<span style='font-family:Verdana'><span style='font-size:12px'>Concerning the performances of encryption by dm-crypt and the selected algorithm, has this (old) blog post already been posted here ?<br /><br />http://blog.wpkg.org/2009/04/23/cipher-benchmark-for-dm-crypt-luks/<br />http://www.phoronix.com/scan.php?page=article&item=intel_aesni_dmcrypt&num=2<br /><br /><br />Your current implementation uses cryptsetup in the nova compute nodes doesn't it? What is the impact of the ciphering on CPU performances ?<br /><br /> <p style="margin:0px; padding:0px;" > </p><blockquote style="border-left: 1px solid rgb(204, 204, 204); padding-left: 5px; margin: 0px 0px 0px 5px;" type="cite"><p style="margin:0px; padding:0px;" ><span style="font-family: Verdana;"><span style="font-size: 12px;">----- Original Message -----</span></span></p><p style="margin:0px; padding:0px;" ><span style="font-family: Verdana;"><span style="font-size: 12px;">From: Benjamin, Bruce P.</span></span></p><p style="margin:0px; padding:0px;" ><span style="font-family: Verdana;"><span style="font-size: 12px;">Sent: 02/15/13 08:58 PM</span></span></p><p style="margin:0px; padding:0px;" ><span style="font-family: Verdana;"><span style="font-size: 12px;">To: OpenStack Development Mailing List</span></span></p><p style="margin:0px; padding:0px;" ><span style="font-family: Verdana;"><span style="font-size: 12px;">Subject: [openstack-dev] Volume Encryption</span></span></p> <div><div><pre style="white-space: pre-wrap; word-wrap: break-word;">On 2/12/2013, Caitlin Bestler wrote:
>> I'd recommend that OpenStack just use the technology that is available, and specifically avoid endorsing any of the options.
To address this issue and provide flexibility for the default encryption options for the proposed volume encryption feature, the implementation now exposes the dm-crypt options via Nova's configuration file. All relevant options and default values are configurable through this file, with present settings as follows: cryptsetup_default_cipher: aes-xts-plain64, cryptsetup_default_key_size: 256, and cryptsetup_default_hash: None. Note that any parameter specified by the value 'None' will revert to the default values compiled into cryptsetup (and I just heard that these differ depending on the Linux distribution.)
BTW, though the volume encryption feature didn't make it into Grizzly due to the late submission, our group will continue this work with solid plans to submit this and other related code for Havana.
_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</pre></div></div></blockquote></span></span>