>>>>> "Wouter" == Wouter Verhelst <[email protected]> writes:
Wouter> For similar reasons, I don't believe in adding an encryption
Wouter> option to the protocol, either -- though the reasoning there
Wouter> is slightly different (there are some use cases that could
Wouter> be valid for encryption, like a replay attack, that you
Wouter> can't "fix" with dm-crypt or similar; but there are other
Wouter> ways of implementing that without having to change the NBD
Wouter> protocol).
Wouter> Having said all that, while I'm not going to implement it
Wouter> myself, if someone were to come up with a working patch
Wouter> that'd be easy to support going forward, I wouldn't oppose
Wouter> it...
More to the point: if you want encryption tunnel it over sslwrap,
or use IPsec. If it's a storage LAN, I don't want the overhead.
--
] He who is tired of Weird Al is tired of life! | firewalls [
] Michael Richardson, Sandelman Software Works, Ottawa, ON |net architect[
] [email protected] http://www.sandelman.ottawa.on.ca/ |device driver[
Kyoto Plus: watch the video <http://www.youtube.com/watch?v=kzx1ycLXQSE>
then sign the petition.
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Nbd-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nbd-general