Secure Bootstrap is Not Enough Shoring up the Trusted Computing Base

合集下载

pscs6 configuration error

pscs6 configuration error

pscs6 configuration errorThere are several potential causes for a configuration error in Photoshop CS6. Here are a few possible solutions:1. Update Photoshop: Make sure you have the latest version of Photoshop CS6 installed. Adobe regularly releases updates that address bugs and compatibility issues.2. Reset Photoshop Preferences: Sometimes, corrupted preference files can cause configuration errors. To reset Photoshop preferences, hold down Shift+Ctrl+Alt (Windows) orShift+Option+Command (Mac) immediately after launching Photoshop. A dialog box will appear asking if you want to delete the Adobe Photoshop Settings file. Confirm this action, and Photoshop will launch with default preferences.3. Check system requirements: Confirm that your computer meets the minimum system requirements for Photoshop CS6. If your hardware or operating system falls short, it can lead to configuration errors.4. Disable conflicting software: Some software programs, particularly antivirus or firewall applications, can interfere with Photoshop's functioning. Try temporarily disabling any security software and see if the configuration error persists.5. Reinstall Photoshop: If none of the above solutions work, try uninstalling and reinstalling Photoshop CS6. This can help resolve any corrupted or missing files that may be causing the configuration error.If none of these solutions resolve the configuration error, you may need to contact Adobe Support or consult online forums for further assistance.。

elementary statistics 10th 解答

elementary statistics 10th 解答

elementary statistics 10th 解答摘要:1.概述:EBS(Elastic Block Store)服务器返回一个未知错误2.原因分析:可能的原因包括EBS 服务器配置问题、网络问题、安全组规则限制等3.解决方法:检查EBS 服务器配置、检查网络连接、调整安全组规则等4.总结:处理EBS 服务器返回未知错误的方法正文:EBS(Elastic Block Store)是亚马逊Web 服务(Amazon Web Services)的一种块存储服务,它为Amazon EC2(Elastic Compute Cloud)实例提供了持久性块存储。

在使用EBS 时,有时可能会遇到服务器返回一个未知错误的情况。

本文将分析可能的原因并提供解决方法。

一、原因分析1.EBS 服务器配置问题:EBS 服务器的配置错误可能导致返回未知错误。

例如,EBS 服务器的容量可能不足,或者EBS 服务器的软件版本可能过低。

2.网络问题:EBS 服务器与客户端之间的网络连接可能出现问题,导致返回未知错误。

这种情况下,您需要检查网络连接并确保EBS 服务器和客户端之间的网络通信正常。

3.安全组规则限制:如果您在EBS 服务器上设置了安全组规则,这些规则可能会限制客户端访问EBS 服务器。

在这种情况下,您需要检查安全组规则并确保它们允许客户端访问EBS 服务器。

二、解决方法1.检查EBS 服务器配置:首先,您需要检查EBS 服务器的配置,确保其容量足够,软件版本为最新版本。

如果发现配置问题,请及时进行调整。

2.检查网络连接:其次,您需要检查EBS 服务器与客户端之间的网络连接。

确保网络连接正常,可以尝试Ping EBS 服务器以验证网络连通性。

3.调整安全组规则:如果发现安全组规则限制了客户端访问EBS 服务器,请及时调整这些规则。

您可以在Amazon EC2 控制台中修改安全组规则,允许客户端访问EBS 服务器。

eb server is returning an unknown error -回复

eb server is returning an unknown error -回复

eb server is returning an unknown error -回复在进行网站开发和维护的过程中,我们经常会遇到各种类型的错误。

其中一种比较常见的错误是“[eb server is returning an unknown error]”,这个错误提示在使用AWS Elastic Beanstalk 服务时可能会出现。

在本文中,我将详细介绍这个错误的原因和解决方法。

首先,让我们来了解一下什么是AWS Elastic Beanstalk。

AWS Elastic Beanstalk是一项托管服务,它可帮助开发人员在AWS上快速部署和扩展应用程序。

它提供了一个易于使用的界面,以及一个自动化的环境管理系统,可以帮助我们轻松地创建、部署和管理应用程序。

当我们在使用AWS Elastic Beanstalk 部署应用程序时,有时会遇到“[eb server is returning an unknown error]”的错误。

