Did you ever need to store logs or other files in a way that would -allow it to be used as evidence in court, and needed a way to -demonstrate without reasonable doubt that the file had not been -changed since it was created? Or, did you ever need to document that -a given document was received at some point in time, like some -archived document or the answer to an exam, and not changed after it -was received? The problem in these settings is to remove the need to -trust yourself and your computers, while still being able to prove -that a file is the same as it was at some given time in the past.
- -A solution to these problems is to have a trusted third party -"stamp" the document and verify that at some given time the document -looked a given way. Such -notarius service -have been around for thousands of years, and its digital equivalent is -called a -trusted -timestamping service. The Internet -Engineering Task Force standardised how such service could work a -few years ago as RFC -3161. The mechanism is simple. Create a hash of the file in -question, send it to a trusted third party which add a time stamp to -the hash and sign the result with its private key, and send back the -signed hash + timestamp. Anyone with the document and the signature -can then verify that the document matches the signature by creating -their own hash and checking the signature using the trusted third -party public key. There are several commercial services around -providing such timestamping. A quick search for -"rfc 3161 -service" pointed me to at least -DigiStamp, -Quo -Vadis, -Global Sign -and Global -Trust Finder. The system work as long as the private key of the -trusted third party is not compromised.
- -But as far as I can tell, there are very few public trusted -timestamp services available for everyone. I've been looking for one -for a while now. But yesterday I found one over at -Deutches -Forschungsnetzmentioned in -a -blog by David Müller. I then found a good recipe on how to use -over at the -University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: - -
- --#!/bin/sh -set -e -url="http://zeitstempel.dfn.de" -caurl="https://pki.pca.dfn.de/global-services-ca/pub/cacert/chain.txt" -reqfile=$(mktemp -t tmp.XXXXXXXXXX.tsq) -resfile=$(mktemp -t tmp.XXXXXXXXXX.tsr) -cafile=chain.txt -if [ ! -f $cafile ] ; then - wget -O $cafile "$caurl" -fi -openssl ts -query -data "$1" -cert | tee "$reqfile" \ - | /usr/lib/ssl/misc/tsget -h "$url" -o "$resfile" -openssl ts -reply -in "$resfile" -text 1>&2 -openssl ts -verify -data "$1" -in "$resfile" -CAfile "$cafile" 1>&2 -base64 < "$resfile" -rm "$reqfile" "$resfile" -
The argument to the script is the file to timestamp, and the output -is a base64 encoded version of the signature to STDOUT and details -about the signature to STDERR. Note that due to -a bug -in the tsget script, you might need to modify the included script -and remove the last line. Or just write your own HTTP uploader using -curl. :) Now you too can prove and verify that files have not been -changed.
- -But the Internet need more public trusted timestamp services. -Perhaps something for Uninett or -my work place the University of Oslo -to set up?
+ +On friday, I came across an interesting article in the Norwegian +web based ICT news magazine digi.no on +how +to collect the IMSI numbers of nearby cell phones using the cheap +DVB-T software defined radios. The article refered to instructions +and a recipe by +Keld Norman on Youtube on how to make a simple $7 IMSI Catcher, and I decided to test them out.
+ +The instructions said to use Ubuntu, install pip using apt (to +bypass apt), use pip to install pybombs (to bypass both apt and pip), +and the ask pybombs to fetch and build everything you need from +scratch. I wanted to see if I could do the same on the most recent +Debian packages, but this did not work because pybombs tried to build +stuff that no longer build with the most recent openssl library or +some other version skew problem. While trying to get this recipe +working, I learned that the apt->pip->pybombs route was a long detour, +and the only piece of software dependency missing in Debian was the +gr-gsm package. I also found out that the lead upstream developer of +gr-gsm (the name stand for GNU Radio GSM) project already had a set of +Debian packages provided in an Ubuntu PPA repository. All I needed to +do was to dget the Debian source package and built it.
+ +The IMSI collector is a python script listening for packages on the +loopback network device and printing to the terminal some specific GSM +packages with IMSI numbers in them. The code is fairly short and easy +to understand. The reason this work is because gr-gsm include a tool +to read GSM data from a software defined radio like a DVB-T USB stick +and other software defined radios, decode them and inject them into a +network device on your Linux machine (using the loopback device by +default). This proved to work just fine, and I've been testing the +collector for a few days now.
+ +The updated and simpler recipe is thus to
+ +-
+
+
- start with a Debian machine running Stretch or newer, + +
- build and install the gr-gsm package available from +http://ppa.launchpad.net/ptrkrysik/gr-gsm/ubuntu/pool/main/g/gr-gsm/, + +
- clone the git repostory from https://github.com/Oros42/IMSI-catcher, + +
- run grgsm_livemon and adjust the frequency until the terminal +where it was started is filled with a stream of text (meaning you +found a GSM station). + +
- go into the IMSI-catcher directory and run 'sudo python simple_IMSI-catcher.py' to extract the IMSI numbers. + +
To make it even easier in the future to get this sniffer up and +running, I decided to package +the gr-gsm project +for Debian (WNPP +#871055), and the package was uploaded into the NEW queue today. +Luckily the gnuradio maintainer has promised to help me, as I do not +know much about gnuradio stuff yet.
+ +I doubt this "IMSI cacher" is anywhere near as powerfull as +commercial tools like +The +Spy Phone Portable IMSI / IMEI Catcher or the +Harris +Stingray, but I hope the existance of cheap alternatives can make +more people realise how their whereabouts when carrying a cell phone +is easily tracked. Seeing the data flow on the screen, realizing that +I live close to a police station and knowing that the police is also +wearing cell phones, I wonder how hard it would be for criminals to +track the position of the police officers to discover when there are +police near by, or for foreign military forces to track the location +of the Norwegian military forces, or for anyone to track the location +of government officials...
+ +It is worth noting that the data reported by the IMSI-catcher +script mentioned above is only a fraction of the data broadcasted on +the GSM network. It will only collect one frequency at the time, +while a typical phone will be using several frequencies, and not all +phones will be using the frequencies tracked by the grgsm_livemod +program. Also, there is a lot of radio chatter being ignored by the +simple_IMSI-catcher script, which would be collected by extending the +parser code. I wonder if gr-gsm can be set up to listen to more than +one frequency?
