>>>>> "Wouter" == Wouter Verhelst <[email protected]> writes:
    Wouter> For similar reasons, I don't believe in adding an encryption
    Wouter> option to the protocol, either -- though the reasoning there
    Wouter> is slightly different (there are some use cases that could
    Wouter> be valid for encryption, like a replay attack, that you
    Wouter> can't "fix" with dm-crypt or similar; but there are other
    Wouter> ways of implementing that without having to change the NBD
    Wouter> protocol).

    Wouter> Having said all that, while I'm not going to implement it
    Wouter> myself, if someone were to come up with a working patch
    Wouter> that'd be easy to support going forward, I wouldn't oppose
    Wouter> it...

More to the point: if you want encryption tunnel it over sslwrap,
or use IPsec.    If it's a storage LAN, I don't want the overhead.

-- 
]       He who is tired of Weird Al is tired of life!           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] [email protected] http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video <http://www.youtube.com/watch?v=kzx1ycLXQSE>
                       then sign the petition. 

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Nbd-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nbd-general

Reply via email to