Hi guys,

I don't think we are really worried about how those patches affect OSDs 
performance -patches can be easily disabled via sys- but quite worried about 
how do they affect librbd performance.

Librbd is running on the hypervisor, and even if you don't need to patch 
hypervisor kernel for Meltdown, you have to patch it to avoid Spectre. And in 
pure SSD clusters, librbd and network performance -we are running ceph over 
40G- is quite important.

Cheers,
Xavier.

-----Mensaje original-----
De: ceph-users [mailto:ceph-users-boun...@lists.ceph.com] En nombre de 
c...@jack.fr.eu.org
Enviado el: viernes, 12 de enero de 2018 10:26
Para: Van Leeuwen, Robert <rovanleeu...@ebay.com>; ceph-users@lists.ceph.com
Asunto: Re: [ceph-users] Linux Meltdown (KPTI) fix and how it affects 
performance?

Well, if a stranger have access to my whole Ceph data (this, all my VMs & rgw's 
data), I don't mind if he gets root access too :)

On 01/12/2018 10:18 AM, Van Leeuwen, Robert wrote:
>> Ceph runs on a dedicated hardware, there is nothing there except Ceph,
>>     and the ceph daemons have already all power on ceph's data.
>>     And there is no random-code execution allowed on this node.
>>
>>     Thus, spectre & meltdown are meaning-less for Ceph's node, and
>>     mitigations should be disabled
>>     
>>     Is this wrong ?
> 
> In principle, I would say yes:
> This means if someone has half a foot between the door for whatever reason 
> you will have to assume they will be able to escalate to root.
> Looking at meltdown and spectre is already a good indication of creativity in 
> gaining (more) access.
> So I would not assume people are unable to ever gain access to your network 
> or that the ceph/ssh/etc daemons have no bugs to exploit.
> 
> I would more phrase it as:
> Is the performance decrease big enough that you are willing to risk running a 
> less secure server.
> 
> The answer to that depends on a lot of things like:
> Performance impact of the patch
> Costs of extra hardware to mitigate performance impact Impact of 
> possible breach (e.g. GPDR fines or reputation damage can be extremely 
> expensive) Who/what is allowed on your network How likely you are a 
> hacker target How good will you sleep knowing there is a potential 
> hole in security :) Etc.
> 
> Cheers,
> Robert van Leeuwen
> 
> 
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to