-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support verification of s3 delivered files #154
Comments
Spoke with @dleehr about this. Current PlanSender digitally signs all files, D4S2 creates a manifest containing all file's signatures, D4S2 signs the manifest. Recipient receives a bucket with all files and the manifest file. Each received file has a metadata signature. Step by step:
|
One concern is to see how long it takes to sign all files being transferred. |
I like this a lot, very thoughtful. |
Questions
NotesMetadata size limitationAWS S3 metadata size limitation:
Large file signing performanceSigning a 4G file took 12 seconds on a Bespin VM: |
We need a method to verify that the files that have been delivered and stored in s3 have not been modified. This should include issues with a bad actor modifying the files in the bucket.
It would also be nice if the verification could take place even without access to the D4S2 database.
We have discussed adding a MD5 check sum to the metadata and/or adding a digital signature.
There is a chicken and egg problem with creating a digital signature based on the metadata, and storing that signature in the metadata.
The text was updated successfully, but these errors were encountered: