On Fri, 2006-07-14 at 07:03, Darren J Moffat wrote:
> The current plan is that encryption must be turned on when the file 
> system is created and can't be turned on later.  This means that the 
> zfs-crypto work depends on the RFE to set properties at file system 
> creation time.
> 
> You also won't be able to turn crypto off for a given filesystem later 
> (because you won't know when all the data is back in the clear again and 
> you can safely destroy the key).

So, I'd think that, in the fullness of time, you'd want some sort of
mechanism for graceful key roll-over -- i.e., you'd set a new key,
migrate existing data encrypted using the old key to the new key, then
forget the old key; the whole point of keyed cryptography is that the
key is kept both small (so it can more easily remain secret) AND
changeable.

Perhaps this needs additional infrastructure from ZFS to move/reallocate
already-allocated blocks, but I'd think that infrastructure would also
be useful for the "pool shrink" RFE as well...

                                                - Bill




_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to