这个错误提示表明,Elastic Beanstalk 服务器正在返回一个未知的错误。

通常情况下,这个错误是由于部署配置的一些问题或者应用程序中的bug 引起的。

为了解决这个问题,我们需要遵循一些步骤。

首先,我们应该检查部署配置是否正确。

我们可以登录AWS 控制台,选择Elastic Beanstalk 服务,然后找到相应的环境。

在环境的配置页面上,我们应该确保应用程序的配置参数和环境变量设置是正确的。

接下来,我们需要检查我们的应用程序是否存在任何错误。

可以查看应用程序的日志文件,尤其是错误日志文件,以确定是否存在任何异常或错误。

我们可以使用AWS Elastic Beanstalk 的命令行接口或者AWS 控制台中提供的日志页面来查看这些日志。

如果我们的应用程序没有明显的错误或异常,那么我们需要考虑一些其他的因素。

其中一个因素是我们的应用程序是否需要升级或者更新。

某些bug 可能会在较旧的版本中出现,而较新的版本可能已经修复了这些bug。

HPE Security ArcSift ESM软件版本6.11.0升级故障恢复指南说明书

HPE Security ArcSift ESM软件版本6.11.0升级故障恢复指南说明书

HPE Security ArcSight ESM Software Version:6.11.0Upgrade Failure Recovery for ESM Upgrades March7,2017Legal NoticesWarrantyThe only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services.Nothing herein should be construed as constituting an additional warranty.Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.The information contained herein is subject to change without notice.The network information used in the examples in this document (including IP addresses and hostnames)is for illustration purposes only.HPE Security ArcSight products are highly flexible and function as you configure them.The accessibility,integrity,and confidentiality of your data is your responsibility.Implement a comprehensive security strategy and follow good security practices.This document is confidential.Restricted Rights LegendConfidential computer software.Valid license from Hewlett Packard Enterprise required for possession,use or copying.Consistent with FAR 12.211and 12.212,Commercial Computer Software,Computer Software Documentation,and Technical Data for Commercial Items are licensed to the ernment under vendor's standard commercial license.Copyright Notice©Copyright 2017Hewlett Packard Enterprise Development,LPFollow this link to see a complete statement of copyrights and acknowledgements:https:///docs/DOC-13026Support Phone A list of phone numbers is available on the HPE Security ArcSight Technical SupportPage: https:///documents/10180/14684/esp-support-contact-listSupport Web Sitehttps:// Protect 724Community https://Contact InformationUpgrade Failure Recovery for ESM UpgradesContentsIntroduction4 Before You Begin the Recovery4 Commands to Start and Stop Components5Recovering From Logger Upgrade Failure6Recovering From Manager Upgrade Failure7Recovering From Time Zone Update Failure9Resolving Errors When Running the Recovery Scripts10Send Documentation Feedback12IntroductionThe information in this technical note applies only to upgrade failures during a supported upgrade. Refer to the Upgrade Guide for this release or the latest HPE ArcSight ESM Support Matrix for supported upgrade paths.If you encounter a failure when upgrading to ESM6.11.0,identify which component was being upgraded when the failure occurred and then follow the corresponding failure recovery process for the component in this document.Before You Begin the RecoveryBefore you begin the recovery process:l Check for failuresFirst look at the high level suite_upgrade.log log file to get an idea of which component upgrade e that information to figure out which of the Logger or Manager component's upgrade failed,and which of their log files to look in.Refer to the Upgrade Guide for the location of the log files.If Logger upgrade failed,go to"Recovering From Logger Upgrade Failure"on page 6.If Manager upgrade failed,go to"Recovering From Manager Upgrade Failure"on page 7.If MySQL tzupdate failed,go to"Recovering From Time Zone Update Failure"on page 9.Before you begin the recovery process fix whatever caused the upgrade failure.l Scripts used for failure recoveryCopy these scripts that are used during the failure recovery to/opt/work directory on the ESM system.Create the directory if it does not already exist.You can find these scripts on\\\Released\ESM\6.11.0\Upgrade Recovery Kit.The scripts are in a.tgz file.Commands to Start and Stop ComponentsThe commands to start and stop a component can be run either as user root or user arcsight.If stop does not stop a service,use tryForceStop,instead.The commands are:ArcSight Manager:/opt/arcsight/services/init.d/arcsight_services start manager/opt/arcsight/services/init.d/arcsight_services stop managerOr:/opt/arcsight/services/init.d/arcsight_services tryForceStop manager Logger:/opt/arcsight/services/init.d/arcsight_services start logger_serversTo stop Logger,first stop the loggerd process as user arcsight:/opt/arcsight/logger/current/arcsight/logger/bin/loggerd quitand then stop Logger by running:/opt/arcsight/services/init.d/arcsight_services stop logger_servers MySQL:/opt/arcsight/services/init.d/arcsight_services start mysqld/opt/arcsight/services/init.d/arcsight_services stop mysqldPostgresql:/opt/arcsight/services/init.d/arcsight_services start postgresql/opt/arcsight/services/init.d/arcsight_services stop postgresqlAll ArcSight Services:/opt/arcsight/services/init.d/arcsight_services start all/opt/arcsight/services/init.d/arcsight_services stop allmonit,which restarts services,should be stopped by now.But if it is not,you can kill all processes by using the command:kill<pid>Status of all services:/opt/arcsight/services/init.d/arcsight_services status allRecovering From Logger Upgrade FailureThe Logger upgrade logs are located as follows:Logger overall upgrade log:/opt/arcsight/logger/current/arcsight/logger/logs/logger_init_driver.log Mysql log:/opt/arcsight/logger/current/arcsight/logger/logs/initmysqluser.logPostgres log:/opt/arcsight/logger/current/arcsight/logger/logs/postgressql_upgrade.out Follow these steps to recover from a failure during the Logger upgrade:1.Make sure that no arcsight services(manager,logger_web,logger_servers,mysqld,postgresql)arerunning by running the command:/opt/arcsight/services/init.d/arcsight_services status allStop any services that are running.See"Commands to Start and Stop Components"on theprevious page for the command to do so.2.While logged in as the arcsight user,run:cd/opt/work./logger_upgrade_recover.shThis script restores the PostgreSQL database to the state prior to the upgrade using the dump file generated in the beginning of the upgrade process.The dump file to use for upgrade from ESM6.9.1c is:/opt/arcsight/logger/current/arcsight/logger/user/logger/esm691c.postgres.xxxxxx-xx_xx-xx-xx.dumpMake sure that no error is reported.The logger_upgrade_recover.sh.<TIMESTAMP>.log log file is generated in the folder where the logger_upgrade_recover.sh script is located.Itcontains the standard output and standard error from running the script.3.While logged in as user arcsight,run this command to resume the upgrade process from theLogger component upgrade/opt/work/upgrade2.sh1The parameter value of1indicates that the upgrade will resume from the Logger component.A log file called upgrade2.sh.<TIMESTAMP>.log is generated in the folder where theupgrade2.sh script is located.<TIMESTAMP>represents the time when the upgrade2.sh script was run.This log contains the standard output and standard error from running the script.Recovering From Manager Upgrade Failure Open the upgrade log file:/opt/arcsight/manager/upgrade/out/<TIMESTAMP>/logs/upgrade/server.upgrade.logEach upgrade attempt creates a new<TIMESTAMP>folder with the name of the folder containing the time that the upgrade was run.Make sure to choose the right<TIMESTAMP>folder that matches the time that you ran the upgrade.Look for the following lines in the log:l[INFO][.arcsight.install.wizard.silent.WizardTextPanelImpl] Progress:<Correct System Tables Columns>l[INFO][.arcsight.install.wizard.silent.WizardTextPanelImpl] Progress:<Upgrade system tables>l[INFO][.arcsight.install.wizard.silent.WizardTextPanelImpl] Progress:<Upgrade system indexes>l[INFO][.arcsight.install.wizard.silent.WizardTextPanelImpl] Progress:<Upgrade user functions>There are two recovery scenarios:Scenario1:If the server.upgrade.log log does not exist or you do not see any of the above lines,you can resume the upgrade by following these steps:1.Log in as user arcsight.2.Make sure that the logger,mysqld,and postgresql services are running:/opt/arcsight/services/init.d/arcsight_services status allStart the logger,mysqld,and postgresql services if they are not running.See"Commands to Start and Stop Components"on page 5.3.Make sure that the ArcSight Manager is not running.See"Commands to Start and StopComponents"on page 5.Run the following command:/opt/work/upgrade2.sh2This script generates a log file called upgrade2.sh.<TIMESTAMP>.log in the folder where the upgrade2.sh script is located.<TIMESTAMP>represents the time when you ran theupgrade2.sh script.This log contains the standard output and standard error from running the script.Scenario2:If at least one or all of the lines mentioned in"Recovering From Manager Upgrade Failure"on the previous page can be found in the server.upgrade.log logs,do the following:1.Make sure that logger,mysqld,and postgresql services are running:/opt/arcsight/services/init.d/arcsight_services status allStart the logger,mysqld and postgresql services if they are not running.See"Commands to Start and Stop Components"on page 5for the commands to do so.2.Make sure that the ArcSight Manager is not running.See"Commands to Start and StopComponents"on page 5for the commands to do so.3.Run the following command while logged in as user arcsight to restore system tables:mgr_upgrade_recover.sh<mysqlDBPassword><DumpFilePath>where<mysqlDBPassword>is the MySQL password for user arcsight and<DumpFilePath>is the last good system table dump file from your your pre-upgrade system.By default,a dump file is generated in the/opt/arcsight/manager/tmp/folder.4.While logged in as user arcsight,run the following command to resume the upgrade:/opt/work/upgrade2.sh2This script generates a log file called upgrade2.sh.<TIMESTAMP>.log in the folder where the upgrade2.sh script is located.<TIMESTAMP>represents the time when you ran theupgrade2.sh script.This log contains the standard output and standard error from running the script.Recovering From Time Zone Update Failure 1.Make sure that the ArcSight Manager is not running.If it is running,stop it.See"Commands toStart and Stop Components"on page 5.2.While logged in as user arcsight,run the following command to resume the upgrade process fromwhere it failed:/opt/work/upgrade2.sh4This script generates a log file called upgrade2.sh.<TIMESTAMP>.log in the folder where the upgrade2.sh script is located.<TIMESTAMP>represents the time when you ran theupgrade2.sh script.This log contains the standard output and standard error from running the script.Resolving Errors When Running the Recovery ScriptsResolving Errors When Running the Recovery ScriptsThis section informs you about what you need to do if when you run a recovery script,it returns an error message.Error Message:"<service_name>still running"This is an indication that some services are still running.These services need to be stopped first before proceeding because they will interfere with the upgrade process if running.Stop the services and re-run the scripts.The following are some of the options you have to stop the services.They are listed here in the order of preference,so try them in the order shown.Only if one does not work,use the next one.1.If you need to stop all the services,use arcsight_services to stop the services one by one or allat once.2.If using arcsight_services does not work,use the following commands to stop services:To stop the Manager:cd/opt/arcsight/manager/;bin/arcsight managerstopTo stop aps:/opt/arcsight/logger/current/arcsight/service/aps stopTo stop logger_httpd:/opt/arcsight/logger/current/arcsight/service/apache stopTo stop Logger:/opt/arcsight/logger/current/arcsight/logger/bin/loggerd quit/opt/arcsight/logger/current/arcsight/service/arcsight_logger stopTo stop MySQL:/opt/arcsight/logger/current/arcsight/service/mysql stopTo stop postgresql:/opt/arcsight/logger/current/arcsight/service/postgresql stopTo stop monit:/opt/arcsight/services/init.d/arcsight_services stop/opt/arcsight/services/init.d/arcsight_services uninstall/opt/arcsight/services/init.d/arcsight_services clean3.If the above commands above do not work,use the kill<pid>command to stop the runningprocesses,where<pid>is the ID of the process you want to stop.If the owner of the process is root,run the command as the root user.If you notice that services are being restarted with a different process id,it probably means that monit is still running.You can double check that monit is running with the command pgrep monit .Monit is running if this command produces any output.If it is running,you can kill the process by using the command kill <pid>.Upgrade Failure Recovery for ESM UpgradesResolving Errors When Running the Recovery ScriptsSend Documentation FeedbackIf you have comments about this document,you can contact the documentation team by email.If an email client is configured on this system,click the link above and an email window opens with the following information in the subject line:Feedback on Upgrade Failure Recovery for ESM Upgrades(ESM6.11.0)Just add your feedback to the email and click send.If no email client is available,copy the information above to a new message in a web mail client,and send your feedback to***************.We appreciate your feedback!。

dell服务器系统开机提示错误解决方法

dell服务器系统开机提示错误解决方法

dell服务器系统开机提⽰错误解决⽅法DELL 服务器有时会若硬件的改动,在开机以后会提⽰错误信息。

信息⼀般会提⽰在显⽰器上,以后举出如下信息的解决办法。

信息原因纠正措施Alert! iDRAC6 not responding.Rebooting. iDRAC6 未响应 BIOS 通信,⼀种原因是它未正常运⾏,另⼀种原因是它未完成初始化。

系统将重新引导。

请等待系统重新引导。

Alert! iDRAC6 not responding.Power required may exceed PSU wattage.Alert! Continuing system boot accepts the risk that system may power down without warning. iDRAC6 挂起。

系统在引导时,iDRAC6 被远程重设。

在交流电恢复之后,iDRAC6 需要⽐正常情况下更长的时间来引导。

断开系统的交流电源 10 秒,然后重新启动系统。

Alert! Node Interleaving disabled! Memory configuration does not support Node Interleaving. 内存配置不⽀持节点交叉,或配置已更改(例如,内存模块出现故障),导致⽆法⽀持节点交叉。

系统将继续运⾏,但没有节点交叉功能。

请确保将内存模块安装在⽀持节点交叉的配置中。

请查看其它系统信息,以获取有关可能原因的更多信息。

有关内存配置信息,请参阅内存模块⼀般安装原则。

如果问题仍然存在,请参阅系统内存故障排除。

Alert! Power required exceeds PSU wattage.Check PSU and system configuration.Alert! Continuing system boot accepts the risk that system may power down without warning. 电源设备可能不⽀持处理器、内存模块和扩充卡的系统配置。

VCP-621 VUE考试中心题库中英文对照文档

VCP-621 VUE考试中心题库中英文对照文档

VMware VCP-621 ExamQUESTION NO: 1An administrator wants to provide users restricted access. The users should only be able to perfor m the following tasks:管理员想要提供用户限制访问。