Keeping your DVD collection safe from scratches and curious -children fingers while still having it available when you want to see a -movie is not straight forward. My preferred method at the moment is -to store a full copy of the ISO on a hard drive, and use VLC, Popcorn -Hour or other useful players to view the resulting file. This way the -subtitles and bonus material are still available and using the ISO is -just like inserting the original DVD record in the DVD player.
- -Earlier I used dd for taking security copies, but it do not handle -DVDs giving read errors (which are quite a few of them). I've also -tried using -dvdbackup -and genisoimage, but these days I use the marvellous python library -and program -python-dvdvideo -written by Bastian Blank. It is -in Debian -already and the binary package name is python3-dvdvideo. Instead -of trying to read every block from the DVD, it parses the file -structure and figure out which block on the DVD is actually in used, -and only read those blocks from the DVD. This work surprisingly well, -and I have been able to almost backup my entire DVD collection using -this method.
So far, python-dvdvideo have failed on between 10 and -20 DVDs, which is a small fraction of my collection. The most common -problem is -DVDs -using UTF-16 instead of UTF-8 characters, which according to -Bastian is against the DVD specification (and seem to cause some -players to fail too). A rarer problem is what seem to be inconsistent -DVD structures, as the python library -claim -there is a overlap between objects. An equally rare problem claim -some -value is out of range. No idea what is going on there. I wish I -knew enough about the DVD format to fix these, to ensure my movie -collection will stay with me in the future. - -So, if you need to keep your DVDs safe, back them up using -python-dvdvideo. :)
+ +I finally received a copy of the Norwegian Bokmål edition of +"The Debian Administrator's +Handbook". This test copy arrived in the mail a few days ago, and +I am very happy to hold the result in my hand. We spent around one and a half year translating it. This paperbook edition +is available +from lulu.com. If you buy it quickly, you save 25% on the list +price. The book is also available for download in electronic form as +PDF, EPUB and Mobipocket, as can be +read online +as a web page.
+ +This is the second book I publish (the first was the book +"Free Culture" by Lawrence Lessig +in +English, +French +and +Norwegian +Bokmål), and I am very excited to finally wrap up this +project. I hope +"Håndbok +for Debian-administratoren" will be well received.
Det offentlige Norge har mye kunnskap og informasjon. Men hvordan -kan en få tilgang til den på en enkel måte? Takket være et lite -knippe lover og tilhørende forskrifter, blant annet -offentlighetsloven, -miljøinformasjonsloven -og -forvaltningsloven -har en rett til å spørre det offentlige og få svar. Men det finnes -intet offentlig arkiv over hva andre har spurt om, og dermed risikerer en -å måtte forstyrre myndighetene gang på gang for å få tak i samme -informasjonen på nytt. Britiske -mySociety har laget tjenesten -WhatDoTheyKnow som gjør -noe med dette. I Storbritannia blir WhatdoTheyKnow brukt i -ca -15% av alle innsynsforespørsler mot sentraladministrasjonen. -Prosjektet heter Alaveteli, og -er takk i bruk en rekke steder etter at løsningen ble generalisert og -gjort mulig å oversette. Den hjelper borgerne med å be om innsyn, -rådgir ved purringer og klager og lar alle se hvilke henvendelser som -er sendt til det offentlige og hvilke svar som er kommet inn, i et -søkpart arkiv. Her i Norge holder vi i foreningen NUUG på å få opp en -norsk utgave av Alaveteli, og her trenger vi din hjelp med -oversettelsen.
- -Så langt er 76 % av Alaveteli oversatt til norsk bokmål, men vi -skulle gjerne vært oppe i 100 % før lansering. Oversettelsen gjøres -på Transifex, -der enhver som registrerer seg og ber om tilgang til -bokmålsoversettelsen får bidra. Vi har satt opp en test av tjenesten -(som ikke sender epost til det offentlige, kun til oss som holder på å -sette opp tjenesten) på maskinen -alaveteli-dev.nuug.no, der -en kan se hvordan de oversatte meldingen blir seende ut på nettsiden. -Når tjenesten lanseres vil den hete -Mimes brønn, etter -visdomskilden som Odin måtte gi øyet sitt for å få drikke i. Den -nettsiden er er ennå ikke klar til bruk.
- -Hvis noen vil oversette til nynorsk også, så skal vi finne ut -hvordan vi lager en flerspråklig tjeneste. Men i første omgang er -fokus på bokmålsoversettelsen, der vi selv har nok peiling til å ha -fått oversatt 76%, men trenger hjelp for å komme helt i mål. :)
+ +Jeg kom over teksten +«Killing +car privacy by federal mandate» av Leonid Reyzin på Freedom to +Tinker i dag, og det gleder meg å se en god gjennomgang om hvorfor det +er et urimelig inngrep i privatsfæren å la alle biler kringkaste sin +posisjon og bevegelse via radio. Det omtalte forslaget basert på +Dedicated Short Range Communication (DSRC) kalles Basic Safety Message +(BSM) i USA og Cooperative Awareness Message (CAM) i Europa, og det +norske Vegvesenet er en av de som ser ut til å kunne tenke seg å +pålegge alle biler å fjerne nok en bit av innbyggernes privatsfære. +Anbefaler alle å lese det som står der. + +
Mens jeg tittet litt på DSRC på biler i Norge kom jeg over et sitat +jeg synes er illustrativt for hvordan det offentlige Norge håndterer +problemstillinger rundt innbyggernes privatsfære i SINTEF-rapporten +«Informasjonssikkerhet +i AutoPASS-brikker» av Trond Foss:
+ ++«Rapporten ser ikke på informasjonssikkerhet knyttet til personlig + integritet.» ++ +
SÃ¥ enkelt kan det tydeligvis gjøres nÃ¥r en vurderer +informasjonssikkerheten. Det holder vel at folkene pÃ¥ toppen kan si +at «Personvernet er ivaretatt», som jo er den populære intetsigende +frasen som gjør at mange tror enkeltindividers integritet tas vare pÃ¥. +Sitatet fikk meg til Ã¥ undres pÃ¥ hvor ofte samme tilnærming, Ã¥ bare se +bort fra behovet for personlig itegritet, blir valgt nÃ¥r en velger Ã¥ +legge til rette for nok et inngrep i privatsfæren til personer i +Norge. Det er jo sjelden det fÃ¥r reaksjoner. Historien om +reaksjonene pÃ¥ Helse Sør-Ãsts tjenesteutsetting er jo sørgelig nok et +unntak og toppen av isfjellet, desverre. Tror jeg fortsatt takker nei +til bÃ¥de AutoPASS og holder meg sÃ¥ langt unna det norske helsevesenet +som jeg kan, inntil de har demonstrert og dokumentert at de verdsetter +individets privatsfære og personlige integritet høyere enn kortsiktig +gevist og samfunnsnytte.
