Re: [OpenAFS] Request for Assistance with OpenAFS

2016-05-04 Thread Benjamin Kaduk
On Wed, 16 Mar 2016, Nicolas Melot wrote: > Hi, > > I'm trying to setup and use openafs for mobile nodes, not always having a > connection to the openAFS server. I would like to use the openAFS caching > mechanism as an offline disk that synchronizes everything once online again. > > I installed

RE: [OpenAFS] /var/cache/openafs on btrfs

2016-05-04 Thread Brandon Allbery
ZFS requires specific tuning for use as a cache partition; otherwise, its allocation size interacts poorly with the allocation size of cache chunks, IIRC. I'd imagine something similar is true of btrfs, but I know even less about btrfs implementation details than ZFS. -Original

Re: [OpenAFS] /var/cache/openafs on btrfs

2016-05-04 Thread Benjamin Kaduk
On Wed, 2 Mar 2016, Fred Drueck wrote: > Hello Everyone, > > According to the OpenAFS admin FAQ, it appears that the officially > supported file systems for the disk cache are: > > ext2 > ext3 > hfs (HP-UX) > xfs (at least on IRIX 6.5) > ufs (Solaris, ?Tru64Unix) > > which is clearly out of date,

Re: [OpenAFS] ad+openafs

2016-05-04 Thread Jeffrey Altman
On 5/4/2016 1:44 AM, Benjamin Kaduk wrote: > 1.6.14 doesn't need to have single-DES enabled; we shouldn't be > recommending it. The rxkad.keytab method should work fine with AES keys. > > -Ben +1 To be clear, the entire reason that the KDF extension to the rxkad security class was implemented

Re: [OpenAFS] Talk slides from 2009 BPW appear unavailable?

2016-05-04 Thread Jeffrey Altman
On 5/3/2016 10:47 AM, Jeffrey Altman wrote: > On 2/29/2016 12:01 AM, Ben Rosser wrote: >> >> Is this a known issue? Is there somewhere (other than this list) I should >> file >> a bug or something? > > Ben, > > The proper place to send an e-mail would have been > webmas...@openafs.org. I have

Re: [OpenAFS] AFS in the age of the wild west internet

2016-05-04 Thread Simon Wilkinson
> On 4 Mar 2016, at 15:04, Steve Gaarder wrote: > > How safe is it to leave AFS open to the world? The answer to this depends on a wide variation of factors, including your threat model, and individual risk assessments. The most important consideration here is how