用户应该只可以执行以下任务:- Create and consolidate virtual machine snapshots 创建和巩固虚拟机快照- Add/Remove virtual disks 添加/删除虚拟磁盘- Snapshot Management 快照管理Which default role in vCenter Server would meet the administrator's requirements for the users? 哪个默认角色的vCenter服务器满足用户管理员的要求?A. Virtual machine user 虚拟机用户B. Virtual machine power user 虚拟机电力用户C. Virtual Datacenter administrator 虚拟数据中心管理员D. VMware Consolidated Backup user VMware合并备份用户Answer: BQUESTION NO: 2Which two roles can be modified? (Choose two.) 哪两个角色可以被修改?A. Administrator 管理员B. Network Administrator 网络管理员C. Datastore Consumer 数据存储用户D. Read-Only 只读Answer: B,CQUESTION NO: 3An administrator with global administrator privilegescreates a custom role but fails to assign any privileges to it.有全球管理员权限的管理员创建一个自定义的角色,但没有分配到任何权限。

WLN00100-无线局域网控制器(WLC)最优配置方法

WLN00100-无线局域网控制器(WLC)最优配置方法

【标题】无线局域网控制器(WLC)最优配置方法【译者姓名】彭国勇【校对人】【翻译完成时间】2008-1-19【原文英文标题】Wireless LAN Controller (WLC) Configuration Best Practices【原文链接】/en/US/tech/tk722/tk809/technologies_tech_note09186a008081088 0.shtml【翻译内容】目录介绍 (2)先决条件 (2)要求 (2)使用组件 (2)公约 (3)最佳做法 (3)无线/射频 (3)网络连接 (4)网络设计 (8)移动性 (8)安全 (13)总结 (16)如何把WLC 崩溃文件从WLC传输到TFTP服务器 (21)本文档提供了WLC的简短配置窍门,包括在TAC中心常见的几个有关无线统一基础设施问题。

该文档适用于大多数网络实现环境,以便最大限度减少可能发生的问题。

注意:并不是所有的网络都是等同的,因此,一些建议可能并不适用于您的网络安装环境。

总是需要核实,然后再进行一些更改。

先决条件要求思科建议您了解这些议题:∙了解如何配置无线局域网控制器( WLC )和轻量级接入点(LAP)的基本操作∙轻量级接入点协议( LWAPP )和无线安全的基本知识使用组件此文档中的信息是基于这些软件和硬件版本:∙思科2000/2100/4400系列WLC ,运行软件版本在4.2或5.0∙LWAPP的接入点, 1230,1240,1130,10x0和1510 系列本文件中所涉及的设备均在特定的实验室环境。

本文件中使用所有设备开始为默认配置,在配置网络之前,要确保了解潜在影响的任何命令。

在文件公约中,如了解更多信息请参考Cisco Technical Tips Conventions 连接。

最佳做法无线/射频对于无线/射频( RF )最佳做法如下:∙对于任何无线部署,前期必须要进行一个适当的实地勘察,以确保为无线用户提供适当的服务质量。

博科存储网络运维指导手册

博科存储网络运维指导手册

博科存储网络运维指导手册V ERSION 1.02016年7月文档修订记录文档编号:标题博科存储网络运维指导手册摘要本文档是为博科存储网络定制的运维指导手册当前版本V1.0创建日期2016-7文档作者舒磊文件名称博科存储网络维指导手册.doc修改记录日期修改人编写者摘要目录文档修订记录.................................................................................................................................... I I 目录.................................................................................................................................................. I II 前言 (1)文档目的 (1)编写环境 (1)适用人员 (1)内容范围 (1)一、网络架构描述 (2)二、主要运维场景 (4)1.端口故障 (4)具体现象 (4)故障信息确认 (4)故障处理 (7)影响范围 (14)预计处理时间 (14)验证方案 (14)2.磁盘访问故障 (15)具体现象 (15)故障信息确认 (15)故障处理 (15)影响范围 (17)预计处理时间 (17)验证方案 (17)3.端口板故障 (18)具体现象 (18)故障信息确认 (18)故障处理 (19)影响范围 (20)预计处理时间 (20)验证方案 (21)4.引擎故障 (21)具体现象 (21)故障信息确认 (21)故障处理 (22)影响范围 (24)预计处理时间 (24)验证方案 (24)5.风扇故障 (24)故障信息确认 (24)故障处理 (26)影响范围 (26)预计处理时间 (27)验证方案 (27)6.电源故障 (27)具体现象 (27)故障信息确认 (27)故障处理 (28)影响范围 (29)预计处理时间 (29)验证方案 (29)7.CR故障处理过程及方法 (29)具体现象 (29)故障信息确认 (29)故障处理 (30)影响范围 (32)预计处理时间 (33)验证方案 (33)8.边缘交换机整机故障 (33)具体现象 (33)故障信息确认 (33)故障处理 (34)影响范围 (34)预计处理时间 (34)验证方案 (34)9.核心光纤交换机整机故障 (35)具体现象 (35)故障信息确认 (35)故障处理 (35)影响范围 (36)预计处理时间 (36)验证方案 (36)三、主要变更场景 (37)1.微码升级 (37)配置备份 (38)微码升级 (38)校验微码升级 (40)微码升级常见问题 (40)2.新设备上线 (43)3.新增ZONE配置 (62)4.修改CFG、ZONE、A LIAS的名字 (64)5.删除ZONE或Z ONE的成员 (65)7.交换机扩容 (69)补充命令介绍 (71)F RAMELOG --SHOW 指令: (71)F ABRICLOG --SHOW 指令: (72)前言文档目的此文档主要用于工行博科存储网络的日常变更操作、故障处理以及存储网络的规模扩展,帮助行内博科SAN岗维护人员快速定位修复故障、熟悉日常变更操作流程,以及提高博科SAN日常运维效率。

eb server is returning an unknown error

eb server is returning an unknown error

eb server is returning an unknown error摘要:1.介绍EBS(Elastic Block Store)服务器2.阐述出现“未知错误”的原因3.解决EBS 服务器未知错误的方法4.总结正文:EBS(Elastic Block Store)服务器是Amazon Web Services(AWS)中的一项云存储服务,它为Amazon EC2(Elastic Compute Cloud)实例提供了持久性块存储。

EBS 服务器允许用户创建、删除和修改存储卷,以满足应用程序不断变化的存储需求。

在使用EBS 服务器时,有时可能会遇到“未知错误”的情况。

这种情况下,EBS 服务器无法识别或处理请求,从而导致出现问题。

出现“未知错误”的原因可能有很多,例如:1.网络问题:当EBS 服务器与客户端或Amazon S3(Simple Storage Service)之间的网络连接出现问题时,可能会导致未知错误。

2.权限问题:如果请求者没有足够的权限执行相关操作,EBS 服务器可能会返回未知错误。

3.系统问题:EBS 服务器可能会因为系统故障、软件错误等原因导致未知错误。

为了解决EBS 服务器的未知错误,可以尝试以下方法:1.检查网络连接:确保EBS 服务器与客户端或Amazon S3 之间的网络连接正常。

2.确认权限:确保请求者具有执行相关操作所需的权限。

3.修复系统问题:AWS 会定期对EBS 服务器进行维护和更新,以解决可能出现的系统问题。

如果遇到未知错误,可以等待一段时间,看看问题是否自行解决。

4.联系AWS 支持:如果以上方法都无法解决问题,可以尝试联系AWS 支持团队,寻求专业帮助。

总之,当遇到EBS 服务器返回未知错误时,需要从网络、权限和系统等方面进行排查,以找到问题的根源。

5G(NR)网络用户注册及初始注册流程

5G(NR)网络用户注册及初始注册流程

与4G(LTE)网络中UE开机(或定期)需要在核心网附着(ATTACH)相似,在5G(NR)网络中终端开机后首先在核心网(5GC)的AMF中进行注册(Registration Request)请求;获得授权后接受服务并在5GS建立用户上下文。

UE注册后才能进行连接管理和会话管理。

1.UE注册类型开机初始注册:终端刚开机接入5G网络。

移动更新注册:UE移动到新TAC小区,新TAC不属于UE已注册区域,终端发出更新注册请求。

周期性注册:周期注册定时器超时,触发周期性注册请求。

2.初始注册流程终端初始开机注册为四大步:无线接入(PART1),鉴权加密(PART2),注册请求(PART3)和注册完成(PART4);在UE初始发起时 UE与gNB建立RRC连接,并发起类型为InitialRegistration的Register Request,携带SUPI、NSSAI、安全参数等信息。

gNB收到UE的注册请求后,根据UE提供的NSSAI或者根据配置选择相应的AMF,将UE的NAS信息传递给AMF,同时携带gNB自身的位置信息、Cell ID等N2接口参数。

