On Nov 16, 2010, at 2:03 PM, Rthoreau <r7h0...@att.net> wrote: > Darren J Moffat <darr...@opensolaris.org> writes: > >> On 11/15/10 19:36, David Magda wrote: >> >>>> Using ZFS encryption support can be as easy as this: >>>> >>>> # zfs create -o encryption=on tank/darren >>>> Enter passphrase for 'tank/darren': >>>> Enter again: >>> >> >> >>> 2. Both CCM and GCM modes of operation are supported: can you recommended >>> which mode should be used when? I'm guessing it's best to accept the >>> default if you're not sure, but what if we want to expand our knowledge? >> >> You've preempted my next planned posting ;-) But I'll attempt to give >> an answer here: >> >> 'on' maps to aes-128-ccm, because it is the fastest of the 6 available >> modes of encryption currently provided. Also I believe it is the >> current wisdom of cryptographers (which I do not claim to be) that AES >> 128 is the preferred key length due to recent discoveries about AES >> 256 that are not know to impact AES 128. >> >> Both CCM[1] and GCM[2] are provided so that if one turns out to have >> flaws hopefully the other will still be available for use safely even >> though they are roughly similar styles of modes. >> >> On systems without hardware/cpu support for Galios multiplication >> (Intel Westmere and later and SPARC T3 and later) GCM will be slower >> because the Galios field multiplication has to happen in software >> without any hardware/cpu assist. However depending on your workload >> you might not even notice the difference. >> >> One reason you may want to select aes-128-gcm rather than aes-128-ccm >> is that GCM is one of the modes for AES in NSA Suite B[3], but CCM is >> not. >> >> Are there symmetric algorithms other than AES that are of interest ? >> The wrapping key algorithm currently matches the data encryption key >> algorithm, is there interest in providing different wrapping key >> algorithms and configuration properties for selecting which one ? For >> example doing key wrapping with an RSA keypair/certificate ? >> >> [1] http://en.wikipedia.org/wiki/CCM_mode >> [2] http://en.wikipedia.org/wiki/Galois/Counter_Mode >> [3] http://en.wikipedia.org/wiki/NSA_Suite_B_Cryptography > > I appreciate all the hard work the ZFS team and yourself have done to > making this happen. I think a lot of people are going to give this a try > but I noticed that one of the license restrictions was not to run > benchmarks without prior permission from Oracle.
This is industry standard faire. Sun had similar restrictions. > Is Oracle going to > post some benchmarks that might give people an idea of the performance > using the various key lengths? Or even the performance benefit of using > the newer processors with hardware support? Good question... > I think a few graphs and testing procedures would be great this might be > an opportunity to convince people the benefit of using sparc and Oracle > hardware while at the same time giving people a basic idea what it could > do for them on their own systems. I would also go as far as saying that > some people would not even know how to setup a baseline to get > comparative test results while using encryption. > > I could imagine a lot of people are curious about every aspect of > performance and are thinking is ZFS encryption ready > for production. Does Oracle "support" Solaris 11 Express in production systems? > I just think that some people might need that little > extra nudge that a few graphs and test would provide. If it happens to > also come with a few good practices you could save a lot of people some > time and heart ache as I am sure people are desirous to see the results. I think people are putting encryption in their apps directly (eg Oracle's Transparent Data Encryption feature) -- richard > _______________________________________________ zfs-discuss mailing list zfs-discuss@opensolaris.org http://mail.opensolaris.org/mailman/listinfo/zfs-discuss