|
15-410 Homework 2This homework assignment is due Friday, December 8th at 23:59:59. As we intend to make solutions available on the web site immediately thereafter, . Homework must be submitted (online) in either PostScript or PDF format (not:
Microsoft Word, Word Perfect, Apple Works, LaTeX,
XyWrite,
WordStar,
etc.). Except as otherwise directed (in the crypto question), turn
in your answers as either
As usual, you may discuss this assignment with others, but you must then go off by yourself to write up the solution. Question 1 - Public Key PracticumThis question is not hard, but it does take some time to do it right. Please don't leave this question to the last minute, and think carefully about what the various steps accomplish. Follow the directions in gpg.html to generate
a PGP key ring,
containing public and private keys
for digital signature and encryption purposes.
Do not turn the key ring in to your
Question 2 - KerberosImagine a hypothetical network printing service authenticated and encrypted via Kerberos. We will focus on a part of the service which allows a user to receive a status listing of the estimated completion time of each of the user's print jobs. At a high level, a list-queue program acting on behalf of a user sends a LIST message to the print server, which sends back a message containing one long string describing the status of multiple jobs (you can imagine that each job appears on one "line" in the string). To avoid students becoming bitter at one another, we wish to avoid situations where one user can determine the status of another user's print jobs. Part AAssume the list-queue program has access to a valid, unexpired Kerberos ticket (as described in class) for the "printer" service. What information should the list-queue program send to the printer-server program in a LIST message? Try to use the notation from the lecture slides; be specific about what form each piece of information would take in the message and how the server would consider and use each piece of information. Part BBriefly yet convincingly explain this apparent paradox: Joe can see every message sent by list-queue from Kelly's machine to the print server, and see every reply sent from the print server, but doesn't know what commands Kelly is sending and can't read the print server's responses. If you can, explain why Joe remains in the dark even if he also sees all messages transmitted between Kelly's machine and the central Kerberos server. Question 3 - Kernel Runtime EnvironmentVirtual memory works differently from one platform to another. For example, when a PowerPC CPU receives an interrupt or experiences an exception, including a system call, the hardware automatically and atomically performs these steps:
By the way, the PowerPC equivalent of Part AWhat requirement or requirements are forced on the authors of PowerPC kernels due as a result of all "surprises" turning VM off? Part BDo you agree or disagree with the decision to automatically disable interrupts in response to all "surprises"? Explain your reasoning. Helpful HintBy the way, if you think you are having AFS permission problems,
try running the program located at
| ||||||||||
[Last modified Monday December 04, 2006] |