⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 beyond43.ms

📁 早期freebsd实现
💻 MS
📖 第 1 页 / 共 2 页
字号:
has recently become operational, increasing the complexityof the network connectivity.Both Internet and local routing algorithms are showing the strainof continued growth.We have made several changes in the local routing algorithmto keep accommodating the current topology,and are participating in the development of new routing algorithmsand standard protocols..PPRecent work in collaboration with Van Jacobson of the Lawrence BerkeleyLaboratory has led to the design and implementation of several new algorithmsfor TCP that improve throughput on both local and long-haul networkswhile reducing unnecessary retransmission.The improvement is especially striking when connections must traverseslow and/or lossy networks.The new algorithms include ``slow-start,''a technique for opening the TCP flow control window slowlyand using the returning stream of acknowledgements as a clockto drive the connection at the highest speed tolerated by the interveningnetwork.A modification of this technique allows the sender to dynamically modifythe send window size to adjust to changing network conditions.In addition, the round-trip timer has been modified to estimate the variancein round-trip time, thus allowing earlier retransmission of lost packetswith less spurious retransmission due to increasing network delay.Along with a scheme proposed by Phil Karn of Bellcore,these changes reduce unnecessary retransmission over difficult pathssuch as Satnet by nearly two orders of magnitudewhile improving throughput dramatically..PPThe current TCP implementation is now being readiedfor more widespread distribution via the network and as a standard Berkeley distribution unencumbered by any commercial licensing.We are continuing to refine the TCP and IP implementationsusing the ARPANET, BARRNet, the NSF networkand local campus nets as testbeds.In addition, we are incorporating applicable algorithms from this workinto the TP-4 protocol implementation..NH 2Toward a Compatible File System Interface.PPThe most critical shortcoming of the 4.3BSD UNIX system was in thearea of distributed file systems.As with networking protocols,there is no single distributed file systemthat provides sufficient speed and functionality for all problems.It is frequently necessary to support several different remotefile system protocols, just as it is necessary to run several different network protocols..PPAs network or remote file systems have been implemented for UNIX,several stylized interfaces between the file system implementationand the rest of the kernel have been developed.Among these are Sun Microsystems' Virtual File System interface (VFS)using \fBvnodes\fP [Sandburg85] [Kleiman86],Digital Equipment's Generic File System (GFS) architecture [Rodriguez86],AT&T's File System Switch (FSS) [Rifkin86],the LOCUS distributed file system [Walker85],and Masscomp's extended file system [Cole85].Other remote file systems have been implemented in research oruniversity groups for internal use,notably the network file system in the Eighth Edition UNIXsystem [Weinberger84] and two different file systems used at Carnegie MellonUniversity [Satyanarayanan85].Numerous other remote file access methods have been devised for usewithin individual UNIX processes,many of them by modifications to the C I/O librarysimilar to those in the Newcastle Connection [Brownbridge82]..PPEach design attempts to isolate file system-dependent detailsbelow a generic interface and to provide a framework within whichnew file systems may be incorporated.However, each of these interfaces is different fromand incompatible with the others.Each addresses somewhat different design goals,having been based on a different version of UNIX,having targeted a different set of file systems with varying characteristics,and having selected a different set of file system primitive operations..PPOur effort in this area is aimed at providing a common framework tosupport these different distributed file systems simultaneously rather than tosimply implement yet another protocol.This requires a detailed study of the existing protocols, and discussion with their implementors to determine whetherthey could modify their implementation to fit within our proposedframework.  We have studied the various file system interfaces to determinetheir generality, completeness, robustness, efficiency, and aestheticsand are currently working on a file system interfacethat we believe includes the best features ofeach of the existing implementations.This work and the rationale underlying its developmenthave been presented to major software vendors as an early steptoward convergence on a standard compatible file system interface.Briefly, the proposal adopts the 4.3BSD calling convention for filename lookup but otherwise is closely related to Sun's VFSand DEC's GFS. [Karels86]..NH 2System Security.PPThe recent invasion of the DARPA Internet by a quickly reproducing ``worm''highlighted the need for a thorough review of the accesssafeguards built into the system.Until now, we have taken a passive approach to dealing withweaknesses in the system access mechanisms, rather than activelysearching for possible weaknesses.When we are notified of a problem or loophole in a system utilityby one of our users,we have a well defined procedure for fixing the problem and expeditiously disseminating the fix to the BSD mailing list.This procedure has proven itself to be effective