J. Bruce Fields wrote:
On Mon, Sep 29, 2008 at 10:07:25PM -0500, Tom Tucker wrote:
J. Bruce Fields wrote:
On Thu, Sep 25, 2008 at 08:35:26AM -0500, Tom Tucker wrote:
J. Bruce Fields wrote:
This explanation is helpful, thanks. It would also be helpful if we
could boil down the advice to just a sentence or two for the busy admin.
Something like: unless you have card XYZ and kernel 2.6.y, do *not* use
rdma on a network where you cannot trust every machine....
Would it be better to say, "Do not use RDMA on a network where your
policy requires a security model stronger than tcp/auth_unix."
I'm not worried about the case where the security provided is roughly
equivalent to that provided by tcp/auth_unix.
I'm worried about the non-"Fast Reg" case where I thought you were
saying that the network could access memory other than that meant to
hold rpc data.
Ok, so maybe we could state the security exposure of ALLPHYSICAL instead
of dwelling on the relative differences between the similar exposures of
tcp/auth_unix vs. fastreg?
Right. It's all interesting, so I wouldn't cut anything out--but you
could put off the details to the end; e.g., start with "in situation
<...>, nfs/rdma provides roughly the same security as nfs over tcp and
auth_unix (see below for more details)".
Sounds reasonable.
I'd also like to get to fastreg as a default at some point.
OK, good.
What's your perspective on the lifetime of bounce buffers, memory
windows, and the other strategies in client?
I'm ignorant. Pointer to something else I should read?
I assume there are similar issues on the client?
Sorry, that was a question for Tom Talpey. It's a client specific issue
since the server only implements ALLPHYSICAL and FAST REG.
--b.
--
To unsubscribe from this list: send the line "unsubscribe linux-nfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html