3.初始注册报文NrnasOtaMsgInterface-MSG1> 08 00001000 ..enNrnasOtaMsgId:nRMM-OTA-MSG-REGISTRATION-REQUEST(2048)2> 00 00000000 ..ucUpDown:0x0 (0)3> 04 00000100 ..ucVersion:0x4 (4)7> 00 00000000 ..ulLengthASN:0x23 (35)..struMsgChoice....struNRNAS-MM-MSG-STRU11> 00 00000000 ......ulNasMsgSize:0x17 (23)12> 7E 01111110 ......extended-protocol-discriminator:0x7e (126)13> 00 ----0000 ......sec-header-type:security-header-type-plain (0)0000---- ......sPare-half-octet:0x0 (0)......msg-body14> 41 01000001 T ........registrationRequest..........nAS-key-set-identifier15> 79 0------- ............tSC:native-security-context (0)-111---- ............nAS-key-set-identifier-value:key-set-identifier-value-nO-KEY (7)..........registration-type----1--- ............follow-on-request:0x1 (1)-----001 ............registration-type-value:initial-registration (1)17> 0D 00001101 L ..........nR-mobile-identity18> 01 -----001 ............type-of-identity:suci (1)----0--- ............odd-or-even-indic:even-number (0)............suci-body-000---- ..............supi-format:sUPI-Format-IMSI (0)0------- ..............spare:0x0 (0)..............supi-format-imsi21> 70 01110000 ................mcc-mnc:0x64f070 (6615152)................routing-indicator24> 00 ----0000 ................protection-Scheme-ID:protection-Null-Scheme (0)0000---- ................sPare-half-octet:0x0 (0)25> 00 00000000 ................home-Network-Pub-Key-ID:0x0 (0)30> 00 00000000 ................scheme-Output:00 00 00 00 00。

hcnabigdata-单选题

hcnabigdata-单选题

1.Spark是用以下那种编程语言实现的?A.CB.C++C.JAVAD.Scala2.FusionInsight Manager对服务的管理操作,下面说法错误的是?A.可对服务进行启停重启操作B.可以添加和卸载服务C.可以设置不常用的服务隐藏或显示D.可以查看服务的当前状态4. FusionInsight HD的Loader在创建作业时,Connector有什么作用?A.确定有哪些转换步骤B.提供优化参数,提高数据导入/导出性能C.配置作业如何与外部数据进行连接D.配置作业如何与内部数据进行连接B.hdfs fsck /-deleteC.hdfs dfsadmin -reportD.hdfs balancer - threshold 16. YARN中设置队列QueueA的最大使用资源量,需要配置哪个参数?A.yarn_scheduler.capacity.root. er-limit-factorB.yarn_scheduler.capacity.root. QueueA.minimum-user-limit-factorC.yarn_scheduler.capacity.root. QueueA.stateD.yarn_scheduler.capacity.root. QueueA.maximum- capacity7. FusionInsight Manager对服务的配置功能说法不正确的是A、服务级别的配置可对所有实例生效B、实例级别的配置只针对本实例生效C、实例级别的配置对其他实例也生效D、配置保存后需要重启服务才能生效8.关于fusioninsight HD安装流程,说法正确的是:A安装manager〉执行precheck>执行preinstall>LLD工具配置〉安装集群〉安装后检查〉安装后配置B LLD工具配置〉执行preinstall〉执行precheck〉安装manager〉安装集群〉安装后检查〉安装后配置C安装manager> LLD工具配置〉执行precheck〉执行preinstall〉安装集群〉安装后检查〉安装后配置D LLD工具配置〉执行preinstall〉执行precheck〉安装集群〉安装manager〉安装后检查〉安装后配置9.关于Kerberos部署,描述正确的是?A.Kerberos仅有一个角色B.Kerberos服务在同一个节点上有两个实例C.Kerberos服务采用主备模式部署D.Kerberos服务必须和LDAP服务部署在同一个节点10.某银行规划fusioninsight HD集群有90个节点,如果控制节点规划了3个,那集群中数据节点推荐规划多少最为合理?B.85C.90D.8618.用户集群有150个节点,每个节点12块磁盘(不做RAID,不包括OS盘),每块磁盘大小1T,只安装HDFS,根据建议,最大可存储多少数据?A、1764TBB、1800TBC、600TBD、588TB20.FusionInsight HD节点不支持那种主机操作系统?A、Suse 11.1B、RedHat 6.5C、CentOS 6.4D、Ubuntu 11.0421.HBase shell命令中,哪个可以查看当前登陆的用户和权限组?C.whoD.get_user23. Fusionsight HD manager界面Hive日志收集,哪个选项不正确?A、可指定实例进行日志收集,比如制定单独收集METASTORE的日志B、可指定时间段进行日志收集,比如只收集2016-1-1到2016-1-10的日志C、可指定节点IP进行日志收集,例如仅下载某个IP的日志D、可指定特定用户进行日志收集,例如仅下载userA用户产生的日志27. FusionInsight HD三层组网适合多少节点的集群规模?A、30节点以下B、100节点以下C、100-200 节点D、200节点以上 30.Hadoop系统中关于客户端向HDFS文件系统上传文件说法正确的是?A. 客户端的文件数据经过NameNode传递给DataNodeDataNode 中C.客户端根据DataNode的地址信息,按顺序将整个文件写入每一个DataNode中,然后由将文件划分为多个BlockD. 客户端只上传数据到一个DataNode,然后由NameNode负责Block复制31. FusionInsight HD 系统中,HBase 的最小处理单元是 region,user region 和region server之间的路由信息是保存在哪?A.ZookeeperB.HDFSC.MasterD.Meta 表34.通过FusionInsight Manager不能完成以下哪个操作?A、安装部署B、性能监控C、权限管理D、虚拟机分配39.关于Hbase的Region分裂流程split的描述不正确的是?A、Split过程中并没有真正的将文件分开,仅仅是创建了引用文件B、Split为了减少region中数据大小,从而将一个region分裂成两个regionC、Split过程中该表会暂停服务D、Split过程中被分裂的region会暂停服务43.关于FusionInsight Manager关键特性,说法正确的是?A.能够针对整个集群,某个服务器进行健康检查,不能够针对节点进行健康检查B.Manager引入角色的概念,采用RBAC的方式对系统进行权限管理C.整个系统使用Kerberos管理用户,使用Ldap进行认证,通过CAS实现单点登录D.对于健康检查结果,不能够导出检查报告,只能够在线查看44.查看kafka某topic的partition详细信息时,使用如下哪个命令?A.bin/kafka-topics.sh - createB.bin/kafka-topics.sh - listC.bin/kafka-topics.sh -describeD.bin/kafka-topics.sh -delete45.FusionInsight Hadoop集群中,在某个节点上通过df-hT查询,看到的分区包含以下几个: /var/log Raid 1/srv/BigData Raid 1/srv/BigData/hadoop/data5 Non-Raid/Raid0/srv/BigData/solr/solrserver3Non-Raid/Raid0/srv/BigData/dbdata_om Raid 1这些分区所对应磁盘最佳Raid级别的规划组合是?A、RaidO、 Raid1、 RaidO、 Non-Raid、 Raid-1B、Raid1、 Raid1、 Non-Raid、 Non-Raid、 Raid1C、RaidO、 RaidO、 RaidO、 RaidOD、Non-Raid、Non-Raid、Non-Raid、Non-Raid、Raid146.FusionInsigh HD 系统中 HDFS 默认 Block Size 是多少?A、32MB、64MC、128MD、256M47.FusionInsigh HD部署时,同一集群内的Flume server节点建议至少部署几个?A、1B、2C、3D、448.FusionInsight HD系统设计日志不可以记录下面那些操作?A、手动清除告警B、启停服务实例C、删除服务实例D、查询历史监控50.Hadoop的HBase不适合哪些数据类型的应用场景?A.大文件应用场景B.海量数据应用场景C.高吞吐率应用场景D.半结构化数据应用场景53.安装FusionInsight HD的Streaming组件时,Nimbus角色要求安装几个节点?A、1B、2C、3D、454.关于FusionInsight HD中Loader作业描述正确的是?A.Loader将作业提交到Yam执行后,如果Loader服务出现异常,则此作业执行失败B.Loader将作业提交到Yame执行后,如果某个Mapper执行失败,能够自动进行重试C.Loader作业执行失败,将会产生垃圾数据,需要用户手动清除D.Loader将作业提交到Yam执行后,在该作业执行完成前,不能再提交其他作业56. Hadoop平台中,要查看YARN服务中一个application的信息,通常需要使用什么命令?A、 containerB、applicationattemptC、jarD、 application57.在FusionInsight集群规划部署时,建议管理节点最好部署()个,控制节点最少部署(),数据节点最少部署()A.1,2,2B.1,3,2C.2,3,1D.2,3,359.FusionInsight HD安装过程中,执行Preinstall操作不能完成哪项功能?A.修改OS,确保OS满足FusionInsight HD的安装要求B.安装 MangerC.格式化分区D.安装OS缺失的RPM包60.SolrCloud模式是集群模式,在此模式下Solr服务强依赖于一下哪个服务?A.HbaseB.HDFSC.ZooKeeperD.Yarn 62. Hadoop的MapReduce组件擅长处理哪些场景的计算任务?A、迭代计算B、离线计算C、实时交互计算D、流式计算67.以下哪些数据不属于半结构化数据?A.HtmlB.XmlC.二维表D. Json68.关于 FusionInsight HD Streaming 客户端的 Supervisor 描述正确的是?A、Supervisor负责资源分配和资源调度B、Supervisor负责接管Nimbus分配的任务,启动和停止属于自己管理的worker进程C、Supervisor是运行具体处理逻辑的进程D、Supervisor是一个Topology中接收数据然后执行处理的组件70.关于 FusionInsight Manager,说法错误的是?A、NTP sever/client负责集群内各节点的时钟同步B、通过FusionInsight Manager,可以对HDFS进行启停控制、配置参数C、FusionInsight Manager所有维护操作只能够通过WebUI来完成,没有提供Shell维护命令D、通过FusionInsight Manager,可以向导式安装集群,缩短集群部署时间74. FusionInsight HD系统中如果修改了服务的配置项,不进行服务重启,该服务的配置状态是什么状态?A、SYNCHRONIZEDB、EXPIREDC、CONFIGURINGD、UNKNOWN80. Spark应用在运行时,Stage划分的依据是哪个?A、taskB、taskSet84.采用Flume传输数据过程中,为了防止因Flume进程重启而丢失数据,推荐使用以下哪种channel类型?A、Memory ChannelB、File ChannelC、JDBC ChannelD、HDFS Channel89. Fusioninsight HD的Hbase中一张表包含以下几个Region[10,20),[20,30),[30,+8),分别编号为①,②,③,那么,11, 20, 222 分别属于哪个 Region?A、①①③B、①②③C、①②②D、①①②90.关于Hive建表基本操作描述正确的是?A.创建外部表时需要指定external关键字B.一旦表创建好,不可再修改表名C.一旦表创建好,不可再修改列名D. 一旦表创建好,不可再增加新列92.Fusioninsight HD系统中,如果Solr索引默认存放在HDFS上,以下理解正确的有?A. 不需要考虑各solrserver实例上创建了多少shardB.为保证数据可靠性,创建索引时必须创建多RelicaC.通过HDFS读取索引时占用磁盘IO,因此不建议Solr实例与DataNode部署在同一节点上D. 当Solr服务参数INDEX_STORED_ON_HDFS值为HDFS时,创建Collection的索引就默认存储在HDFS上。

