User:Mstone/Commentaries/Infrastructure 1: Difference between revisions

From OLPC
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 1: Line 1:

Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure:
Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure:


Line 6: Line 5:


; Timely access
; Timely access
: Failures of otherwise critical pieces of OLPC infrastructure should not inhibit timely read or write access to the reference documentation.
: Failures of otherwise critical pieces of infrastructure should not inhibit timely read or write access to the reference documentation.


; Credential rotation
; Credential rotation
: When people leave the VIG, it should be easy to remove their access to secrets created after their exit.
: When people leave the VIG, it should be easy to remove their access to secrets created after their exit.
: If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the OLPC infrastructure.
: If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the communal infrastructure.


; Publishability
; Publishability

Revision as of 17:59, 20 August 2008

Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure:

Data integrity
It should be possible to verify the integrity of reference documentation on an independent system booted from read-only media.
Timely access
Failures of otherwise critical pieces of infrastructure should not inhibit timely read or write access to the reference documentation.
Credential rotation
When people leave the VIG, it should be easy to remove their access to secrets created after their exit.
If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the communal infrastructure.
Publishability
Secrets should be carefully separated from public knowledge (e.g. with encryption or quarantine) so that everything else can be published.