[tahoe-lafs-trac-stream] [tahoe-lafs] #393: mutable: implement MDMF

tahoe-lafs trac at tahoe-lafs.org
Sun Jul 31 15:49:59 PDT 2011


#393: mutable: implement MDMF
-------------------------+-------------------------------------------------
     Reporter:  warner   |      Owner:  kevan
         Type:           |     Status:  assigned
  enhancement            |  Milestone:  1.9.0
     Priority:  major    |    Version:  1.0.0
    Component:  code-    |   Keywords:  newcaps performance random-access
  mutable                |  privacy gsoc mdmf mutable backward-
   Resolution:           |  compatibility forward-compatibility review-
Launchpad Bug:           |  needed
-------------------------+-------------------------------------------------

Comment (by kevan):

 attachment:393status46.dpatch sets tighter bounds on signature key,
 verification key, share hash chain and signature size, fixes a bug I found
 in situations where {{{n = k}}} (and adds a test for that bug), resolves
 the conflict with trunk identified by davidsarah, fixes a test from #1304
 that breaks when run against MDMF, and adds tests to ensure that the new
 downloader can handle old SDMF shares. I've also performed other
 interoperability testing between the old and new mutable file code,
 confirming that the old downloader can read SDMF files written by the new
 publisher, that the new downloader can read files published by the new
 publisher and modified by the old code, and that the old downloader can
 read files modified by the new publisher.

 warner: During one of the first phonecalls, you mentioned that you were
 worried that the update process could fetch more data than necessary to
 update a segment near the end of the file, I think. My notes on that issue
 are sketchy; could you elaborate on your concerns there, if you remember
 what they are?

 The signature, verification key, and signing key bounds are kind of iffy,
 in that they come from simulation (repeating the key generation and
 signature operations as the publisher would perform them thousands of
 times and observing the size of the output) rather than something more
 concrete (e.g., a property of the cryptosystem, or something in cryptopp
 that we don't think will change). Unfortunately, I haven't had time to dig
 deeply into the issue to find more reassuring explanations for those
 bounds yet. I'll probably have some time over the next week for that, but
 if someone else wants to give it a try in the meantime, feel free.

-- 
Ticket URL: <http://tahoe-lafs.org/trac/tahoe-lafs/ticket/393#comment:99>
tahoe-lafs <http://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list