CISCO catalyst 2960交换机配置方法

CISCO catalyst 2960交换机配置方法

CISCO catalyst 2960交换机配置方法一、连接交换机1、将交换机配置电缆连接于交换机的通讯配置端口(console口)和计算机的串口(可以直接连接到SCADA服务器后面的串口上)。

2、点击Start(开始)> Programs(程序)> Accessories(附件)>Cojhunications(通讯)> HyperTerminal(超级终端),运行HyperTerminal。

3、在Connection Description对话框中,为这一连接输入一个名称(自己识别方便即可),点击“ok”。

4、在Icon对话框,点击相应的图标并确认。

5、在Connect To对话框,选择正在被使用的串口(一般为COM1口),并确认。

6、在Properties对话框配置端口如下:Bits per second: 9600Data Bits: 8Parity: NONEStop bits: 1Flow control: Xon/Xoff通讯端口默认为COM1,点击“ok”。

7、打开交换机电源。

二、配置交换机1、在新交换机上电启动后,会出现向导配置模式(若没有请在SWITCH>提示符后输入setup即可启动向导配置模式),在如下部分输入相应的值(粗斜体),并回车。

Would you like to enter the initial configuration dialog? [yes/no]: yAt any point you may enter a question mark '?' for help.Use ctrl-c to abort configuration dialog at any prompt.Default settings are in square brackets '[]'.Basic management setup configures only enough connectivityfor management of the system, extended setup will ask youto configure each interface on the systemWould you like to enter basic management setup? [yes/no]: yConfiguring global parameters:2、为交换机输入一个“host name”,可以自己先任意写一个,要便于识别就行,因为当用TFTP软件恢复之前备份的配置后,hostname也会恢复到原先的设置,在如下部分输入相应的值(粗斜体),并回车,以京海为例:Enter host name [Switch]: jh_switch01 (京海第一路交换机,即FTE网络A交换机)The enable secret is a password used to protect access toprivileged EXEC and configuration modes. This password, afterentered, becomes encrypted in the configuration.Enter enable secret(要求输入特权模式进入密令): *******The enable password is used when you do not specify anenable secret password, with some older software versions, andsome boot images.Enter enable password(要求输入特权模式进入密码): *******The virtual terminal password is used to protectaccess to the router over a network interface.Enter virtual terminal password: *******Configure SNMP Network Management? [no]: N3、下面是显示信息的一部分,太长没有完全抄录,无需操作,可压空格键完成显示。

诺西NODE_B常见告警分析及处理建议

诺西NODE_B常见告警分析及处理建议

NODE_B常见告警分析及处理建议告警分析及处理建议1、Additional 2 E1/T1 licences missing告警分析:NB上缺少增加E1/T1容量的licence key。

处理建议:将licence容量补全。

通常BBU单元上默认开放2个E1端口,licence容量每增加1即多开放一个E1,以此类推。

采用local打入或者远端(DCN通的情况下)打入均可。

该告警在5分钟左右会自动cancel。

2、AIS on unit 1, interface 1告警分析:入局2M信号AIS告警,是指传输未分配业务。

处理建议:通知传输机房,告知告警内容,申请分配传输业务。

3、Antenna line device failure告警分析:天线设备故障。

处理建议:目前该告警暂无有效的处理手段,现阶段只能通过更换发生告警的RRU单元来解决该告警。

TIER3已将此告警作为NB重点关注的几个告警之一。

4、Antenna line failure告警分析:天线故障。

处理建议:处理该告警的步骤是:Site Manager --->Antenna--->antennaline management,在弹出的对话窗中将3GPP/AISG Commumication下的3个选项全部disabled,同时将DC voltage下6个选项全部disabled,然后send parameter,同时重启site。

即可清除该告警。

5、Baseband bus failure告警分析:基带总线故障。

处理建议:首先断电重启NODE_B设备,升级软件包至WN5.0 12.4_102版本,观察基站工作状态约15分钟,如果告警再次出现,更换BBU单元。

6、BTS master clock tuning failure告警分析:基站主时钟调谐错误。

处理建议:处理该告警的步骤:Configuration--->BTS Configuration--->Fast Tune BTS Clock,同时检查基站的同步设置、以及传输设置和传输是否有误码等。

nacos not initialize notifycenter -回复

nacos not initialize notifycenter -回复

nacos not initialize notifycenter -回复题目:Nacos未能成功初始化NotifyCenter问题解析引言:近年来,随着云计算和微服务的兴起,Nacos(阿里巴巴发布的一款全新一体化开源中间件平台)作为服务注册和配置中心的选择,受到了越来越多的关注。

然而,在使用过程中,有时会遇到"Nacos未能成功初始化NotifyCenter"的问题。

本文将逐步解析该问题,并提供解决方案和建议。

首先,我们将从Nacos的NotifyCenter模块开始介绍。

第一节:Nacos的NotifyCenter模块NotifyCenter是Nacos中非常重要的一个模块,它负责实现配置变更的订阅和通知功能。

在配置修改或更新时,NotifyCenter将负责将变更通知给各个订阅者,从而确保配置的实时更新。

第二节:Nacos未能成功初始化NotifyCenter问题的原因在实际使用中,有时我们可能会遇到"Nacos未能成功初始化NotifyCenter"的问题。

有以下几个常见的原因可能导致这个问题的出现:1. 配置错误:Nacos的NotifyCenter模块依赖于正确配置的信息。

在Nacos配置文件中,我们需要正确设置NotifyCenter的相关参数,包括通知类型、端口号、监听地址等。

如果这些信息配置错误或遗漏,就有可能导致Nacos无法正常初始化NotifyCenter。

2. 网络问题:NotifyCenter需要与其他模块进行通信,包括订阅者和提供者之间的通信。

如果服务器的网络环境不稳定或存在障碍,就有可能导致通信失败,进而影响NotifyCenter的正常初始化。

3. 版本兼容性问题:有时候,使用的Nacos版本可能不兼容NotifyCenter 模块的初始化流程,导致初始化失败。

这可能是由于版本间的API变化或新版本中的bug引起的。

第三节:解决Nacos未能成功初始化NotifyCenter问题的方法针对上述可能导致Nacos未能成功初始化NotifyCenter的原因,我们可以采取以下方法来解决该问题:1. 检查配置文件:首先,我们需要仔细检查Nacos的配置文件,确保其中的NotifyCenter相关参数正确配置。

metashape bad allocation -回复

metashape bad allocation -回复

metashape bad allocation -回复以下是一篇关于"metashape bad allocation"的1500-2000字的文章,逐步回答这个主题:Metashape是一款专业的三维数据处理软件,常用于地理信息系统、测绘、建筑和考古学等领域。

然而,有时用户在使用Metashape时会遇到"bad allocation"的错误提示。

1. 了解"bad allocation"错误:在C++编程语言中,"bad allocation"是一种内存分配错误。

当程序尝试分配动态内存时,如果操作系统无法满足程序所需的内存大小,就会发生此错误。

2. 探索可能的原因:Metashape的"bad allocation"错误可能有以下几个原因:a. 大规模数据处理:Metashape在处理大规模数据时可能需要大量的内存,超出了计算机可用的总内存大小。

这导致操作系统无法为程序提供所需的内存大小,从而出现错误。

b. 硬件限制:较老的计算机或硬件设备可能没有足够的内存资源来满足Metashape的需求,从而导致"bad allocation"错误。

c. 内存泄漏:Metashape可能存在内存泄漏的问题,即程序在使用完内存后没有正确释放内存空间。

这将导致内存资源耗尽,进而产生"bad allocation"错误。

3. 解决"bad allocation"错误:为了解决Metashape的"bad allocation"错误,可以采取以下步骤:a. 升级硬件:首先,考虑升级计算机的内存大小。

增加可用的内存资源可以帮助程序处理更大规模的数据,减少"bad allocation"错误的发生。

b. 降低数据规模:如果硬件升级不可行,可以尝试减少Metashape处理的数据规模。

datasourcedisableexception takelast -回复

datasourcedisableexception takelast -回复

datasourcedisableexception takelast -回复什么是"datasourcedisableexception takelast"异常,以及在该异常出现时应该如何处理。

“datasourcedisableexception takelast”是一个在软件开发中可能会发生的异常。

它通常是指一个数据源被禁用或无法访问的情况,并且"takelast"部分表示系统将采取的措施,即选择最后一次有效的数据源。

当应用程序或软件依赖于数据源进行数据收集、处理或呈现时,这种异常可能会导致程序无法执行,从而影响用户体验以及系统的正常运行。

出现"datasourcedisableexception takelast"异常的原因可能有很多。

例如,数据源可能由于网络连接问题、配置错误、权限限制、硬件故障或数据库错误而被禁用。

当数据源无法提供所需的数据或服务时,系统将抛出这个异常,并且可能会选择从备用数据源中获取数据以避免程序中断。

处理这种异常需要一定的技术和经验。

下面将逐步说明如何处理这种异常。

第一步,确定异常的根本原因。

首先,需要检查网络连接是否正常。

如果网络连接存在问题,可以尝试重新连接或修复网络。

如果数据源是基于数据库的,还应检查数据库的连接状态和配置是否正确。

如果数据源受到权限限制,需要确保应用程序有足够的权限来访问数据源。

通过排除可能的故障,可以更容易地定位和解决问题。

第二步,备份数据源。

在发现数据源出现异常时,系统可以采取预设的措施来选择最后一次有效的数据源。

这意味着系统会从备用数据源中获取数据以进行后续的处理或呈现。

备用数据源可以是另一个相同类型的数据源,或者是一个不同类型的数据源,只要能提供所需的数据即可。

第三步,提供错误提示和解决方案。

当系统抛出"datasourcedisableexception takelast"异常时,用户需要清楚地了解发生了什么错误以及如何解决问题。

StarWind Virtual SAN 硬件无法VM存储快速入门指南:创建HA LSFS设备说明书

StarWind Virtual SAN 硬件无法VM存储快速入门指南:创建HA LSFS设备说明书

Quick Start Guide: Creating HA LSFS Device with StarWind Virtual SANtrADeMArKS“StarWind”, “StarWind Software” and the StarWind and the StarWind Software logos are trademarks of StarWind Software which may be registered in some jurisdictions. All other trademarks are owned by their respective owners.CHANGeSThe material in this document is for information only and is subject to change without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, StarWind Software assumes no liability resulting from errors or omissions in this document, or from the use of the information contained herein. StarWind Software reserves the right to make changes in the product design without reservation and without notification to its users.teCHNICAL SUPPOrt AND SerVICeSIf you have questions about installing or using this software, check this and other documents first - you will find answers to most of your questions on the Technical Papers webpage or in StarWind Forum. If you need further assistance, please contact us. COPyrIGHt ©2009-2014 StArWIND SOFtWAre INC.No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of StarWind Software.CONteNtSIntroduction (4)Creating Log-Structured File System (LSFS) Device (5)Contacts (16)INtrODUCtIONStarWind Virtual SAN™ is a native Windows hypervisor-centric hardware-less VM storage solution. It creates a fully fault tolerant VM-centric and high performing storage pool purpose built for the virtualization workloads by mirroring existing server’s storage and RAM between the participating storage cluster nodes. The mirrored storage resource is then connected to all cluster nodes treated just as local storage by both hypervisors and clustered applications. Fault tolerance is achieved by providing multipathed access to all storage nodes. StarWind Virtual SAN delivers supreme performance compared to any dedicated SAN solution since it runs locally on the hypervisor and all IO is processed by local RAM, SSD cache, and disks and never bottlenecked by storage fabric. Also, StarWind Virtual SAN includes the Log-Structuring File System technology, which coalesces small random writes, typical for virtualized environment, into the stream of big sequential writes. As the result the performance is increased and the Flash life is prolonged.This guide is intended for experienced Windows system administrators and IT professionals who would like to configure StarWind Virtual SAN solution. It provides detailed instructions on how to create two nodes High Availability device powered by Log-Structured File System that will run on top of two Windows Server 2012 R2 physical hosts.A full set of up-to-date technical documentation can always be found here, or by pressing the Help button in the StarWind Management Console.For any technical inquiries please visit our online community, Frequently Asked Questions page, or use the support form to contact our technical support department.Cr eAtING LOG-StrUCtUreD FILe SySteM (LSFS) DeVICe1. Launch the StarWind Management Console: double-click the StarWind tray icon. Please note: StarWind Management Console cannot be installed on an operating system without a GUI. You can install it on any of the GUI-enabled Windows Editions including the desktop versions of Windows.If StarWind Service and Management Console are installed on the same server, the Management Console will automatically add the local StarWind instance to the Console tree after the first launch. Then, the Management Console automatically connects to it using the default credentials. In order to add remote StarWind servers to the console use the Add Server button on the control panel.2. StarWind Management console will ask you to specify the default storage pool on the server you’re connecting to for the first time. Please configure the storage pool to use the one of the volumes you’ve prepared earlier. All the devices created through the Add Device wizard will be stored on it.Press Yes button to configure the storage pool. Should you require to change the storage pool destination, press Choose path… and point the browser to the required disk.Note: Each of the arrays which will be used by StarWind Virtual SAN to store virtual disk images has to meet the following requirements:• Should be initialized as GPT• Should have a single NTFS-formatted partition• Should have a drive letter assigned3. Select the StarWind server where you wish to create the device.4. Press the Add Device (advanced) right clicking on the server.5. Add Device Wizard will appear. Select Hard disk device and click Next.6. Select Virtual disk and click Next.7. Specify the virtual disk location and size.Note: Maximum available LSFS storage that can be addressed by Starwind is 12TB (actual data that is stored on the LSFS image can be more, than 12TB because of deduplication). The LSFS image can also be bigger than 12TB due to architecture of LSFS.Click Next.8. Specify virtual disk options.9. You may click Options button and choose Deduplication.Click OK and Next.10. Define the caching policy and specify the cache size (in MB).Note: we recommended to use 1Gb cache per 1Tb storage. With deduplication enabled - 4,5Gb cache per 1Tb storage.Click Next.11. Define the L2 caching policy and size if necessary.Note:We recommend the use of SSD for L2 cache and when used, the formula will be 1Gb (sum of L1 and L2) cache per 1Tb storage. With deduplication enabled - 4,5Gb cache per 1Tb storage.12. Specify the destination directory for the L2 cache, if any.13. Specify target parameters.Select the Target Name checkbox to enter a custom name of a target. Otherwise, the name will be generated automatically based on the target alias.Click Next to continue.14. Click Create to add a new device and attach it to the target.15. Then click OK to close the wizard.16. Right-click on the device you just created and select Replication Manager.17. Replication Manager Window will appear. Press the Add Replica button.18. Select Synchronous two-way replication.Next to proceed.19. Specify the partner server IP Address or Host name.Default StarWind management port is 3261. If you have configured a different port, please enter it in the Port number field.Click Next.20. Choose Create new Partner Device.Next.21. You can specify path and name of the partner device.Click Next.22. You can place your LSFS image into RAM, but note that this is an experimental feature.Click Next.23. On this screen you can select the synchronization and heartbeat channels for the HAdevice.You can also modify the ALUA settings and modify the target name of the device.Click Change network settings....24. Specify the interfaces for synchronization and Heartbeat.OK. Then click Next.25. Press the Create Replica button. Then click Finish to close the wizard.26. The added device will appear in the StarWind Management Console.Customer Support Portal:Support Forum:Sales: General Information:US HeadquartersPhone:Fax:EMEA and APACPhone:Voice Mail:/support /forums ***************************************************1-617-449-77171-617-507-5845+44-0-2071936727+44-0-2071936350+33-0-977197857 (French)1-866-790-2646StarWind Software Inc.301 Edgewater Place, Suite 100,Wakefield, MA 01880, USA CONtACtS。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Secure Bootstrap is Not Enough:Shoring up the Trusted Computing BaseJames Hendricks Carnegie Mellon University5000Forbes AvePittsburgh,PA James.Hendricks@Leendert van DoornIBM T.J.Watson Research Center19Skyline DriveHawthorne,NYleendert@AbstractWe propose augmenting secure boot with a mechanism to protect against compromises tofield-upgradeable de-vices.In particular,secure boot standards should verify thefirmware of all devices in the computer,not just de-vices that are accessible by the host CPU.Modern comput-ers contain many autonomous processing elements,such as disk controllers,disks,network adapters,and coproces-sors,that all havefield-upgradeablefirmware and are an essential component of the computer system’s trust model. Ignoring these devices opens the system to attacks similar to those secure boot was engineered to defeat.1IntroductionAs computers continually integrate into our business and personal lives,corporate and home users are storing more sensitive data on their personal computers.However, widespread Internet usage has exposed more computers to attack and provided would-be attackers with the informa-tion needed to scale such attacks.To protect this increas-ingly sensitive data from these increasingly prolific attacks, next-generation personal computers will be equipped with special hardware and software to make computing more worthy of trust.Such trustworthy computing will provide security guarantees never before seen on personal comput-ers.Trustworthy computing requires a Trusted Computing Base(TCB)—a core set of functionality that is assumed secure—to implement the primitives that provide secu-rity guarantees.The TCB typically consists of hardware,firmware,and a basic set of OS services that allow each ap-plication to protect and secure its data and execution.Se-curity of the bootstrap mechanism is essential.Modeling the bootstrap process as a set of discrete steps,if an ad-versary manages to gain control over any particular step, no subsequent step can be trusted.For example,consider a personal computer with a compromised BIOS.The BIOS can modify the bootstrap loader before it is executed,which can then insert a backdoor into the OS before the OS gains control.This secure bootstrap problem is well-known and vari-ous solutions have been proposed to deal with it.For exam-ple,Arbaugh et al.