The Freedombox -project is working on providing the software and hardware for -making it easy for non-technical people to host their data and -communication at home, and being able to communicate with their -friends and family encrypted and away from prying eyes. It has been -going on for a while, and is slowly progressing towards a new test -release (0.2).
- -And what day could be better than the Pi day to announce that the -new version will provide "hard drive" / SD card / USB stick images for -Dreamplug, Raspberry Pi and VirtualBox (or any other virtualization -system), and can also be installed using a Debian installer preseed -file. The Debian based Freedombox is now based on Debian Jessie, -where most of the needed packages used are already present. Only one, -the freedombox-setup package, is missing. To try to build your own -boot image to test the current status, fetch the freedom-maker scripts -and build using -vmdebootstrap -with a user with sudo access to become root: - -
-git clone http://anonscm.debian.org/git/freedombox/freedom-maker.git \ - freedom-maker -sudo apt-get install git vmdebootstrap mercurial python-docutils \ - mktorrent extlinux virtualbox qemu-user-static binfmt-support \ - u-boot-tools -make -C freedom-maker dreamplug-image raspberry-image virtualbox-image -- -
Root access is needed to run debootstrap and mount loopback -devices. See the README for more details on the build. If you do not -want all three images, trim the make line. But note that thanks to a race condition in -vmdebootstrap, the build might fail without the patch to the -kpartx call.
- -If you instead want to install using a Debian CD and the preseed -method, boot a Debian Wheezy ISO and use this boot argument to load -the preseed values:
- --url=http://www.reinholdtsen.name/freedombox/preseed-jessie.dat -- -
But note that due to a -recently introduced bug in apt in Jessie, the installer will -currently hang while setting up APT sources. Killing the -'apt-cdrom ident' process when it hang a few times during the -installation will get the installation going. This affect all -installations in Jessie, and I expect it will be fixed soon.
- -Give it a go and let us know how it goes on the mailing list, and help -us get the new release published. :) Please join us on -IRC (#freedombox on -irc.debian.org) and -the -mailing list if you want to help make this vision come true. + +It is pleasing to see that the work we put down in publishing new +editions of the classic Free +Culture book by the founder of the Creative Commons movement, +Lawrence Lessig, is still being appreciated. I had a look at the +latest sales numbers for the paper edition today. Not too impressive, +but happy to see some buyers still exist. All the revenue from the +books is sent to the Creative +Commons Corporation, and they receive the largest cut if you buy +directly from Lulu. Most books are sold via Amazon, with Ingram +second and only a small fraction directly from Lulu. The ebook +edition is available for free from +Github.
+ +Title / language | Quantity | ||
---|---|---|---|
2016 jan-jun | 2016 jul-dec | 2017 jan-may | |
Culture Libre / French | +3 | +6 | +15 | +
Fri kultur / Norwegian | +7 | +1 | +0 | +
Free Culture / English | +14 | +27 | +16 | +
Total | +24 | +34 | +31 | +
A bit sad to see the low sales number on the Norwegian edition, and +a bit surprising the English edition still selling so well.
+ +If you would like to translate and publish the book in your native +language, I would be happy to help make it happen. Please get in +touch.
On larger sites, it is useful to use a dedicated storage server for -storing user home directories and data. The design for handling this -in Debian Edu / Skolelinux, is -to update the automount rules in LDAP and let the automount daemon on -the clients take care of the rest. I was reminded about the need to -document this better when one of the customers of -Skolelinux Drift AS, where I am -on the board of directors, asked about how to do this. The steps to -get this working are the following:
+ +I am very happy to report that the +Nikita Noark 5 +core project tagged its second release today. The free software +solution is an implementation of the Norwegian archive standard Noark +5 used by government offices in Norway. These were the changes in +version 0.1.1 since version 0.1.0 (from NEWS.md): -
-
+
- Add new storage server in DNS. I use nas-server.intern as the -example host here. +
- Continued work on the angularjs GUI, including document upload. +
- Implemented correspondencepartPerson, correspondencepartUnit and + correspondencepartInternal +
- Applied for coverity coverage and started submitting code on + regualr basis. +
- Started fixing bugs reported by coverity +
- Corrected and completed HATEOAS links to make sure entire API is + available via URLs in _links. +
- Corrected all relation URLs to use trailing slash. +
- Add initial support for storing data in ElasticSearch. +
- Now able to receive and store uploaded files in the archive. +
- Changed JSON output for object lists to have relations in _links. +
- Improve JSON output for empty object lists. +
- Now uses correct MIME type application/vnd.noark5-v4+json. +
- Added support for docker container images. +
- Added simple API browser implemented in JavaScript/Angular. +
- Started on archive client implemented in JavaScript/Angular. +
- Started on prototype to show the public mail journal. +
- Improved performance by disabling Sprint FileWatcher. +
- Added support for 'arkivskaper', 'saksmappe' and 'journalpost'. +
- Added support for some metadata codelists. +
- Added support for Cross-origin resource sharing (CORS). +
- Changed login method from Basic Auth to JSON Web Token (RFC 7519) + style. +
- Added support for GET-ing ny-* URLs. +
- Added support for modifying entities using PUT and eTag. +
- Added support for returning XML output on request. +
- Removed support for English field and class names, limiting ourself + to the official names. +
- ... + +
- Add automoun LDAP information about this server in LDAP, to allow -all clients to automatically mount it on reqeust. +
-
-
If this sound interesting to you, please contact us on IRC (#nikita +on irc.freenode.net) or email +(nikita-noark +mailing list).
+This is a copy of +an +email I posted to the nikita-noark mailing list. Please follow up +there if you would like to discuss this topic. The background is that +we are making a free software archive system based on the Norwegian +Noark +5 standard for government archives.
+ +I've been wondering a bit lately how trusted timestamps could be +stored in Noark 5. +Trusted +timestamps can be used to verify that some information +(document/file/checksum/metadata) have not been changed since a +specific time in the past. This is useful to verify the integrity of +the documents in the archive.
+ +Then it occured to me, perhaps the trusted timestamps could be +stored as dokument variants (ie dokumentobjekt referered to from +dokumentbeskrivelse) with the filename set to the hash it is +stamping?
