Re: [tahoe-dev] notes from the Tahoe-LAFS Weekly Dev Call, 2012-09-11

2012-09-12 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/09/12 21:57, Brian Warner wrote: > Padding isn't too hard to explain ("we expose 8*ceil(len/8)"), but > the privacy value it provides is dubious: an active attacker can > still detect single-byte variations if they can get you to start > close to

Re: [tahoe-dev] split brain? how handled in tahoe -- docs?

2012-08-08 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/08/12 08:57, Tony Arcieri wrote: > These are the only two options. For those who desire > "reliability", these are the only buckets that reliability can be > segmented into. So far I have not heard *any* good arguments > towards strong consistenc

Re: [tahoe-dev] split brain? how handled in tahoe -- docs?

2012-08-07 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I don't think there would be any lost data if you followed erpo41's suggestion and set H higher than half the number of storage nodes. In the event of a partition there would be at most one component with H or more nodes, where writes would succeed; al

Re: [tahoe-dev] Invitation protocol

2012-07-26 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 14/07/12 00:11, Brian Warner wrote: > I'm most interested in using the invitation code to also > *establish* a channel, since for things like Tahoe, there's nothing > to bootstrap from. If the Tahoe client were also an IRC client, or > an MUA, then

Re: [tahoe-dev] switching from introducers to gossip?

2012-07-12 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/07/12 01:54, erp...@gmail.com wrote: > Could Bob choose his own node as the rendezvous point, totally > eliminating the load on the tor network? I guess that could be useful in situations where Bob can receive incoming TCP connections, Alice ca

Re: [tahoe-dev] Invitation protocol

2012-07-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Brian, Thanks for the links to Hoepman, Payrin and Vaudenay - very useful! On 02/07/12 03:35, Brian wrote: > So, I'm looking for some compromise.. something that is generally > secure enough, but usable enough to actually get used (which, in my >

Re: [tahoe-dev] switching from introducers to gossip?

2012-07-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/07/12 14:02, James A. Donald wrote: >> It seems people are only aware of the last feature because of >> the poorly chosen name. IMO, the "hidden" aspect is one of the >> less interesting features. I've heard a rumor that there's a >> proposal t

Re: [tahoe-dev] Invitation protocol

2012-06-14 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 13/06/12 07:59, Brian Warner wrote: > Assuming that Alice and Bob have some way to transfer 16 bytes > securely is part practicality and part pragmatism. The practical > part is that a targeted attacker (one who knows Alice and Bob and > specificall

Re: [tahoe-dev] Invitation protocol

2012-06-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Brian, You assume the invitation code remains secret until Alice and Bob have completed the protocol, but may be discovered later. Is that a safe assumption for email, IM, postcards, etc? Later, in the attacks section, you assume Mallory can eavesd

Re: [tahoe-dev] Newbie installation notes

2012-05-15 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi David-Sarah, Thanks for the quick reply - responses inline. On 14/05/12 02:35, David-Sarah Hopwood wrote: > On 13/05/12 08:55, Michael Rogers wrote: >> Hi all, >> >> Here are a few notes I made while trying out version 1.8.2

[tahoe-dev] Newbie installation notes

2012-05-13 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all, Here are a few notes I made while trying out version 1.8.2 of Tahoe-LAFS. I thought a newbie's perspective on the setup process might be useful. I apologise if any of these are out of date, they're from last September. 1. On Ubuntu, 'python s

Re: [tahoe-dev] erasure coding makes files more fragile, not less

2012-03-28 Thread Michael Rogers
On 28/03/12 21:54, Brian Warner wrote: > Yes, the math in our provisioning/reliability tool describes a somewhat > unrealistic model with the usual because-it-makes-the-math-easier > assumptions (Poisson processes, independent identically-distributed > failures). Should we get rid of it? No, I thin