[1]propose a mechanism whereby the first step in the bootstrap process is immutable and there-fore trustworthy.This trust is then bootstrapped all the way up to the operating system by checking a digital signaturefor each bootstrap step before it is executed.For exam-ple,the BIOS could verify a public-key signature of the disk’s boot sector to ensure its authenticity;the boot sector could then verify the public-key signature of the OS boot-strap code,which could likewise verify the privileged OS processes and drivers.Though such an approach would ob-viously not guarantee the security of the OS code,it would at least guarantee the authenticity.A weakness to this approach is that the BIOS in mostpersonal computers is writable.One solution is to store the BIOS on a ROM.However,a ROM-based approach is by definition inflexible,preventing BIOS updates that may be required to support maintenance applications,net-work booting,special devices,or CPU microcode updates.Furthermore,the use of digital signatures introduces a key management problem that is amplified by the requirement to store the initial public key in ROM.To ameliorate these problems,a secure hardware device can be used both to ver-ify a programmable BIOS and to authenticate this verifica-tion.This is the approach taken by the Trusted Computing Group(TCG)[13],described in Section2.Both the Arbaugh et al.and TCG based approaches share a CPU-centric view of the system that is inadequate for establishing a trustworthy system.In Section3,we argue that,though the current specification goes to much trouble to defend against attacks utilizing the CPU,it fails to defend against similar attacks utilizing peripherals,and in Section4we argue that such attacks are not much more difficult.Section5describes how the current specification could be improved with a minor augmentation.2The Current ApproachThe Trusted Computing Group advocates using a secure hardware device to verify the boot sequence and authenti-cate this verification.Such a device could provide assur-ance even to a remote user or administrator that the OS at least started from a trustworthy state.If an OS security hole is found in the future,the OS can be updated,restarted,and re-verified to start from this trustworthy state.An exam-ple of this kind of device is the Trusted Platform Module (TPM)[14].Such a device has been shown to enable a re-mote observer to verify many aspects of the integrity of a computing environment[8],which in turn enables many of the security guarantees provided by more complex systems, such as Microsoft’s NGSCB(formerly Palladium)[4].The following is a simplified description of how the 1Proceedings of the Eleventh SIGOPS European Workshop, ACM SIGOPS, Leuven, Belgium, September 2004.Figure1:Hashes of the bootstrap code,operating system,and applications are stored in the Platform Configuration Registers, which can later be queried to verify what was executed.TPM can be used to verify the integrity of a computing system(see the specification for details[15]).The TPM measures data by hashing the data.It extends a measure-ment to a Platform Configuration Register(PCR)by hash-ing together the current value of the PCR and the hash of the data and storing the result in the PCR.To measure to a PCR,the TPM measures data and extends it to a PCR.All code must be measured before control is transferred to it. When the computer is reset,a small and immutable code segment(the Core Root of Trust for Measurement,CRTM) must be given control immediately.The CRTM measures all executablefirmware physically connected to the moth-erboard,including the BIOS,to PCR[0](PCR[0]is thefirst of sixteen PCRs).The CRTM then transfers control to the BIOS,which proceeds to measure the hardware configu-ration to PCR[1]and option ROM code to PCR[2]before executing option ROMs.Each option ROM must measure configuration and data to PCR[3].The BIOS then measures the Initial Program Loader(IPL)to PCR[4]before transfer-ring control to it(the IPL is typically stored in thefirst512 bytes of a bootable device,called the Master Boot Record). The IPL measures its configuration and data to PCR[5]. PCR[6]is used during power state transitions(sleep,sus-pend,etc.),and PCR[7]is reserved.The remaining eight PCRs can be used to measure the kernel,device drivers, and applications in a similar fashion(the post-boot envi-ronment),as Figure1depicts.At this point,the bootstrap code,operating system,and perhaps a few applications have been loaded.A remote observer can verify precisely which bootstrap code or op-erating system has been loaded by asking the TPM to sign a message with each PCR(the TPM QUOTE command); this operation is called attestation.If the TPM,operating system,bootstrap code,and hardware are loaded correctly, the remote observer can trust the integrity of the system. The TPM should be able to meet FIPS140-2requirements[14];hence,it is reasonably safe to assume the TPM istrustworthy(see FIPS140-2requirements for details[16]).The integrity of the operating system and bootstrap code is verified by the remote observer;hence,the operating sys-tem and bootstrap can be trusted to be what the remote ob-server expects.The hardware,however,is not verified;for-tunately,hardware is more difficult to spoof than software.From this,we can describe attacks that are and are not defended against.Attacks that exploit a known hole in the OS can be detected at attestation.Attacks that modify the BIOS,option ROMs,or IPL are detected at boot.Simi-larly,upgrades and repairs to these components are verifi-able.However,physical attacks on the TPM(such as inva-sive micro-probing or EM attacks[7])or other components (such as RAM bus analysis)are not detected.Furthermore, malicious hardware may provide an avenue of attack;a ma-licious processor would not be detected by attestation,yet it could circumvent most security policies.For Microsoft’s NGSCB,an alternate secure boot method is proposed[15].This method requires the addition of a new operation to the CPU instruction set architecture that resets the CPU and ensures the execution of a secure loader without reseting the I/O bus.This method allows the secure loader to gain full control of the CPU without the need to reinitialize the I/O subsystem.While this method reduces its reliance on the BIOS,it still assumes that the CPU is in control of all executable content in the system, which,we argue,is aflawed assumption.3A Security Vulnerability in This SystemThough it is relatively safe to trust hardware circuits(be-cause mask sets are expensive to develop,etc.),there is less sense in trustingfirmware.Firmware is dangerous be-cause it can be changed by viruses or malicious distribu-tors.Though current attestation methods detect attacks on the OS,BIOS,and option ROMs,attacks on otherfirmware may be no more difficult.Firmware with direct access to memory is no less dangerous than the BIOS or the kernel, and evenfirmware without direct memory access may re-quire trust.Hence,though peripherals and memory are im-plicitly proposed to be a part of the TCB,we do not believe they are currently adequately verified.Consider a compromised disk.For example,assume the delivery person is bribed to allow an attacker to“bor-row”the disk for a few hours to be returned in“perfect”condition.This disk could collect sensitive data;mod-ern disks are large enough that the compromisedfirmware could remap writes so as to never overwrite data(similar to CVFS[10]).On a pre-specified date,or when the disk starts to run low on storage,the disk can report disk errors.The disk could ignore commands to perform a low-level format or otherwise erase its data while being prepared for warranty service.Once again the bribed delivery person could allow the attacker physical access,literally deliver-ing gigabytes of sensitive data to the attacker’s doorstep. 2The attacker could then reset thefirmware to act normal for a few months,leading the disk vendor to send the disk to another customer because it believes this customer mis-diagnosed the problem.Generalized,the above attack takes place in three phases:first,the device is compromised;second,the device com-promises the integrity of data;third,the device delivers data to the attacker.There are many techniques to perform each of these steps,and security is violated even if the third step does not occur.3.1Compromising a DeviceThefirst step is to compromise the device.We con-sider only attacks onfirmware for autonomous comput-ing engines that are not under control of the main CPU. These include the operating systems found on disks[2]and some network cards[6].We rule out attacks that replace parts of the hardware for several reasons:replacement re-quires physical access;unlike overwritingfirmware,re-placement costs money;the cost of fabricating a custom device is likely much greater than the cost of modifying the firmware;etc.Furthermore,we assume the manufacturer is not malicious.The most direct attack is to provide afirmware update to the user and use social engineering to convince the user to install this update.Or consider the man-in-the-middle attack,where the device is compromised after it leaves the trusted manufacturer but before it arrives at the victim.For example,the manufacturer may outsource the actual man-ufacturing to a plant in an adversarial country,where the firmware could easily be replaced.The delivery person,the installation crew,or the maintainance team could similarly compromise thefirmware.A less glamorous(but more likely)attack would be to embed the update in a virus or worm that scans infected systems for vulnerable devices. Essentially,any attack that can compromise an unat-tested operating system could likely compromise unat-testedfirmware.Furthermore,note that once a device is compromised,futurefirmware updates may not guarantee that the device is safe(the maliciousfirmware could modify the update utility or ignore update commands);also,rein-stalling the computer software won’t reinstall thefirmware. Hence,compromisingfirmware is potentially more damag-ing than compromising the operating system.3.2Compromising DataOnce thefirmware has been replaced with malicious firmware,there are two ways in which the device can com-promise the integrity of data.If the device can directly is-sue a DMA request,or if it can solicit a device to issue a DMA request on its behalf,it can overwrite valid data or read confidential data in host RAM.But even if DMA is not an option,the device can still store unencrypted and manipulate unauthenticated data that is fed to it,or simply discard data.3.3Delivering Data to the AttackerIf the compromised device is a network device,it can de-liver confidential data over the network.If the device has direct or indirect DMA access,it can bus master a DMA request to the network device’s ring buffer,which the net-work device will then transmit over the network.But even if there is no reachable network connection to the outside world,a device may still be able to breach confidential-ity;for example,the device can store data and then misbe-have,causing the user to send the device in for warranty.Once again,a man-in-the-middle attack can be used,this time to extract the data and hide the tracks of the mali-ciousfirmware(other attacks used to compromise the de-vice may be similarly adapted).Note that storing data is not unique to storage devices;this works for any device with an EEPROM,and every device