insolving known problems as they arise(witness its success in handling the recent worm).However, we feel that it would be useful to take a more activerole in identifying problems before they are reported (or exploited).We will make a complete audit of the systemutilities and network servers to find unintended system access mechanisms..PPAs a part of the work to make the system more resistant to attackfrom local users or via the network, it will be necessary to produceadditional documentation on the configuration and operation of the system.This documentation will cover such topics as file and directory ownershipand access, network and server configuration,and control of privileged operations such as file system backups..PPWe are investigating the addition of access control lists (ACLs) forfilesystem objects.ACLs provide a much finer granularity of control over file access permissionsthan the currentdiscretionary access control mechanism (mode bits).Furthermore, they are necessaryin environments where C2 level security or better, as defined in the DoDTCSEC [DoD83], is required.The POSIX P1003.6 security group has made notable progress in determininghow an ACL mechanism should work, and several vendors have implementedACLs for their commercial systems.Berkeley will investigate the existing implementations and determinehow to best integrate ACLs with the existing mechanism..PPA major shortcoming of the present system is that authenticationover the network is based solely on the privileged port mechanismbetween trusting hosts and users.Although privileged ports can only be created by processes running as rooton a UNIX system,such processes are easy for a workstation user to obtain;they simply reboot their workstation in single user mode.Thus, a better authentication mechanism is needed.At present, we believe that the MIT Kerberos authenticationserver [Steiner88] provides the best solution to this problem.We propose to investigate Kerberos further as well as otherauthentication mechanisms and then to integratethe best one into Berkeley UNIX.Part of this integration would be the addition of theauthentication mechanism into utilities such astelnet, login, remote shell, etc.We will add support for telnet (eventually replacing rlogin),the X window system, and the mail system within an authenticationdomain (a Kerberos \fIrealm\fP).We hope to replace the existing password authentication on each hostwith the network authentication system..NHReferences.sp.IP Brownbridge82Brownbridge, D.R., L.F. Marshall, B. Randell,``The Newcastle Connection, or UNIXes of the World Unite!,''\fISoftware\- Practice and Experience\fP, Vol. 12, pp. 1147-1162, 1982..sp.IP Cole85.brCole, C.T., P.B. Flinn, A.B. Atlas,``An Implementation of an Extended File System for UNIX,''\fIUsenix Conference Proceedings\fP,pp. 131-150, June, 1985..sp.IP DoD83.brDepartment of Defense,``Trusted Computer System Evaluation Criteria,''\fICSC-STD-001-83\fP,DoD Computer Security Center, August, 1983..sp.IP Karels86Karels, M., M. McKusick,``Towards a Compatible File System Interface,''\fIProceedings of the European UNIX Users Group Meeting\fP,Manchester, England, pp. 481-496, September 1986..sp.IP Kleiman86Kleiman, S.,``Vnodes: An Architecture for Multiple File System Types in Sun UNIX,''\fIUsenix Conference Proceedings\fP,pp. 238-247, June, 1986..sp.IP Leffler84Leffler, S., M.K. McKusick, M. Karels,``Measuring and Improving the Performance of 4.2BSD,''\fIUsenix Conference Proceedings\fP, pp. 237-252, June, 1984..sp.IP McKusick84McKusick, M.K., W. Joy, S. Leffler, R. Fabry,``A Fast File System for UNIX'',\fIACM Transactions on Computer Systems 2\fP, 3.pp 181-197, August 1984..sp.IP McKusick85McKusick, M.K., M. Karels, S. Leffler,``Performance Improvements and Functional Enhancements in 4.3BSD,''\fIUsenix Conference Proceedings\fP, pp. 519-531, June, 1985..sp.IP McKusick86McKusick, M.K., M. Karels,``A New Virtual Memory Implementation for Berkeley UNIX,''\fIProceedings of the European UNIX Users Group Meeting\fP,Manchester, England, pp. 451-460, September 1986..sp.IP McKusick88McKusick, M.K., M. Karels,``Design of a General Purpose Memory Allocator for the 4.3BSD UNIX Kernel,''\fIUsenix Conference Proceedings\fP,pp. 295-303, June, 1988..sp.IP Rifkin86Rifkin, A.P., M.P. Forbes, R.L. Hamilton, M. Sabrio, S. Shah, K. Yueh,``RFS Architectural Overview,'' \fIUsenix Conference Proceedings\fP,pp. 248-259, June, 1986..sp.IP Rodriguez86Rodriguez, R., M. Koehler, R. Hyde,``The Generic File System,''\fIUsenix Conference Proceedings\fP,pp. 260-269, June, 1986..sp.IP Sandberg85Sandberg, R., D. Goldberg, S. Kleiman, D. Walsh, B. Lyon,``Design and Implementation of the Sun Network File System,''\fIUsenix Conference Proceedings\fP,pp. 119-130, June, 1985..sp.IP Satyanarayanan85Satyanarayanan, M., \fIet al.\fP,``The ITC Distributed File System: Principles and Design,''\fIProc. 10th Symposium on Operating Systems Principles\fP, pp. 35-50,ACM, December, 1985..sp.IP Steiner88Steiner, J., C. Newman, J. Schiller,``\fIKerberos:\fP An Authentication Service for Open Network Systems,''\fIUsenix Conference Proceedings\fP, pp. 191-202, February, 1988..sp.IP Walker85Walker, B.J. and S.H. Kiser, ``The LOCUS Distributed File System,''\fIThe LOCUS Distributed System Architecture\fP,G.J. Popek and B.J. Walker, ed., The MIT Press, Cambridge, MA, 1985..sp.IP Weinberger84Weinberger, P.J., ``The Version 8 Network File System,''\fIUsenix Conference presentation\fP,June, 1984.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -