Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-10-15 Thread David Vasek
On Mon, 18 Aug 2014, Jason Tubnor wrote: On 2 June 2014 10:23, Ted Unangst t...@tedunangst.com wrote: Part of the deprecation / migration process is identifying the weird ways people use vnd and finding solutions for them. But as we've seen, people never move forward without the occasional

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-08-17 Thread Jason Tubnor
On 2 June 2014 10:23, Ted Unangst t...@tedunangst.com wrote: Part of the deprecation / migration process is identifying the weird ways people use vnd and finding solutions for them. But as we've seen, people never move forward without the occasional push. So the most appropriate way to use

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-06-01 Thread David Vasek
On Fri, 30 May 2014, Theo de Raadt wrote: Robert [info...@die-optimisten.net] wrote: On Fri, 30 May 2014 12:19:35 -0400 Ted Unangst t...@tedunangst.com wrote: WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Will 5.6 softraid support block sizes other than 512

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-06-01 Thread Theo de Raadt
Could you please provide a little bit more information? What causes encrypted vnd to be insecure Ted went a bit far; it is unusual for him to be melodratic. Basically -- less than state of the art crypto. and what will happen to vnd(4) before 5.7 if it isn't removal of crypto? You persist

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-06-01 Thread Ted Unangst
On Sun, Jun 01, 2014 at 11:37, Theo de Raadt wrote: Could you please provide a little bit more information? What causes encrypted vnd to be insecure Ted went a bit far; it is unusual for him to be melodratic. Basically -- less than state of the art crypto. You would never use

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-31 Thread Ted Unangst
On Fri, May 30, 2014 at 19:45, Jonathan Thornburg wrote: What will be the right way to achieve such a nested-encryption setup once encrypted vnd goes away? Is/will it be safe (i.e., free from data corruption, deadlock, or other kernel badness) to nest softraid crypto volumes? Short answer:

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-30 Thread Robert
On Fri, 30 May 2014 12:19:35 -0400 Ted Unangst t...@tedunangst.com wrote: WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Will 5.6 softraid support block sizes other than 512 byte? marc.info/?l=openbsd-miscm=139524543706370 kind regards, Robert

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-30 Thread Chris Cappuccio
Robert [info...@die-optimisten.net] wrote: On Fri, 30 May 2014 12:19:35 -0400 Ted Unangst t...@tedunangst.com wrote: WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Will 5.6 softraid support block sizes other than 512 byte?

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-30 Thread Robert
On Fri, 30 May 2014 11:14:40 -0700 Chris Cappuccio ch...@nmedia.net wrote: Robert [info...@die-optimisten.net] wrote: On Fri, 30 May 2014 12:19:35 -0400 Ted Unangst t...@tedunangst.com wrote: WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Will 5.6

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-30 Thread Theo de Raadt
Robert [info...@die-optimisten.net] wrote: On Fri, 30 May 2014 12:19:35 -0400 Ted Unangst t...@tedunangst.com wrote: WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Will 5.6 softraid support block sizes other than 512 byte?

Re: encrypted vnd Fwd: CVS: cvs.openbsd.org: src

2014-05-30 Thread Jonathan Thornburg
In message http://marc.info/?l=openbsd-miscm=140146687910205w=1, Ted Unangst wrote: If you are using encrypted vnd (vnconfig -k or -K) you will want to begin planning your migration strategy. [[...]] WARNING: Encrypted vnd is insecure. Migrate your data to softraid before 5.7. Once this