Delivery-Date: Mon, 19 Jan 2015 23:04:41 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 6D6F71E0BEF
	for <archiver@seul.org>; Mon, 19 Jan 2015 23:04:39 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B135C32D31;
	Tue, 20 Jan 2015 04:04:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5D64B32CE8
 for <tor-talk@lists.torproject.org>; Tue, 20 Jan 2015 04:04:31 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id W_p5lWqlx44A for <tor-talk@lists.torproject.org>;
 Tue, 20 Jan 2015 04:04:31 +0000 (UTC)
Received: from postout2.mail.lrz.de (postout2.mail.lrz.de
 [IPv6:2001:4ca0:0:103::81bb:ff8a])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 0EEBC326FE
 for <tor-talk@lists.torproject.org>; Tue, 20 Jan 2015 04:04:30 +0000 (UTC)
Received: from lxmhs52.srv.lrz.de (localhost [127.0.0.1])
 by postout2.mail.lrz.de (Postfix) with ESMTP id 3kRGTR5zFXzyRS;
 Tue, 20 Jan 2015 05:04:27 +0100 (CET)
X-Virus-Scanned: by amavisd-new at lrz.de in lxmhs52.srv.lrz.de
Received: from postout2.mail.lrz.de ([127.0.0.1])
 by lxmhs52.srv.lrz.de (lxmhs52.srv.lrz.de [127.0.0.1]) (amavisd-new,
 port 20024)
 with LMTP id MYRcx1WR_r-J; Tue, 20 Jan 2015 05:04:26 +0100 (CET)
Received: from roundcube.lrz.de (roundcube.lrz.de
 [IPv6:2001:4ca0:0:103::81bb:ff93])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by postout2.mail.lrz.de (Postfix) with ESMTPSA id 3kRGTQ3V58zyRR;
 Tue, 20 Jan 2015 05:04:26 +0100 (CET)
Received: from [85.183.90.199] by roundcube.lrz.de
 with HTTP (HTTP/1.1 POST); Tue, 20 Jan 2015 05:04:26 +0100
MIME-Version: 1.0
Date: Tue, 20 Jan 2015 05:04:26 +0100
From: "Mueller, Alex" <alex.mueller@lrz.tu-muenchen.de>
To: "Tor relay ops at universities, colleges, and other education
 institutions." <tor-relays-universities@lists.torproject.org>
In-Reply-To: <CAD2Ti292bYi3Cy-0NysOVaMZ8Sv-Butk1gHZPaHCDUCJ+_qb1Q@mail.gmail.com>
References: <mailman.354.1421713268.3013.tor-relays-universities@lists.torproject.org>
 <d23ecf59633cee85fff622965c67ce6c@roundcube.lrz.de>
 <CAD2Ti292bYi3Cy-0NysOVaMZ8Sv-Butk1gHZPaHCDUCJ+_qb1Q@mail.gmail.com>
Message-ID: <24b945252eadb0692a6ce4bef01a74d9@roundcube.lrz.de>
X-Sender: alex.mueller@lrz.tu-muenchen.de
User-Agent: Roundcube Webmail/1.0.2
Cc: cypherpunks@cpunks.org, tor-talk@lists.torproject.org
Subject: Re: [tor-talk]
 =?utf-8?q?=5Btor-relays-universities=5D_afs_/_coda_beh?=
 =?utf-8?q?ind_tor=3F?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

thanks, very good and usfull response..
the problem was realy the vpn version..
as an hidden service..
i give the advice a try


Am 2015-01-20 02:16, schrieb grarpamp:
> On Mon, Jan 19, 2015 at 7:39 PM, Mueller, Alex
> <alex.mueller@lrz.tu-muenchen.de> wrote:
>>> has somebody an idea of the possiblity to protect afs / coda server
>>> behind tor?
> 
> As a Hidden Service? Most anything TCP should be possible,
> if you need UDP or to present IP binding and embedded semantics
> to applications, you may want to try onioncat (at least for now), or
> use a different [anonymity] network that is more IP[v6] friendly
> like CJDNS or Phantom or somesuch.
> 
> http://en.wikipedia.org/wiki/OpenAFS
> http://www.openafs.org/
> https://www.onioncat.org/
> 
> As you mentioned filesystems, I'll include a recent thread below
> which you may further look into...
> 
> ========
> On Fri, Jan 16, 2015 at 7:40 AM, Greg Troxel <gdt@ir.bbn.com> wrote:
>> ianG <iang@iang.org> writes:
> grarpamp wrote:
>>> I've come up with a problem that needs a secure cloudy (handwavy) 
>>> data
>>> storage solution.
>>> 
>>> The only think I can think of is Tahoe-LAFS.  I get the feeling that
>>> it is the only game in town... but why not ask?  Is there a plausible
>>> "competitor" to Tahoe?
>> 
>> Please explain your actual requirements.    Tahoe does well at not
>> storing plaintext and redundancy across large numbers of servers.
>> However, it doesn't do well at:
>>   - mixing storage from different users (accounting)
>>   - garbage collection (expiration vs lease renewal)
>>   - acting like a posix filesystem (FUSE interface is weak)
>>   - speed
> 
> You might find something here...
> https://en.wikipedia.org/wiki/MaidSafe
> https://en.wikipedia.org/wiki/Comparison_of_file_sharing_applications
> https://en.wikipedia.org/wiki/Anonymous_P2P
> https://en.wikipedia.org/wiki/Comparison_of_distributed_file_systems
> https://en.wikipedia.org/wiki/List_of_file_systems#Distributed_file_systems
> 
> I'm looking for something that will run entirely within an
> anonymous p2p network, has data redundancy minimums
> on the storage automatically handled by the system, some
> number of redundant access points, and mounts posix-like
> (nfs/zfs/iscsi/smb/cifs) for all participants. At least readonly
> for everyone, and readwrite for the owner of any particular
> subtree, like AFS.
> ========
> _______________________________________________
> tor-relays-universities mailing list
> tor-relays-universities@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays-universities
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

