it's an extra layer of security, an imposed requirement On 12/08/2015 04:14 PM, Yann Ylavic wrote:
On Tue, Dec 8, 2015 at 8:51 PM, Ron Croonenberg <ronc@xxxxxxxx> wrote:This is just a bunch of hardware, with connections between it's nodes. The whole thing/cluster is not connected to anything 'internet', not even LAN. I worry about those connections being secure as much as I worry about security between a disk-controller and a hard drive.So why authentication/integrity? Any fear that the hardware becomes malicious? CRCs are cheaper and good enough for detecting harware errors... --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx
--------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx