*** empty log message ***

svn path=/trunk/boinc/; revision=2111
This commit is contained in:
Karl Chen 2003-08-15 01:05:56 +00:00
parent 965391e944
commit 27a28556c7
3 changed files with 21 additions and 20 deletions

View File

@ -5744,7 +5744,7 @@ Karl 2003/08/14
_autosetup, aclocal.m4, config.h.in (added)
depcomp, install-sh, missing, mkinstalldirs (added)
*/Makefile.am, */Makefile.in (added)
*/Makefile
*/Makefile (removed)
client/
ap_file_io.C

View File

@ -28,13 +28,13 @@ and the policy for deciding which are correct, are project-specific.
<p>
<li> <b>Grant credit</b>.
Some users will attempt to get undeserved credit
by falsifying their CPU metrics or CPU times.
The back end
finds the minimum reported credit for the correct results of a given workunit,
and assigns this amount of credit to all the correct results.
This ensures that as long as a reasonable majority of participants
don't falsify credit, almost all credit accounting will be correct.
Some users will attempt to get undeserved credit by falsifying their CPU
metrics or CPU times. Each project and application can have its own
credit-granting algorithm, for example granting the minimum or the mean of
the median of all claimed credits (during validation time). The granted
credit is assigned to all correct results. This ensures that as long as a
reasonable majority of participants don't falsify credit, almost all credit
accounting will be correct.
<p>
<li> <b>Assimilate results</b>.
<p>

View File

@ -1,9 +1,9 @@
<title>Security</title>
<title>Security</title>
<body bgcolor=ffffff>
<h2>Security</h2>
<h2>Security</h2>
<p>
Many types of attacks are possible in public-participation
distributed computing.
distributed computing.
<ul>
<li> <b>Result falsification</b>.
Attackers return incorrect results.
@ -38,9 +38,9 @@ hosts, e.g. by stealing sensitive information stored in files.
A project releases an application that unintentionally abuses participant
hosts, e.g. deleting files or causing crashes.
</ul>
BOINC provides mechanisms to reduce the likelihood of some of these attacks.
BOINC provides mechanisms to reduce the likelihood of some of these attacks.
<p>
<b>Result falsification</b>
<b>Result falsification</b>
<p>
This can be probabilistically detected using redundant computing and
result verification: if a majority of results agree (according to an
@ -50,7 +50,8 @@ application-specific comparison) then they are classified as correct.
<p>
This can be probabilistically detected using redundant computing and
credit verification: each participant is given the minimum credit from
among the correct results.
among the correct results (or some other algorithm, such as the mean of the
median claimed credits).
<p>
<b>Malicious executable distribution</b>
<p>
@ -75,7 +76,7 @@ The core client will accept
a new key only if it's signed with the old key.
This mechanism is
designed to prevent attackers from breaking into a BOINC server and
distributing a false key pair.
distributing a false key pair.
<p>
<b>Overrun of data server</b>
<p>
@ -86,7 +87,7 @@ The public key is stored on the
project's data servers. Result file descriptions are sent to clients
with a digital signature, which is forwarded to the data server when the
file is uploaded. The data server verifies the file description, and
ensures that the amount of data uploaded does not exceed the maximum size.
ensures that the amount of data uploaded does not exceed the maximum size.
<p>
<b>Theft of participant account information by server attack</b>
<p>
@ -100,7 +101,7 @@ Projects should be undertaken only the organizations that have
sufficient expertise and resources to secure their servers.
A successful
attack could discredit all BOINC-based projects, and
public-participation computing in general.
public-participation computing in general.
<p>
<b>Theft of participant account information by network attack</b>
<p>
@ -109,7 +110,7 @@ public-participation computing in general.
The input and output files used by BOINC applications are not encrypted.
Applications can do this themselves, but it has little effect
since data resides in cleartext in memory, where it is easy to access
with a debugger.
with a debugger.
<p>
<b>Intentional abuse of participant hosts by projects</b>
</p>
@ -117,7 +118,7 @@ with a debugger.
BOINC does nothing to prevent this (e.g. there is no "sandboxing" of
applications).
Participants must understand that when they join a BOINC project,
they are entrusting the security of their systems to that project.
they are entrusting the security of their systems to that project.
<p>
<b>Accidental abuse of participant hosts by projects</b>
<p>
@ -126,4 +127,4 @@ The chances of it happening can
be minimized by pre-released application testing.
Projects should test
their applications thoroughly on all platforms and with all input data
scenarios before promoting them to production status.
scenarios before promoting them to production status.