+ +Given a "dokumentbeskrivelse" with an associated "dokumentobjekt", +a new dokumentobjekt is associated with "dokumentbeskrivelse" with the +same attributes as the stamped dokumentobjekt except these +attributes:
--
-
+
- format -> "RFC3161" +
- mimeType -> "application/timestamp-reply" +
- formatDetaljer -> "<source URL for timestamp service>" +
- filenavn -> "<sjekksum>.tsr"
-
DNS entries are added in GOsa², and not described here. Follow the -instructions -in the manual (Machine Management with GOsa² in section Getting -started).
+
Ensure that the NFS export points on the server are exported to the -relevant subnets or machines:
+This assume a service following +IETF RFC 3161 is +used, which specifiy the given MIME type for replies and the .tsr file +ending for the content of such trusted timestamp. As far as I can +tell from the Noark 5 specifications, it is OK to have several +variants/renderings of a dokument attached to a given +dokumentbeskrivelse objekt. It might be stretching it a bit to make +some of these variants represent crypto-signatures useful for +verifying the document integrity instead of representing the dokument +itself.
+ +Using the source of the service in formatDetaljer allow several +timestamping services to be used. This is useful to spread the risk +of key compromise over several organisations. It would only be a +problem to trust the timestamps if all of the organisations are +compromised.
+ +The following oneliner on Linux can be used to generate the tsr
+file. $input is the path to the file to checksum, and $sha256 is the
+SHA-256 checksum of the file (ie the "
--root@tjener:~# showmount -e nas-server -Export list for nas-server: -/storage 10.0.0.0/8 -root@tjener:~# +openssl ts -query -data "$inputfile" -cert -sha256 -no_nonce \ + | curl -s -H "Content-Type: application/timestamp-query" \ + --data-binary "@-" http://zeitstempel.dfn.de > $sha256.tsr
Here everything on the backbone network is granted access to the -/storage export. With NFSv3 it is slightly better to limit it to -netgroup membership or single IP addresses to have some limits on the -NFS access.
- -The next step is to update LDAP. This can not be done using GOsa², -because it lack a module for automount. Instead, use ldapvi and add -the required LDAP objects using an editor.
+To verify the timestamp, you first need to download the public key +of the trusted timestamp service, for example using this command:
--ldapvi --ldap-conf -ZD '(cn=admin)' -b ou=automount,dc=skole,dc=skolelinux,dc=no +wget -O ca-cert.txt \ + https://pki.pca.dfn.de/global-services-ca/pub/cacert/chain.txt
When the editor show up, add the following LDAP objects at the -bottom of the document. The "/&" part in the last LDAP object is a -wild card matching everything the nas-server exports, removing the -need to list individual mount points in LDAP.
+Note, the public key should be stored alongside the timestamps in +the archive to make sure it is also available 100 years from now. It +is probably a good idea to standardise how and were to store such +public keys, to make it easier to find for those trying to verify +documents 100 or 1000 years from now. :)
+ +The verification itself is a simple openssl command:
--add cn=nas-server,ou=auto.skole,ou=automount,dc=skole,dc=skolelinux,dc=no -objectClass: automount -cn: nas-server -automountInformation: -fstype=autofs --timeout=60 ldap:ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no - -add ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no -objectClass: top -objectClass: automountMap -ou: auto.nas-server - -add cn=/,ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no -objectClass: automount -cn: / -automountInformation: -fstype=nfs,tcp,rsize=32768,wsize=32768,rw,intr,hard,nodev,nosuid,noatime nas-server.intern:/& +openssl ts -verify -data $inputfile -in $sha256.tsr \ + -CAfile ca-cert.txt -text
The last step to remember is to mount the relevant mount points in -tjener.intern by adding them to /etc/fstab, creating the mount -directories using mkdir and running "mount -a" to mount them.
- -When this is done, your users should be able to access the files on -the storage server directly by just visiting the -/tjener/nas-server/storage/ directory using any application on any -workstation, LTSP client or LTSP server.
+Is there any reason this approach would not work? Is it somehow against +the Noark 5 specification?
For noen uker siden ble NXCs fri programvarelisenserte -NOARK5-løsning -presentert hos -NUUG (video -på youtube -foreløbig), og det fikk meg til å titte litt mer på NOARK5, -standarden for arkivhåndtering i det offentlige Norge. Jeg lurer på -om denne kjernen kan være nyttig i et par av mine prosjekter, og for ett -av dem er det mest aktuelt å lagre epost. Jeg klarte ikke finne noen -anbefaling om hvordan RFC 822-formattert epost (aka Internett-epost) -burde lagres i NOARK5, selv om jeg vet at noen arkiver tar -PDF-utskrift av eposten med sitt epostprogram og så arkiverer PDF-en -(eller enda værre, tar papirutskrift og lagrer bildet av eposten som -PDF i arkivet).
- -Det er ikke så mange formater som er akseptert av riksarkivet til -langtidsoppbevaring av offentlige arkiver, og PDF og XML er de mest -aktuelle i så måte. Det slo meg at det måtte da finnes en eller annen -egnet XML-representasjon og at det kanskje var enighet om hvilken som -burde brukes, så jeg tok mot til meg og spurte -SAMDOK, en gruppe tilknyttet -arkivverket som ser ut til å jobbe med NOARK-samhandling, om de hadde -noen anbefalinger: - -
-- -Hei.
- -Usikker på om dette er riktig forum å ta opp mitt spørsmål, men jeg -lurer på om det er definert en anbefaling om hvordan RFC -822-formatterte epost (aka vanlig Internet-epost) bør lages håndteres -i NOARK5, slik at en bevarer all informasjon i eposten -(f.eks. Received-linjer). Finnes det en anbefalt XML-mapping ala den -som beskrives på -<URL: https://www.informit.com/articles/article.aspx?p=32074 >? Mitt -mål er at det skal være mulig å lagre eposten i en NOARK5-kjerne og -kunne få ut en identisk formattert kopi av opprinnelig epost ved -behov.
-
Postmottaker hos SAMDOK mente spørsmålet heller burde stilles -direkte til riksarkivet, og jeg fikk i dag svar derfra formulert av -seniorrådgiver Geir Ivar Tungesvik:
- --- -Riksarkivet har ingen anbefalinger når det gjelder konvertering fra -e-post til XML. Det står arkivskaper fritt å eventuelt definere/bruke -eget format. Inklusive da - som det spørres om - et format der det er -mulig å re-etablere e-post format ut fra XML-en. XML (e-post) -dokumenter må være referert i arkivstrukturen, og det må vedlegges et -gyldig XML skjema (.xsd) for XML-filene. Arkivskaper står altså fritt -til å gjøre hva de vil, bare det dokumenteres og det kan dannes et -utrekk ved avlevering til depot.
