Personally I switched to using [topic=215262]the deltup way[/topic] because it does get the job done of minimizing bandwidth use, and also it is there and working


But how is it supposed to be validated? I understood your idea as following: Everybody can provide a package and create an automated fingerprint for this package, which would spread the load of work of course and make sure that the package to download and install is corresponding. But it doesn't make sure that the source that was used to build the binary don't contain backdoors or similar hacks.rafo wrote: Binary packages must be validated and that is also an essential part of the scheme. But producing the trusted fingerprints is intended to be an automated process, driven by users wishing to download particular packages compiled with particular flag settings. Once the scheme gets going there should be no manual work needed.

anello wrote:P2P (as root???) is a nightmare!!!
Code: Select all
FEATURES="sandbox usersandbox userpriv"

Packages enter portage as unstable or masked, then after at least one month they become stable.rafo wrote:Hi Matteo,
I don't follow you, why could not MD5 or similar be used to validate a downloaded binary package?
If the core isn't closed source, what prevent an hacker to hack it? I mean, you (but most likely some hacker well paid to hit the "OSS cancer"...) couldThe installation program must be trustworthy, just like any operating system component that is run with root privileges. But it should be OK if you just use the installation program that the Bonus Binary Foundry provides, and I don't see that it has to be closed source. In principle we have the same situation when we trust the "emerge" program that Gentoo provides.
Well, just the 5 flags you find in almost all packages (generally they're more) generate 32 combinations. "usual combination" is just whatThere are certainly packages that depend on many USE flags. Still, some people will install those programs with Gentoo default flags; they will then have a fair chance that there is already a binary package on the p2p network. Others will have set unusual combinations of USE flags, they will most likely find that the install program resorts to local compilation, no worse than today. Flexibility is just as great as ever.
Another reason is that open-source credit systems can be patched easily. But un-credited p2p tends to generate leechers at very big rate.If disk space is critical you may not want to offer any of it to the p2p space. However, hard disks of today are often over 100 GB in size and offering a fraction of it to the p2p space may not be a big deal at all. At the end of the day, those that don't like the sharing scheme should simply not use it.
I would hesitate to introduce a credit system unless there is really strong evidence that the scheme is abused. One reason is that vintage machines may have fairly small disks, and at the same time benefit greatly from being able to install binaries.
I doubt that it is possible. MD5 is defined in http://www.ietf.org/rfc/rfc1321.txt, where it is said: "The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest."Matteo Azzali wrote:Packages enter portage as unstable or masked, then after at least one month they become stable. This means a potential hacker has 1 month to try to change the binary archive to match the old MD5 (if MD5 is the fingerprint). Too much time to be sure that some hacker will not corrupt your binaries in the middle of the way to your computer, IMO.rafo wrote:Hi Matteo,
I don't follow you, why could not MD5 or similar be used to validate a downloaded binary package?
But think for a moment about a Gentoo "emerge". It is open source, yet we use it. By following sound operating procedures we can be confident that we don't run a hacked version of "emerge". The same reasoning goes for an install program that you download from some other organization: There are ways to be sure that what you downloaded is the program that they provide, and not a hacked version.Matteo Azzali wrote:If the core isn't closed source, what prevent an hacker to hack it? I mean, you (but most likely some hacker well paid to hit the "OSS cancer"...) could send corrupted binaries to other users, modify the mechanism of your client to not send anything to anyone (and save band) and so on.....rafo wrote: The installation program must be trustworthy, just like any operating system component that is run with root privileges. But it should be OK if you just use the installation program that the Bonus Binary Foundry provides, and I don't see that it has to be closed source. In principle we have the same situation when we trust the "emerge" program that Gentoo provides.
I know that there's plenty of good people here, but black sheeps are everywhere....
The package-building machinery of the Bonus Binary Foundry should be automated and demand driven. If many users have a certain flag combination then the BBF will be hit by many requests for binary packages with that flag combination, and so those packages will tend to be produced early on. Packages for less common flag combinations will also be produced, but it will take longer. There is no need to try and predict which flag combination is the most typical; after a while it is however possible to gather some interesting statistics.Matteo Azzali wrote:Well, just the 5 flags you find in almost all packages (generally they're more) generate 32 combinations. "usual combination" is just whatrafo wrote: There are certainly packages that depend on many USE flags. Still, some people will install those programs with Gentoo default flags; they will then have a fair chance that there is already a binary package on the p2p network. Others will have set unusual combinations of USE flags, they will most likely find that the install program resorts to local compilation, no worse than today. Flexibility is just as great as ever.
profile sets for us or some more, but I don't think there are 2 machines perfectly identical here (it's one of the advantages of gentoo)....
Also, how do you know wich flags are "usual"? We risk that most people just stick with what profile sets, and this is definitely bad for testing.