[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] [tor-relays-universities] afs / coda behind tor?
On Mon, Jan 19, 2015 at 7:39 PM, Mueller, Alex
>> has somebody an idea of the possiblity to protect afs / coda server
>> behind tor?
As a Hidden Service? Most anything TCP should be possible,
if you need UDP or to present IP binding and embedded semantics
to applications, you may want to try onioncat (at least for now), or
use a different [anonymity] network that is more IP[v6] friendly
like CJDNS or Phantom or somesuch.
As you mentioned filesystems, I'll include a recent thread below
which you may further look into...
On Fri, Jan 16, 2015 at 7:40 AM, Greg Troxel <gdt@xxxxxxxxxx> wrote:
> ianG <iang@xxxxxxxx> writes:
>> I've come up with a problem that needs a secure cloudy (handwavy) data
>> storage solution.
>> The only think I can think of is Tahoe-LAFS. I get the feeling that
>> it is the only game in town... but why not ask? Is there a plausible
>> "competitor" to Tahoe?
> Please explain your actual requirements. Tahoe does well at not
> storing plaintext and redundancy across large numbers of servers.
> However, it doesn't do well at:
> - mixing storage from different users (accounting)
> - garbage collection (expiration vs lease renewal)
> - acting like a posix filesystem (FUSE interface is weak)
> - speed
You might find something here...
I'm looking for something that will run entirely within an
anonymous p2p network, has data redundancy minimums
on the storage automatically handled by the system, some
number of redundant access points, and mounts posix-like
(nfs/zfs/iscsi/smb/cifs) for all participants. At least readonly
for everyone, and readwrite for the owner of any particular
subtree, like AFS.
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to