- -De obligatoriske kravene i Noark 5 standarden må altså oppfylles - -etter dialog med Riksarkivet i forbindelse med godkjenning. For -offentlige arkiv er det særlig viktig med filene loependeJournal.xml -og offentligJournal.xml. Private arkiv som vil forholde seg til Noark -5 standarden er selvsagt frie til å bruke det som er relevant for dem -av obligatoriske krav.
-
Det ser dermed ut for meg som om det er et lite behov for å -standardisere XML-lagring av RFC-822-formatterte meldinger. Noen som -vet om god spesifikasjon i så måte? I tillegg til den omtalt over, -har jeg kommet over flere aktuelle beskrivelser (søk på "rfc 822 -xml", så finner du aktuelle alternativer).
- --
-
-
- XML MIME Transformation -protocol (XMTP) fra OpenHealth, sist oppdatert 2001. - -
- An -XML format for mail and other messages utkast fra IETF datert -2001. - -
- xMail: -E-mail as XML en artikkel fra 2003 som beskriver python-modulen -rfc822 som gir ut XML-representasjon av en RFC 822-formattert epost. - -
Finnes det andre og bedre spesifikasjoner for slik lagring? Send -meg en epost hvis du har innspill.
+ +Aftenposten +melder i dag om feil i eksamensoppgavene for eksamen i politikk og +menneskerettigheter, der teksten i bokmåls og nynorskutgaven ikke var +like. Oppgaveteksten er gjengitt i artikkelen, og jeg ble nysgjerring +på om den fri oversetterløsningen +Apertium ville gjort en bedre +jobb enn Utdanningsdirektoratet. Det kan se slik ut.
+ +Her er bokmålsoppgaven fra eksamenen:
+ +++ +Drøft utfordringene knyttet til nasjonalstatenes og andre aktørers +rolle og muligheter til å håndtere internasjonale utfordringer, som +for eksempel flykningekrisen.
+ +Vedlegge er eksempler på tekster som kan gi relevante perspektiver +på temaet:
++
+ +- Flykningeregnskapet 2016, UNHCR og IDMC +
- «Grenseløst Europa for fall» A-Magasinet, 26. november 2015 +
Dette oversetter Apertium slik:
+ +++ +Drøft utfordringane knytte til nasjonalstatane sine og rolla til +andre aktørar og høve til å handtera internasjonale utfordringar, som +til dømes *flykningekrisen.
+ +Vedleggja er døme på tekster som kan gje relevante perspektiv på +temaet:
+ ++
+ +- *Flykningeregnskapet 2016, *UNHCR og *IDMC
+- «*Grenseløst Europa for fall» A-Magasinet, 26. november 2015
+
Ord som ikke ble forstått er markert med stjerne (*), og trenger +ekstra språksjekk. Men ingen ord er forsvunnet, slik det var i +oppgaven elevene fikk presentert på eksamen. Jeg mistenker dog at +"andre aktørers rolle og muligheter til ..." burde vært oversatt til +"rolla til andre aktørar og deira høve til ..." eller noe slikt, men +det er kanskje flisespikking. Det understreker vel bare at det alltid +trengs korrekturlesning etter automatisk oversettelse.
Her er noen lenker til tekster jeg har satt pris på å lese de siste -månedene. Det er mye om varsleren Edward Snowden, som burde få all -hjelp, støtte og beskyttelse Norge kan stille opp med for å ha satt -totalitær overvåkning på sakskartet, men også endel annet -tankevekkende og interessant.
- --
-
-
- 2013-12-21 -- -NSA tenker som Stasi - Dagbladet.no - -
- 2013-12-19 - -Staten har ikke rett til å vite alt om deg - DN.no - -
- 2013-12-21 -Nye -mål for NSAs spionasje avslørt - Dagbladet.no - -
- 2013-12-19 -«NSA -bør fjernes fra sin makt til å samle inn metadata fra amerikanske -telefonsamtaler» - Dagbladet.no - -
- 2013-12-18 -Etterretning, -overvåking, frihet og sikkerhet - Dagbladet.no - -
- 2013-12-17 -Snowden -angriper USA i åpent brev - nrk.no - -
- 2013-12-17 -Rettslig -nederlag for etterretning - digi.no - -
- 2013-12-21 -Truende -nedkjøling - dagbladet.no - -
- 2013-12-20 -Matematikk -og forståelse - aftenposten.no - -
- 2013-10-20 -Vi -søv for å reinse hjernen vår, ifølgje ny studie - nrk.no - -
- 2013-12-11 -Rotterace -i kloakken - nrk.no - -
- 2013-12-30 -Ã pne -brev og frie tanker - aftenposten.no - -
- 2014-01-12 -Stopp dagens kunnskapsapartheid! - aftenposten.no - -
- 2014-01-09 -EU-rapport: -Britisk og amerikansk overvåking ser ut til å være ulovlig - -aftenposten.no + +
- 2013-10-23 Professor Jan Arild Audestad -Advarer -mot konspirasjonsteori i digi.no og sier han ikke tror NSA kan -avlytte mobiltelefoner, mens han noen måneder senere forteller: - -
- 2014-01-09 -- -Vi ble presset til å svekke mobilsikkerheten på 80-tallet - -aftenposten.no - -
- 2014-02-12 -Et -møte med Edward Snowden - intervju sendt av nrk, tilgjengelig til -2015-01-31 +
- 2014-02-17 -Litteraturredaktøren: -Helle Thornings tavshed om Snowden er en skandale - -politiken.dk +
- 2014-02-21 -Bra å ha en «Storebror» - aftenposten.no +
- 2014-02-28 -"Narkotikasiktet -Stortingsmann" - Spillet bak kulissene - John Christian Eldens -blogg +
- 2014-02-28 -Heksejakt -på hasjbrukere - aftenposten.no +
- 2017
+
-
+
+
- January (4) + +
- February (3) + +
- March (5) + +
- April (2) + +
- June (5) + +
- July (1) + +
- August (1) + +
+
+ - 2016
+
-
+
+
- January (3) + +
- February (2) + +
- March (3) + +
- April (8) + +
- May (8) + +
- June (2) + +
- July (2) + +
- August (5) + +
- September (2) + +
- October (3) + +
- November (8) + +
- December (5) + +
+
+ - 2015
+
-
+
+
- January (7) + +
- February (6) + +
- March (1) + +
- April (4) + +
- May (3) + +
- June (4) + +
- July (6) + +
- August (2) + +
- September (2) + +
- October (9) + +
- November (6) + +
- December (3) + +
+
- 2014
-
@@ -861,7 +809,25 @@ activities, please send Bitcoin donations to my address
- February (3) -
- March (6) +
- March (8) + +
- April (7) + +
- May (1) + +
- June (2) + +
- July (2) + +
- August (2) + +
- September (5) + +
- October (6) + +
- November (3) + +
- December (5)
@@ -1034,101 +1000,115 @@ activities, please send Bitcoin donations to my address
- bankid (4) -
- bitcoin (8) +
- bitcoin (9) -
- bootsystem (14) +
- bootsystem (16)
- bsa (2)
- chrpath (2) -
- debian (95) +
- debian (151) + +
- debian edu (158) -
- debian edu (145) +
- debian-handbook (4)
- digistan (10) -
- docbook (10) +
- dld (16) + +
- docbook (24)
- drivstoffpriser (4) -
- english (240) +
- english (351) -
- fiksgatami (21) +
- fiksgatami (23)
- fildeling (12) -
- freeculture (12) +
- freeculture (30) + +
- freedombox (9) -
- freedombox (6) +
- frikanalen (18) -
- frikanalen (11) +
- h264 (20) -
- intervju (39) +
- intervju (42) -
- isenkram (7) +
- isenkram (15) -
- kart (18) +
- kart (20)
- ldap (9) -
- lenker (7) +
- lenker (8) + +
- lsdvd (2)
- ltsp (1) -
- mesh network (7) +
- mesh network (8) + +
- multimedia (39) -
- multimedia (26) +
- nice free software (9) -
- norsk (242) +
- norsk (291) -
- nuug (162) +
- nuug (189) -
- offentlig innsyn (11) +
- offentlig innsyn (33)
- open311 (2) -
- opphavsrett (46) +
- opphavsrett (64) -
- personvern (69) +
- personvern (101)
- raid (1) +
- reactos (1) +
- reprap (11) -
- rfid (2) +
- rfid (3) -
- robot (9) +
- robot (10)
- rss (1) -
- ruter (4) +
- ruter (5)
- scraperwiki (2) -
- sikkerhet (36) +
- sikkerhet (53)
- sitesummary (4) -
- skepsis (4) +
- skepsis (5) + +
- standard (55) -
- standard (44) +
- stavekontroll (6) -
- stavekontroll (3) +
- stortinget (11) -
- stortinget (9) +
- surveillance (49) -
- surveillance (22) +
- sysadmin (3) -
- sysadmin (1) +
- usenix (2)
- valg (8) -
- video (40) +
- video (59)
- vitenskap (4) -
- web (29) +
- web (40)
I disse dager, med frist 1. mai, har Riksarkivaren ute en høring på +sin forskrift. Som en kan se er det ikke mye tid igjen før fristen +som går ut på søndag. Denne forskriften er det som lister opp hvilke +formater det er greit å arkivere i +Noark +5-løsninger i Norge.
+ +Jeg fant høringsdokumentene hos +Norsk +Arkivråd etter å ha blitt tipset på epostlisten til +fri +programvareprosjektet Nikita Noark5-Core, som lager et Noark 5 +Tjenestegresesnitt. Jeg er involvert i Nikita-prosjektet og takket +være min interesse for tjenestegrensesnittsprosjektet har jeg lest en +god del Noark 5-relaterte dokumenter, og til min overraskelse oppdaget +at standard epost ikke er på listen over godkjente formater som kan +arkiveres. Høringen med frist søndag er en glimrende mulighet til å +forsøke å gjøre noe med det. Jeg holder på med +egen +høringsuttalelse, og lurer på om andre er interessert i å støtte +forslaget om å tillate arkivering av epost som epost i arkivet.
+ +Er du igang med å skrive egen høringsuttalelse allerede? I så fall +kan du jo vurdere å ta med en formulering om epost-lagring. Jeg tror +ikke det trengs så mye. Her et kort forslag til tekst:
---Viser til høring sendt ut 2017-02-17 (Riksarkivarens referanse + 2016/9840 HELHJO), og tillater oss å sende inn noen innspill om + revisjon av Forskrift om utfyllende tekniske og arkivfaglige + bestemmelser om behandling av offentlige arkiver (Riksarkivarens + forskrift).
-Svært mye av vår kommuikasjon foregår i dag på e-post. Vi + foreslår derfor at Internett-e-post, slik det er beskrevet i IETF + RFC 5322, + https://tools.ietf.org/html/rfc5322. bør + inn som godkjent dokumentformat. Vi foreslår at forskriftens + oversikt over godkjente dokumentformater ved innlevering i § 5-16 + endres til å ta med Internett-e-post.
-
Som del av arbeidet med tjenestegrensesnitt har vi testet hvordan +epost kan lagres i en Noark 5-struktur, og holder på å skrive et +forslag om hvordan dette kan gjøres som vil bli sendt over til +arkivverket så snart det er ferdig. De som er interesserte kan +følge +fremdriften på web.
- +Oppdatering 2017-04-28: I dag ble høringuttalelsen jeg skrev + sendt + inn av foreningen NUUG.
Many years ago, I wrote a GPL licensed version of the netgroup and -innetgr tools, because I needed them in -Skolelinux. I called the project -ng-utils, and it has served me well. I placed the project under the -Hungry Programmer umbrella, and it was maintained in our CVS -repository. But many years ago, the CVS repository was dropped (lost, -not migrated to new hardware, not sure), and the project have lacked a -proper home since then.
- -Last summer, I had a look at the package and made a new release -fixing a irritating crash bug, but was unable to store the changes in -a proper source control system. I applied for a project on -Alioth, but did not have time -to follow up on it. Until today. :)
- -After many hours of cleaning and migration, the ng-utils project -now have a new home, and a git repository with the highlight of the -history of the project. I published all release tarballs and imported -them into the git repository. As the project is really stable and not -expected to gain new features any time soon, I decided to make a new -release and call it 1.0. Visit the new project home on -https://alioth.debian.org/projects/ng-utils/ -if you want to check it out. The new version is also uploaded into -Debian Unstable.
