|
15-410 Homework 2This homework assignment is due Friday, December 10th at 23:59:59. As we intend to make solutions available on the web site immediately thereafter, . Homework must be submitted (online) in either PostScript or PDF format (not:
Microsoft Word, Word Perfect, Apple Works, LaTeX, XyWriter, WordStar,
etc.). Except as otherwise directed (in the crypto question), turn
in your answers as either
As usual, you may discuss this assignment with others, but you must then go off by yourself to write up the solution. Question 1 - Public Key PracticumThis question is not hard, but it does take some time to do it right. Please don't leave this question to the last minute. Follow the directions in pgp.html to generate
a PGP key ring,
containing public and private keys
for digital signature and encryption purposes.
Do not turn the key ring in to your
Question 2 - Copy-on-writeAs some students pointed out, implementing copy-on-write is a good way for an operating system to overcommit memory--to promise applications more memory than the system can actually provide. Part ABriefly explain how this overcommittment happens. If you wish you may use a short, clear program to help explain. Part BExplain how a VM system which implements copy-on-write can avoid overcommitting system memory. Part CSome kernel implementors and some users believe that memory overcommittment (as long as it is temporary and resolves itself non-painfully) is motivation for copy-on-write. Explain how copy-on-write could be beneficial even for systems which don't overcommit memory. Question 3 - Process Model
When you use But... in the 1990's some hard-working CMU CS graduate students
who found themselves working for more than 24 hours at a stretch
were annoyed when their Kerboeros authenticators timed out.
Some of them wrote small shell scripts which contained their passwords
and periodically fed those passwords to A security-conscious graduate student, Bennet Yee,
tried to find a solution to the perceived Kerberos usability
problem while still addressing security concerns.
He, too, wrote a program which would periodically "type"
a user's password into Explain why Bennet felt that storing the user's password
in a pipe represented an increase in security over
a more straightforward implementation which would hold
the password somewhere in Helpful HintBy the way, if you think you are having AFS permission problems,
try running the program located at
| |||||||||||
[Last modified Saturday December 04, 2004] |