lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080313163431.7b4058ef@cuia.boston.redhat.com>
Date:	Thu, 13 Mar 2008 16:34:31 -0400
From:	Rik van Riel <riel@...hat.com>
To:	Daniel Phillips <phillips@...nq.net>
Cc:	Willy Tarreau <w@....eu>, Chris Friesen <cfriesen@...tel.com>,
	Lars Marowsky-Bree <lmb@...e.de>,
	Alan Cox <alan@...rguk.ukuu.org.uk>,
	Grzegorz Kulewski <kangur@...com.net>,
	linux-kernel@...r.kernel.org
Subject: Re: [ANNOUNCE] Ramback: faster than a speeding bullet

On Wed, 12 Mar 2008 00:17:56 -0800
Daniel Phillips <phillips@...nq.net> wrote:

> So we have a flock of people arguing that you can't trust Linux.  Well
> maybe there are situations were you can't, but what can you trust?
> Disk firmware?  Bios?  Big maybes everywhere.

The traditional and proven method to constructing a reliable system is
to assume that no component can be fully trusted.  This is especially
true for new code.

By being paranoid about everything, failures in one component are
usually contained well enough that one failure is not catastrophic.

In order for ramback to get appeal with the people who are paranoid
about data integrity (probably a vast majority of users), you will
need some guarantees about flush order, etc...

-- 
All Rights Reversed
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