Re: Insulting racial terms (was Re: [SLUG] Re: [chat] Version control)

2009-03-22 Thread Kevin Saenz

We are Not Political Correctness R Us.

thus can we all Drop this Political Correctness Nightmare and start  
discussing Linux related topics?





On Sun, Mar 22, 2009 at 01:07:08PM +1100, Daniel Pittman wrote:

Alan L Tyree a...@austlii.edu.au writes:

On Thu, 19 Mar 2009 12:29:32 +1100
Sonia Hamilton so...@snowfrog.net wrote:

PS You might want to lookup what tonto means [1] before you go
around calling people it. It was a term of disrespect for  
Amerindians

on the US/Mexican border in the 1800's. At least be grammatically
correct, and call me tonta :-p [1]
http://www.spanishdict.com/translate/tonto


As a native Spanish speaker, I'll take offense if someone calls me
tonto. BTW, I've spoken to Sonia in Spanish and she speaks that  
language

very well.

For anyone born in the US during the last century, as I was, Tonto  
is
the Lone Ranger's faithful Indian companion. When we were kids, it  
was
worth fighting to be Tonto rather than the paleface. It's probably  
no

longer politically correct, but for different reasons than those
mentioned.


When I was a little kid, I couldn't understand why the loyal American
Indian was call stupid (tonto/tonta == stupid). The idea burnt in my
young brain was that all the American indians (from Tierra del Fuego  
in

Argentina to Alaska) were all stupid people for the USAians.

BTW (again), I also don't understand why the USA is call America. I'm
from Colombia and I'm an American. The continent is called America and
don't tell me it's call Americas.

Uh, no.  That would be inappropriate for *exactly* the reason  
mentioned,
which is to say that it is an insulting racial epithet.  The fact  
that

it was used in that sense on television doesn't change those facts.

So, just because the term was not seen as insulting doesn't make it  
any

less insulting ??? just like paleface is.


Aye.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html



--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Filesystem encryption

2009-03-22 Thread James Gregory
Hi all,

I'm considering using device mapper's crypto support to encrypt the
entirety of my laptop's drive. This is a fairly permanent thing to do,
so I'm seeking some experiences with it to help me decide if it's a good
idea or not.

I used it a few years back and found that it didn't play nice with XFS,
causing frequent lockups, which wasn't really what I was looking for. It
also burned a lot of cycles, making stuff like my frequent grepping
through source trees and image processing impractical. Now, the target
machine is much faster (a Thinkpad x61, C2D), but I don't really know
how C2D crypto performance compares to Pentium M, so it'd be good to
hear about that too.

Finally, if I do go ahead with it, what's the easiest way to do it? I
recall Ubuntu having an alternative installer that could do it for me.
Is that the best way to go?

Any and all insights appreciated. Please CC me, as I'm not subscribed to
the list.

Thanks,

James.


-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Filesystem encryption

2009-03-22 Thread Daniel Pittman
James Gregory ja...@james.id.au writes:

 I'm considering using device mapper's crypto support to encrypt the
 entirety of my laptop's drive. This is a fairly permanent thing to do,
 so I'm seeking some experiences with it to help me decide if it's a
 good idea or not.

It works for me, and means that I can do development on my laptop[1]
without needing to worry about the data confidentiality issues that many
of the other staff here face.

 I used it a few years back and found that it didn't play nice with
 XFS, causing frequent lockups, which wasn't really what I was looking
 for.

Well, zero problems on that front: I have this stack, all working
correctly, including suspend to disk[2]:

  2 x SATA - MD/RAID10 - dm_crypt - LVM pv - LVM lv(s) - XFS

 It also burned a lot of cycles, making stuff like my frequent grepping
 through source trees and image processing impractical. Now, the target
 machine is much faster (a Thinkpad x61, C2D), but I don't really know
 how C2D crypto performance compares to Pentium M, so it'd be good to
 hear about that too.

Well, that is going to depend on a whole lot of factors...

I run this on a T61p, 2.6GHz Core2 Duo system with 4GB RAM and, as
noted, 2 7200RPM SATA disks in RAID10/f2 setup, so the system is hardly
short on power.

I still find that it is a bit slow during very large writes, in that it
can buffer quite a lot of writing and then slow down some from the
encryption.

OTOH, that is the only time that I really notice any performance cost;
encryption never uses more than 5 to 8 percent of one 800MHz CPU, and
disk reads are acceptable.

That could just be cache effects, though: with 4GB I seldom put memory
pressure on the machine, so I don't really touch the relatively slow
disk that often during normal work.

I also run 'preload', which observes running software and preloads pages
from disk that are likely to be wanted, helping reduce wait times for
code to load.


I see that the CPU range for the X61 are all fairly acceptable, though,
so I would expect reasonable performance.  Certainly, this is a world of
difference from the old Pentium-M machines — that CPU line should have
been shot at birth, rather than inflicting their awful performance on
the rest of us.

(Why, yes, I am slightly bitter having used a P4-M CPU for five years,
 about how awful it was, since you ask. ;)


Anyway, from experience having a RAID1, or better RAID10/f2, disk
subsystem is probably the biggest contributor to performance: it turns
the laptop from sluggish to pleasant, in my experience, regardless of
the rest of the stack.


 Finally, if I do go ahead with it, what's the easiest way to do it? I
 recall Ubuntu having an alternative installer that could do it for me.
 Is that the best way to go?

I did that initially, which was reasonable, on a RAID1 and AES-CBC,
which was reasonable.

After about nine months I spent a little while poking deeper into the
issue and ended up moving to the RAID10/f2 layout and XTS encryption;
while the advantages are mostly theoretical in the later case the former
certainly improve I/O responsiveness.

In the later case I took advantage of the use of LVM to split the
mirror, create a degraded array and encrypt it, then pvmove the data
across to the new stack.

 Any and all insights appreciated. Please CC me, as I'm not subscribed
 to the list.

I strongly advise that you do subscribe, at least while your questions
are answered; certainly, I have little enthusiasm for responding to
off-list questions compared to on-list ones.

Regards,
Daniel

Footnotes: 
[1]  ...which is pleasant and comfortable.

[2]  Technically, right now I don't have the last, but that is because
 the PITA graphics card requires non-free drivers.  My own damn
 fault for compromising on that, I guess.

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html