+ +Jeg oppdaget i dag at nettstedet som +publiserer offentlige postjournaler fra statlige etater, OEP, har +begynt å blokkerer enkelte typer webklienter fra å få tilgang. Vet +ikke hvor mange det gjelder, men det gjelder i hvert fall libwww-perl +og curl. For å teste selv, kjør følgende:
+ ++ ++% curl -v -s https://www.oep.no/pub/report.xhtml?reportId=3 2>&1 |grep '< HTTP' +< HTTP/1.1 404 Not Found +% curl -v -s --header 'User-Agent:Opera/12.0' https://www.oep.no/pub/report.xhtml?reportId=3 2>&1 |grep '< HTTP' +< HTTP/1.1 200 OK +% +
Her kan en se at tjenesten gir «404 Not Found» for curl i +standardoppsettet, mens den gir «200 OK» hvis curl hevder å være Opera +versjon 12.0. Offentlig elektronisk postjournal startet blokkeringen +2017-03-02.
+ +Blokkeringen vil gjøre det litt vanskeligere å maskinelt hente +informasjon fra oep.no. Kan blokkeringen være gjort for å hindre +automatisert innsamling av informasjon fra OEP, slik Pressens +Offentlighetsutvalg gjorde for å dokumentere hvordan departementene +hindrer innsyn i +rapporten +«Slik hindrer departementer innsyn» som ble publiserte i januar +2017. Det virker usannsynlig, da det jo er trivielt å bytte +User-Agent til noe nytt.
+ +Finnes det juridisk grunnlag for det offentlige å diskriminere +webklienter slik det gjøres her? Der tilgang gis eller ikke alt etter +hva klienten sier at den heter? Da OEP eies av DIFI og driftes av +Basefarm, finnes det kanskje noen dokumenter sendt mellom disse to +aktørene man kan be om innsyn i for å forstå hva som har skjedd. Men +postjournalen +til DIFI viser kun to dokumenter det siste året mellom DIFI og +Basefarm. +Mimes brønn neste, +tenker jeg.
A few days ago I decided to try to help the Hurd people to get -their changes into sysvinit, to allow them to use the normal sysvinit -boot system instead of their old one. This follow up on the -great -Google Summer of Code work done last summer by Justus Winter to -get Debian on Hurd working more like Debian on Linux. To get started, -I downloaded a prebuilt hard disk image from -http://ftp.debian-ports.org/debian-cd/hurd-i386/current/debian-hurd.img.tar.gz, -and started it using virt-manager.
- -The first think I had to do after logging in (root without any -password) was to get the network operational. I followed -the -instructions on the Debian GNU/Hurd ports page and ran these -commands as root to get the machine to accept a IP address from the -kvm internal DHCP server:
+ +The Nikita +Noark 5 core project is implementing the Norwegian standard for +keeping an electronic archive of government documents. +The +Noark 5 standard document the requirement for data systems used by +the archives in the Norwegian government, and the Noark 5 web interface +specification document a REST web service for storing, searching and +retrieving documents and metadata in such archive. I've been involved +in the project since a few weeks before Christmas, when the Norwegian +Unix User Group +announced +it supported the project. I believe this is an important project, +and hope it can make it possible for the government archives in the +future to use free software to keep the archives we citizens depend +on. But as I do not hold such archive myself, personally my first use +case is to store and analyse public mail journal metadata published +from the government. I find it useful to have a clear use case in +mind when developing, to make sure the system scratches one of my +itches.
+ +If you would like to help make sure there is a free software +alternatives for the archives, please join our IRC channel +(#nikita on +irc.freenode.net) and +the +project mailing list.
+ +When I got involved, the web service could store metadata about +documents. But a few weeks ago, a new milestone was reached when it +became possible to store full text documents too. Yesterday, I +completed an implementation of a command line tool +archive-pdf to upload a PDF file to the archive using this +API. The tool is very simple at the moment, and find existing +fonds, series and +files while asking the user to select which one to use if more than +one exist. Once a file is identified, the PDF is associated with the +file and uploaded, using the title extracted from the PDF itself. The +process is fairly similar to visiting the archive, opening a cabinet, +locating a file and storing a piece of paper in the archive. Here is +a test run directly after populating the database with test data using +our API tester:
--settrans -fgap /dev/netdde /hurd/netdde -kill $(ps -ef|awk '/[p]finet/ { print $2}') -kill $(ps -ef|awk '/[d]evnode/ { print $2}') -dhclient /dev/eth0 +~/src//noark5-tester$ ./archive-pdf mangelmelding/mangler.pdf +using arkiv: Title of the test fonds created 2017-03-18T23:49:32.103446 +using arkivdel: Title of the test series created 2017-03-18T23:49:32.103446 + + 0 - Title of the test case file created 2017-03-18T23:49:32.103446 + 1 - Title of the test file created 2017-03-18T23:49:32.103446 +Select which mappe you want (or search term): 0 +Uploading mangelmelding/mangler.pdf + PDF title: Mangler i spesifikasjonsdokumentet for NOARK 5 Tjenestegrensesnitt + File 2017/1: Title of the test case file created 2017-03-18T23:49:32.103446 +~/src//noark5-tester$
After this, the machine had internet connectivity, and I could -upgrade it and install the sysvinit packages from experimental and -enable it as the default boot system in Hurd.
- -But before I did that, I set a password on the root user, as ssh is -running on the machine it for ssh login to work a password need to be -set. Also, note that a bug somewhere in openssh on Hurd block -compression from working. Remember to turn that off on the client -side.
