Your code review is correct.

There's some ideas on how to make things more secure that I expect to be 
tackled relatively soon, but for now it's all HTTP.

In single-site deployments, the internal Swift network (i.e. proxy to storage 
and storage to storage) should be on a private network). And and site-to-site 
connectivity for a multi-site deployment should be over a VPN or similar.

--John



On 30 Mar 2016, at 18:50, Mark Kirkwood wrote:

> Hi,
>
> I'm looking at configuring a multi region cluster, and am thinking about
> what type of encryption is needed for inter region traffic, and where
> this needs to be done (e.g VPN or swift encrypting its own communication).
>
> My quick scan of the code seems[1] to point to internal communication
> being http only - but I'm asking in case I've missed something!
>
> regards
>
> Mark
>
> [1]
> Examining files in swift/obj,proxy,common it looks like proxy-to-storage
> (and storage-to-storage) communication is always unencrypted (i.e
> common/bufferedhttp:http_connect is called without ssl set).
>
> Also looking at swift/obj/ssync_sender.py it seems to me that
> replication is not encrypted either.
>
> _______________________________________________
> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
> Post to     : openstack@lists.openstack.org
> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to