[Server-devel] Git checkouts for the XS

John Watlington wad at laptop.org
Thu Feb 7 22:07:57 EST 2008


On Feb 7, 2008, at 5:46 PM, Martin Langhoff wrote:

> Cloned some key git checkouts and have been reading through the recent
> changelogs last night -
>
>   xs-callhome/
A crusty turd best ignored (tunelling over ssh to allow access to  
servers behind NATs)

>   xs-config/
>   xs-livecd/
>   xs-pkgs/

These are the core of the schoolserver build.  One to gather the  
packages, one
to configure them, and one to package them onto a self-installing CD.

>   security/

Currently not used on the schoolserver.  I was letting the security  
implementation
mature on the laptop before stealing it for the school server.   I  
think it is still
maturing too quickly.

>   ds-backup/

Let Ivan finish this before reviewing/using.

> is there anything I am missing? Initially, am looking at
>
>  - adding the relevant dependencies for moodle and mediawiki
To xs-pkgs

>  - some postinst scripts or "configuration" packages to edit apache's
> configuration for tuning to the available resources
To xs-config

>  - a basic moodle package and mediawiki package (more work on moodle
> and mw to follow)

These can be added to the repositories on xs-dev.  We can exchange  
account
info in separate email.  In the meantime, you can redirect the  
kickstart script in
xs-livecd to include your own repositories, or to a local mirror of  
ours which includes
your new packages.

>  - trying to understand where the security infrastructure is at, and
> how can apache of the XS get some identity information from the XO
> clients, the bitfrost way if possible, kludging it somehow if not...

The school server's current identity model is that a child is  
represented by their laptop.
The username is the laptop serial number (guaranteed unique), the  
password is the
laptop UUID (large, random, and never exposed).   Authentications  
other than disaster
recovery use a public/private key pair, which is generated when a  
user first opens a laptop.
Other IDs include a hash of the public key (IIRC) used by the  
presence (ejabberd) service
to represent a user.  There is also a nickname, which is not  
guaranteed to be unique
within a school but is nonetheless used in our UI.

There is no security infrastructure currently.   Even SELinux is  
turned off in the interest
of making things work.   A student could theoretically access a  
school server, but
they would have to know to use their serial number as the username.

wad



More information about the Server-devel mailing list