- -Run these commands as root to upgrade and test the new sysvinit -stuff:
- -- --cat > /etc/apt/sources.list.d/experimental.list <<EOF -deb http://http.debian.net/debian/ experimental main -EOF -apt-get update -apt-get dist-upgrade -apt-get install -t experimental initscripts sysv-rc sysvinit \ - sysvinit-core sysvinit-utils -update-alternatives --config runsystem -
To reboot after switching boot system, you have to use -reboot-hurd instead of just reboot, as there is not -yet a sysvinit process able to receive the signals from the normal -'reboot' command. After switching to sysvinit as the boot system, -upgrading every package and rebooting, the network come up with DHCP -after boot as it should, and the settrans/pkill hack mentioned at the -start is no longer needed. But for some strange reason, there are no -longer any login prompt in the virtual console, so I logged in using -ssh instead. - -
Note that there are some race conditions in Hurd making the boot -fail some times. No idea what the cause is, but hope the Hurd porters -figure it out. At least Justus said on IRC (#debian-hurd on -irc.debian.org) that they are aware of the problem. A way to reduce -the impact is to upgrade to the Hurd packages built by Justus by -adding this repository to the machine:
- -- --cat > /etc/apt/sources.list.d/hurd-ci.list <<EOF -deb http://darnassus.sceen.net/~teythoon/hurd-ci/ sid main -EOF -
At the moment the prebuilt virtual machine get some packages from -http://ftp.debian-ports.org/debian, because some of the packages in -unstable do not yet include the required patches that are lingering in -BTS. This is the completely list of "unofficial" packages installed:
- -- --# aptitude search '?narrow(?version(CURRENT),?origin(Debian Ports))' -i emacs - GNU Emacs editor (metapackage) -i gdb - GNU Debugger -i hurd-recommended - Miscellaneous translators -i isc-dhcp-client - ISC DHCP client -i isc-dhcp-common - common files used by all the isc-dhcp* packages -i libc-bin - Embedded GNU C Library: Binaries -i libc-dev-bin - Embedded GNU C Library: Development binaries -i libc0.3 - Embedded GNU C Library: Shared libraries -i A libc0.3-dbg - Embedded GNU C Library: detached debugging symbols -i libc0.3-dev - Embedded GNU C Library: Development Libraries and Hea -i multiarch-support - Transitional package to ensure multiarch compatibilit -i A x11-common - X Window System (X.Org) infrastructure -i xorg - X.Org X Window System -i A xserver-xorg - X.Org X server -i A xserver-xorg-input-all - X.Org X server -- input driver metapackage -# -
All in all, testing hurd has been an interesting experience. :) -X.org did not work out of the box and I never took the time to follow -the porters instructions to fix it. This time I was interested in the -command line stuff.
-
Bitcoin is a incredible use of peer to peer communication and -encryption, allowing direct and immediate money transfer without any -central control. It is sometimes claimed to be ideal for illegal -activity, which I believe is quite a long way from the truth. At least -I would not conduct illegal money transfers using a system where the -details of every transaction are kept forever. This point is -investigated in -USENIX ;login: -from December 2013, in the article -"A -Fistful of Bitcoins - Characterizing Payments Among Men with No -Names" by Sarah Meiklejohn, Marjori Pomarole,Grant Jordan, Kirill -Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. They -analyse the transaction log in the Bitcoin system, using it to find -addresses belong to individuals and organisations and follow the flow -of money from both Bitcoin theft and trades on Silk Road to where the -money end up. This is how they wrap up their article:
- --"To demonstrate the usefulness of this type of analysis, we turned -our attention to criminal activity. In the Bitcoin economy, criminal -activity can appear in a number of forms, such as dealing drugs on -Silk Road or simply stealing someone elseâs bitcoins. We followed the -flow of bitcoins out of Silk Road (in particular, from one notorious -address) and from a number of highly publicized thefts to see whether -we could track the bitcoins to known services. Although some of the -thieves attempted to use sophisticated mixing techniques (or possibly -mix services) to obscure the flow of bitcoins, for the most part -tracking the bitcoins was quite straightforward, and we ultimately saw -large quantities of bitcoins flow to a variety of exchanges directly -from the point of theft (or the withdrawal from Silk Road).
- -As acknowledged above, following stolen bitcoins to the point at -which they are deposited into an exchange does not in itself identify -the thief; however, it does enable further de-anonymization in the -case in which certain agencies can determine (through, for example, -subpoena power) the real-world owner of the account into which the -stolen bitcoins were deposited. Because such exchanges seem to serve -as chokepoints into and out of the Bitcoin economy (i.e., there are -few alternative ways to cash out), we conclude that using Bitcoin for -money laundering or other illicit purposes does not (at least at -present) seem to be particularly attractive."
-
- -
These researches are not the first to analyse the Bitcoin -transaction log. The 2011 paper -"An Analysis of Anonymity in -the Bitcoin System" by Fergal Reid and Martin Harrigan is -summarized like this:
- --"Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a -complicated issue. Within the system, users are identified by -public-keys only. An attacker wishing to de-anonymize its users will -attempt to construct the one-to-many mapping between users and -public-keys and associate information external to the system with the -users. Bitcoin tries to prevent this attack by storing the mapping of -a user to his or her public-keys on that user's node only and by -allowing each user to generate as many public-keys as required. In -this chapter we consider the topological structure of two networks -derived from Bitcoin's public transaction history. We show that the -two networks have a non-trivial topological structure, provide -complementary views of the Bitcoin system and have implications for -anonymity. We combine these structures with external information and -techniques such as context discovery and flow analysis to investigate -an alleged theft of Bitcoins, which, at the time of the theft, had a -market value of approximately half a million U.S. dollars." -- -
I hope these references can help kill the urban myth that Bitcoin -is anonymous. It isn't really a good fit for illegal activites. Use -cash if you need to stay anonymous, at least until regular DNA -sampling of notes and coins become the norm. :)
- -As usual, if you use Bitcoin and want to show your support of my -activities, please send Bitcoin donations to my address -15oWEoG9dUPovwmUL9KWAnYRtNJEkP1u1b.
+You can see here how the fonds (arkiv) and serie (arkivdel) only had +one option, while the user need to choose which file (mappe) to use +among the two created by the API tester. The archive-pdf +tool can be found in the git repository for the API tester.
+ +In the project, I have been mostly working on +the API +tester so far, while getting to know the code base. The API +tester currently use +the HATEOAS links +to traverse the entire exposed service API and verify that the exposed +operations and objects match the specification, as well as trying to +create objects holding metadata and uploading a simple XML file to +store. The tester has proved very useful for finding flaws in our +implementation, as well as flaws in the reference site and the +specification.
+ +The test document I uploaded is a summary of all the specification +defects we have collected so far while implementing the web service. +There are several unclear and conflicting parts of the specification, +and we have +started +writing down the questions we get from implementing it. We use a +format inspired by how The +Austin Group collect defect reports for the POSIX standard with +their +instructions for the MANTIS defect tracker system, in lack of an official way to structure defect reports for Noark 5 (our first submitted defect report was a request for a procedure for submitting defect reports :). + +
The Nikita project is implemented using Java and Spring, and is +fairly easy to get up and running using Docker containers for those +that want to test the current code base. The API tester is +implemented in Python.
Archive
-
+