The problem that I initially ran into when I was creating the volume
was that there wasn't a Linux file system that could handle a 27 TB
volume. The closest that I got was Btrfs and the time, it was still in
I think 0.98alpha or something like that.

Also as a result of that, there were no data recovery tools available
that in the event of a RAID failure (but the drives are otherwise
intact) that I need to be able to do a data recovery off the drives
and to be able to pull the data and stitch it back together.

Now the plan is for the clone/mirrored server (that also has plans for
LTO tape expansion) that the data going on the tapes will be the fully
encrypted files. If I do the volume encryption, the decryption will be
also tied to the volume; which limits possiblities (if I understand it
correctly) in porting the data forward as the volume or volumes grow.

Conversely, if I encrypt the files (rather than the volume); then the
encryption isn't linked to the volume itself; which means it can be
next-gen-ext4, ZFS, btrfs (when it matures) etc...

And even if I were to encrypt the entire volume; the question of
whether AES-NI is enabled or disabled by default will still be
persistent.

(There are also early analysis plans that are currently being studied
to implement 4x QDR Infiniband and all network traffic will be pushed
onto that NIC/protocol instead, resulting in a net 32 Gbps connection
per port.)

So there are some high level planning stuff that's going on - but I'm
currently studying the encryption aspect of it (out of the whole grand
scheme/big picture of things).

(There's SOME reasoning to the madness...)

On Wed, Mar 13, 2013 at 4:04 PM, Matthew Hall <mh...@mhcomputing.net> wrote:
> On Wed, Mar 13, 2013 at 04:00:48PM -0400, Ewen Chan wrote:
>> I'm running on a 30 TB server with about 1.4 million files.
>>
>> I think that at last audit, the single largest file is 45 GB (as an example).
>>
>> And I'm prepping to run AES-256-CBC.
>>
>> The host system has a SATA 6 Gbps, 10 drive, RAID5 array; so I'm
>> pretty sure that I can peg (or at least supply) the full 6 Gbps
>> bandwidth for encryption.
>>
>> I'm currently using OpenSSL 0.9.8, and evaluations to upgrade to the
>> latest openssl package is also being considered at this time (as well
>> as possible a change to the host system OS to Linux (e.g. Ubuntu
>> 12.04) or Solaris 11) or that I am just going to stream the data over
>> 10 GbE connection (by mounting over SMB/NFS and running the encryption
>> using the client processor, but the data is just being passed through
>> during the encryption process - no data is stored on the client system
>> post-encryption).
>>
>> The openssl wasn't recompiled from source; but whatever's
>> built/included with the OS.
>
> Why not use the latest Linux kernel full disk and/or partition encryption via
> dmraid or other technique, which has AES-NI support in-kernel, to avoid
> userspace overhead which will be considerable with such throughput goals?
>
> Matthew.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to