[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] [tor-relays-universities] afs / coda behind tor?
- To: "Tor relay ops at universities, colleges, and other education institutions." <tor-relays-universities@xxxxxxxxxxxxxxxxxxxx>
- Subject: Re: [tor-talk] [tor-relays-universities] afs / coda behind tor?
- From: "Mueller, Alex" <alex.mueller@xxxxxxxxxxxxxxxxxx>
- Date: Tue, 20 Jan 2015 05:04:26 +0100
- Cc: cypherpunks@xxxxxxxxxx, tor-talk@xxxxxxxxxxxxxxxxxxxx
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Mon, 19 Jan 2015 23:04:41 -0500
- In-reply-to: <CAD2Ti292bYi3Cy-0NysOVaMZ8Sv-Butk1gHZPaHCDUCJ+_qb1Q@xxxxxxxxxxxxxx>
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:firstname.lastname@example.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:email@example.com>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:firstname.lastname@example.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:email@example.com?subject=unsubscribe>
- References: <mailman.354.1421713268.3013.tor-relays-universities@xxxxxxxxxxxxxxxxxxxx> <d23ecf59633cee85fff622965c67ce6c@xxxxxxxxxxxxxxxx> <CAD2Ti292bYi3Cy-0NysOVaMZ8Sv-Butk1gHZPaHCDUCJ+_qb1Q@xxxxxxxxxxxxxx>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Roundcube Webmail/1.0.2
thanks, very good and usfull response..
the problem was realy the vpn version..
as an hidden service..
i give the advice a try
Am 2015-01-20 02:16, schrieb grarpamp:
On Mon, Jan 19, 2015 at 7:39 PM, Mueller, Alex
has somebody an idea of the possiblity to protect afs / coda server
As a Hidden Service? Most anything TCP should be possible,
if you need UDP or to present IP binding and embedded semantics
to applications, you may want to try onioncat (at least for now), or
use a different [anonymity] network that is more IP[v6] friendly
like CJDNS or Phantom or somesuch.
As you mentioned filesystems, I'll include a recent thread below
which you may further look into...
On Fri, Jan 16, 2015 at 7:40 AM, Greg Troxel <gdt@xxxxxxxxxx> wrote:
ianG <iang@xxxxxxxx> writes:
I've come up with a problem that needs a secure cloudy (handwavy)
The only think I can think of is Tahoe-LAFS. I get the feeling that
it is the only game in town... but why not ask? Is there a plausible
"competitor" to Tahoe?
Please explain your actual requirements. Tahoe does well at not
storing plaintext and redundancy across large numbers of servers.
However, it doesn't do well at:
- mixing storage from different users (accounting)
- garbage collection (expiration vs lease renewal)
- acting like a posix filesystem (FUSE interface is weak)
You might find something here...
I'm looking for something that will run entirely within an
anonymous p2p network, has data redundancy minimums
on the storage automatically handled by the system, some
number of redundant access points, and mounts posix-like
(nfs/zfs/iscsi/smb/cifs) for all participants. At least readonly
for everyone, and readwrite for the owner of any particular
subtree, like AFS.
tor-relays-universities mailing list
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to