vulnerable to an attack on its firmware has some EEPROM.3.4SummaryAll DMA-capable peripherals are trusted,and must either be verifiable or not havefirmware.Furthermore,many de-vices without DMA capabilities are trusted to some degree.If these devices may havefirmware that is not verified,data sent to them must be either encrypted and authenticated or insensitive to security violations.There remains a question of feasibility:even if it is feasible to replace thefirmware, read or modify sensitive data,and deliver sensitive data, how difficult is it to generate the maliciousfirmware?4Is Writing Malicious Firmware Feasible?Security is about risk management;hence,it is appropriate to ask which attacks are most likely.Attacks on software have been shown to be quite popular;attacks onfirmware and hardware have been less prolific.We argue that attacks onfirmware are only incrementally more difficult than at-tacks on software,and that,once attacks on software be-come more difficult,attacks onfirmware will become com-mon.We further argue that attacks on hardware are more difficult because hardware is not malleable;hence,circuits and ROMs are relatively trustworthy.Because security is about risk management,there is a natural tendency for conflicts to escalate to slightly more sophisticated variants.Defenders plug the easiest holes, and attackers ratchet attacks up to the next level.For ex-ample,the simplest buffer-overrun relies on jumping to executable code on the stack.The direct solution,non-executable stacks,led to slightly more elaborate attacks[17].Perhaps the greatest vulnerability offirmware attacksis that modifyingfirmware may be no harder than modi-fying OS code.We believe attacks have been limited up to this point becausefirmware has been less homogeneous than software and most programmers have less experience withfirmware.Both of these factors are changing:device 3vendors are consolidating,and programmers are being ex-posed tofirmware.The LinuxBIOS project[5]has success-fully replaced the BIOS of several commodity PCs to pro-videflexibility.Also,hackedfirmware is becoming more common:many DVD players have hackedfirmware to sup-port DVDs from any region[9],and game stations such as the X-Box have hacked versions offirmware[3]that con-vert them into cheap computers.As discussed above,any device that can DMA and any device that is fed unencrypted or unauthenticated data is a threat.Unless these devices are verified,one of two op-tions must be taken to ensure security:either DMA must be disabled and all accesses to devices must be encrypted and authenticated,or memory must not be trusted(as in AEGIS[11]or XOM[12]).Both options are severe and would limit performance.5The Technical SolutionThis paper contributes two complimentary technical solu-tions:1)Each compliant device must be included in the TCB.It must ensure that itsfirmware is signed and veri-fied at startup just like the rest of the executable code,and it must verify its children.Such recursive verification will form a tree of trust.2)Every other device must be recog-nized as explicitly external to the TCB.Applications must be aware that it is unsafe,and its I/O must be sandboxed.5.1An Example:A Trustworthy DiskA trustworthy disk would have afirmware signing mecha-nism:for example,a cheap processor and ROM for some immutable root of trust.On power-on,this system would work in much the same manner as the TPM;all security sensitive code would be measured to a local PCR,which would then be signed with a key embedded in the disk’s TPM and returned to the host CPU on request.Of crucial importance is that this mechanism is not necessary for basic operation of the device;it is an optional feature.The disk can be manufactured and the additionalfirmware signing hardware can be installed optionally.The signing hardware could read thefirmware directly and send the measurement through a vendor specific command to the host CPU.Such a solution would have a marginal cost for systems without the security hardware,and likely less than a dollar for sys-tems with the hardware,which both keeps costs down and provides disk vendors with a“value add.”5.2The Generalized Solution:A VerificationMechanism for Trusted PeripheralsA generalized version of the above solution is to descend the device chain and recursively verify the trustworthiness of all devices.On system reset,the BIOS and option ROMs are currently measured,as well as the current hardware configuration.When the hardware configuration is mea-sured,each device should measure itsfirmware.For ex-ample,when the PCI bus is configured and measured,eachdevice on the PCI bus should attest itsfirmware,if it is field-upgradeable.During PCI configuration,the SCSI host adapter will be queried;the SCSI host adapter will measure itsfirmware then query each disk;finally,each disk will measure itsfirmware and return this measurement.This creates a tree of trusted devices,as depicted in Figure2.The host can determine the trustworthiness of a device by assuming that the device was initially secure and there-fore verify the initial attestation statement against future ones,or the host can compare thefirmware attestation state-ment against a trust certificate provided by the device ven-dor.If the device is unable to provide an attestation state-ment or the vendor is unable to provide a trust certificate, we have to assume thefirmware and therefore the device cannot be trusted.5.3Untrustworthy DevicesBecause there may exist some devices whose trustworthi-ness is unknown,there must be a compatibility mode.One solution is to tag such devices as untrustworthy,and restrict their DMA access to a memory address range sandbox us-ing mechanisms similar to an I/O-MMU or machine parti-tioning[4].Furthermore,the operating system and sensi-tive applications must understand that they cannot rely on unencrypted or unauthenticated data sent or received from an untrustworthy device.All devices bridged by an un-trustworthy device are untrustworthy;for example,a trust-worthy disk attached to an untrustworthy SCSI controller is untrustworthy.5.4Guarantees ProvidedIf all critical software andfirmware are verifiable,then only attacks on hardware can go undetected.For example,con-sider a system where the OS is verifiable,bootfirmware is verifiable,field upgradablefirmware for trusted devices is verifiable,and all other devices are sandboxed as in Sec-tion5.3.Then all remotely malleable components are veri-fiable,and,for thefirst time ever,strong guarantees can be provided:all remote attacks on PCs are remotely detectable as soon as the method of attack is known,patches can be verifyably installed,and attacks cannot survive across re-boot.A remote observer can verify that a PC is not vul-nerable to any known remote attacks;attacks can no longer hide in unverified storage.Known attacks on software are likely to befixed with a patch that can be verifyably in-stalled.Likewise forfirmware;furthermore,if no patch is provided,thefirmware can be isolated as untrustwor-thy.Hence,assuming that all vulnerabilities are eventu-ally discovered—and many vulnerabilities are discovered before attacks surface—attackers are limited to hardware attacks.Hardware attacks either requires physical access or buggy hardware;the former is hard to come by and the latter can be isolated.4Figure2:a)On reset,the CRTM measures the BIOS to PCR[0]before transferring control to it.b)The BIOS recursively measures devices on the PCI bus and PCI-X bus.c)The IDE controller and Gigabit Ethernet controller do not supportfirmware measurements—they cannot be trusted—and hence their DMA must be sandboxed(the Gigabit Ethernet sandbox is its entire ring buffer).d)The SCSI controller reports that one of its disks cannot be trusted with unencrypted or unauthenticated sensitive data.e)The USB controller reports that the Camera cannot be trusted;however,the USB controller itself can still utilize DMA.6ConclusionThe added complexity of any security facility is worthwhile only if the additional security provided justifies its cost. But the additional security of current secure bootstrap fa-cilities is minimal,because they are vulnerable to attacks onfirmware.These attacks are at least as damaging as their software counterparts,as deployable,and nearly as straight forward.Fortunately,a simple extension to secure bootstrap prevents such attacks onfirmware.This exten-sion utilizes the current framework,allows device vendors to cheaply add the required functionality,and accounts for legacy hardware.It makes known remote attacks detectable and forces attackers to focus on hardware attacks,which—though possible—are difficult enough to justify the cost of secure bootstrap.7AcknowledgmentsWe would like to thank Greg Ganger,James Hoe,Adrian Perrig,and the anonymous reviewers for their comments. James is supported in part by a NDSEG Fellowship,which is sponsored by the Department of Defense. References[1]W.A.Arbaugh,D.J.Farber,and J.M.Smith.A secureand reliable bootstrap architecture.In Proceedings of the 1997IEEE Symposium on Security and Privacy,pages65–71,May1997.[2]Arm storage:Seagate-Cheetah family of disk drives./markets/armpp/462.html.[3]J.Davidson.Chips to crack Xbox released on internet.Australian Financial Review,page16(Computers),21Jun 2003.[4]P.England,mpson,J.Manferdelli,M.Peinado,andB.Willman.A trusted open puter,36(7):55–62,2003.[5]LinuxBIOS..[6]Myricom home page..[7]J.R.Rao and P.Rohatgi.EMpowering side-channel attacks.Technical Report2001/037,IBM,2001.[8]R.Sailer,X.Zhang,T.Jaeger,and L.van Doorn.Design andimplementation of a TCG-based integrity measurement ar-chitecture.In Proceedings of the13th Usenix Security Sym-posium,August2004.[9]T.Smith.Warner attempts to out-hack DVD hack-ers./content/2/13834.html,Sep2000.[10] C.A.N.Soules,G.R.Goodson,J.D.Strunk,and G.R.Ganger.Metadata efficiency in versioningfile systems.InProceedings of the2nd Usenix Conference on File and Stor-age Technologies,San Francisco,CA,Mar2003.[11]G.E.Suh,D.Clarke,B.Gassend,M.van Dijk,and S.De-vadas.Aegis:Architecture for tamper-evident and tamper-resistant processing.In Proceedings of the17th annual in-ternational conference on Supercomputing,pages160–171.ACM Press,2003.[12] D.L.C.Thekkath,M.Mitchell,P.Lincoln, D.Boneh,J.Mitchell,and M.Horowitz.Architectural support forcopy and tamper resistant software.In Proceedings of theninth international conference on Architectural support forprogramming languages and operating systems,pages168–177.ACM Press,2000.[13]The Trusted Computing Group:Home..[14]The Trusted Computing Group.TPM Main:Part1DesignPrinciples,Oct2003.[15]The Trusted Gomputing Group.TCG PC Specific Imple-mentation Specification,Aug2003.[16]U.S.National Institute of Standards and Technology.Se-curity Requirements for Cryptographic Modules,Jan1994.FIPS PUB140-2.[17]R.Wojtczuk.Defeating solar designer’s non-executablestack patch./sploits/non-executable.stack.problems.html,Jan1998.5。

相关文档
最新文档