This commit is contained in:
@@ -14,7 +14,7 @@ subsequently it issued hundreds of fraudulent SSL certificates, some of which we
|
|||||||
man-in-the-middle attacks on Iranian Gmail users. Not cool.
|
man-in-the-middle attacks on Iranian Gmail users. Not cool.
|
||||||
|
|
||||||
Google launched a project called **Certificate Transparency**, because it was becoming more common
|
Google launched a project called **Certificate Transparency**, because it was becoming more common
|
||||||
that the root of trust given to _Certification Authorities_ could no longer be unilateraly trusted.
|
that the root of trust given to _Certification Authorities_ could no longer be unilaterally trusted.
|
||||||
These attacks showed that the lack of transparency in the way CAs operated was a significant risk to
|
These attacks showed that the lack of transparency in the way CAs operated was a significant risk to
|
||||||
the Web Public Key Infrastructure. It led to the creation of this ambitious
|
the Web Public Key Infrastructure. It led to the creation of this ambitious
|
||||||
[[project](https://certificate.transparency.dev/)] to improve security online by bringing
|
[[project](https://certificate.transparency.dev/)] to improve security online by bringing
|
||||||
@@ -49,8 +49,8 @@ yet, take a look at [[zrepl](https://zrepl.github.io/)], a one-stop, integrated
|
|||||||
replication. This tool is incredibly powerful, and can do snapshot management, sourcing / sinking
|
replication. This tool is incredibly powerful, and can do snapshot management, sourcing / sinking
|
||||||
to remote hosts, of course using incremental snapshots as they are native to ZFS.
|
to remote hosts, of course using incremental snapshots as they are native to ZFS.
|
||||||
|
|
||||||
Once the machine is up, we pass three four enterprise-class storage, in our case 3.84TB Kioxia NVMe
|
Once the machine is up, we pass four enterprise-class storage drives, in our case 3.84TB Kioxia
|
||||||
drives, model _KXD51RUE3T84_ which are PCIe 3.1 x4 lanes, and NVMe 1.2.1 specification with a good
|
NVMe, model _KXD51RUE3T84_ which are PCIe 3.1 x4 lanes, and NVMe 1.2.1 specification with a good
|
||||||
durability and reasonable (albeit not stellar) read throughput of ~2700MB/s, write throughput of
|
durability and reasonable (albeit not stellar) read throughput of ~2700MB/s, write throughput of
|
||||||
~800MB/s with 240 kIOPS random read and 21 kIOPS random write. My attention is also drawn to a
|
~800MB/s with 240 kIOPS random read and 21 kIOPS random write. My attention is also drawn to a
|
||||||
specific specification point: these drives allow for 1.0 DWPD, which stands for _Drive Writes Per
|
specific specification point: these drives allow for 1.0 DWPD, which stands for _Drive Writes Per
|
||||||
@@ -500,7 +500,7 @@ allow the Static CT logs (regardless of being Sunlight or TesseraCT) to serve ve
|
|||||||
|
|
||||||
## What's Next
|
## What's Next
|
||||||
|
|
||||||
I need to spend a little bit of time thinking about rate limites, specifically write-ratelimits. I
|
I need to spend a little bit of time thinking about rate limits, specifically write-ratelimits. I
|
||||||
think I'll use a request limiter in upstream NGINX, to allow for each IP or /24 or /48 subnet to
|
think I'll use a request limiter in upstream NGINX, to allow for each IP or /24 or /48 subnet to
|
||||||
only send a fixed number of requests/sec. I'll probably keep that part private though, as it's a
|
only send a fixed number of requests/sec. I'll probably keep that part private though, as it's a
|
||||||
good rule of thumb to never offer information to attackers.
|
good rule of thumb to never offer information to attackers.
|
||||||
|
Reference in New Issue
Block a user