb grarpamp:
On Mon, Jan 19, 2015 at 7:39 PM, Mueller, Alex alex.mueller@lrz.tu-muenchen.de wrote:
has somebody an idea of the possiblity to protect afs / coda server behind tor?
As a Hidden Service? Most anything TCP should be possible, if you need UDP or to present IP binding and embedded semantics to applications, you may want to try onioncat (at least for now), or use a different [anonymity] network that is more IP[v6] friendly like CJDNS or Phantom or somesuch.
http://en.wikipedia.org/wiki/OpenAFS http://www.openafs.org/ https://www.onioncat.org/
As you mentioned filesystems, I'll include a recent thread below which you may further look into...
======== On Fri, Jan 16, 2015 at 7:40 AM, Greg Troxel gdt@ir.bbn.com wrote:
ianG iang@iang.org writes:
grarpamp wrote:
I've come up with a problem that needs a secure cloudy (handwavy) data storage solution.
The only think I can think of is Tahoe-LAFS. I get the feeling that it is the only game in town... but why not ask? Is there a plausible "competitor" to Tahoe?
Please explain your actual requirements. Tahoe does well at not storing plaintext and redundancy across large numbers of servers. However, it doesn't do well at:
- mixing storage from different users (accounting)
- garbage collection (expiration vs lease renewal)
- acting like a posix filesystem (FUSE interface is weak)
- speed
You might find something here... https://en.wikipedia.org/wiki/MaidSafe https://en.wikipedia.org/wiki/Comparison_of_file_sharing_applications https://en.wikipedia.org/wiki/Anonymous_P2P https://en.wikipedia.org/wiki/Comparison_of_distributed_file_systems https://en.wikipedia.org/wiki/List_of_file_systems#Distributed_file_systems
I'm looking for something that will run entirely within an anonymous p2p network, has data redundancy minimums on the storage automatically handled by the system, some number of redundant access points, and mounts posix-like (nfs/zfs/iscsi/smb/cifs) for all participants. At least readonly for everyone, and readwrite for the owner of any particular subtree, like AFS. ======== _______________________________________________ tor-relays-universities mailing list tor-relays-universities@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays-universitie...
tor-relays-universities@lists.torproject.org