Hi Eric,

Thanks for your answers!

On Fri, 8 Dec 2006, Eric Mei wrote:

Speak the performance hit, it's not seriously tested yet. The impact might different from system to system, the main overhead is CPU cycles on crypting, and a little bit more network traffic. So on systems with powerful CPUs or hardware encryption the situation might not too bad. Just a guess though.

The CPU overhead of bulk data checksumming on servers should be quite high; FWIW a simple test of sha1sum gives me 154 MB/s with my fairly recent CPU. The additional cost (CPUs or HW crypto engines) required to achieve good performance may be too high for most HPC users, at least for regular access inside a cluster; it could be interesting to enable or disable checksumming for classes of clients.

- is it mandatory to deploy a keytab on clients? I don't remember having done that when testing AFS+krb5

Yes it's mandatory, this will add some burden to sysadmin. The reason is a little bit involved, we hope root could always own valid secure contexts, otherwise a failed callback RPC from server to client will lead to the client be kicked out off cluster.

It sounds like an implementation problem that surfaces to the user. :-/ Maybe the operations you mention should be possible with unauthenticated clients?

 - is it really necessary to create a principal for each server node?

Maybe I'm wrong: this is required by GSS/Kerberos. But it will be great if someone confirm that per-server principal is not necessary, that way the configuration will be easier and hard to say less secure.

If I'm not mistaken, AFS with Kerberos uses one principal for all servers in a cell, and a keytab is propagated to all servers. But maybe GSS adds specific constraints, I don't know.


Cheers,

--
Jean-Marc Saffroy - [EMAIL PROTECTED]

_______________________________________________
Lustre-devel mailing list
[email protected]
https://mail.clusterfs.com/mailman/listinfo/lustre-devel

Reply via email to