On 19/05/2010 16:23, Nicolas Williams wrote:
On Wed, May 19, 2010 at 02:14:40PM +0100, Darren J Moffat wrote:
I really have only one comment and that is about integrity
protection of the on disk format.

[...]

Is there really a risk here ?

Compare this to what ZFS does.  It uses a Merkle tree of checksums
going all they way back to the uberblock.

Merkle trees are really cool, and nowadays very popular: ZFS, Git,
CouchDB and others all use them.  But just because you have a
spectacularly cool hammer...

Indeed, which is why I'm asking if there is a risk first!

Integrity protection here could best be handled by ZFS, and by using a
snapshot to access the on-disk repo.  Granted, that would mean that
IPS on systems that don't support ZFS would lack integrity protection,
just like most applications.  I think that'd be acceptable for the
forseeable future.

That assume the on-disk repo is actually on a local never mind ZFS. It could be getting accessed over NFS of http. https is certainly an option as is using Kerberos for NFS to provide a transport layer protection.

Also, what is to be defended against?  Here, IMO: data corruption due to
bad hw -- ZFS is plenty good enough at that; there's no need to
replicate ZFS' integrity protection.

Maybe nothing if we assume the package contents themselves are signed - and if they aren't I don't see any benefit in doing anything additional in the on-disk repo format. It may well be that there is nothing worth defending against that isn't already addressed by the signed package contents.

--
Darren J Moffat
_______________________________________________
pkg-discuss mailing list
pkg-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/pkg-discuss

Reply via email to