On Fri, Jan 11, 2008 at 06:05:48PM +0000, Darren J Moffat wrote:
> >>>Can an encrypted dataset (keytype=dataset) reside in a non-encrypted (no 
> >>>kek defined) pool?
> >
> >In terms of usability, I think that'd be real nice -- no need to rebuild
> >existing pools!
> 
> You wouldn't need to rebuild just have the pool admin run:

Oh good.

> >So why wouldn't the admin want to allow users to encrypt their data?
> >Because of resource consumption?  But user processes be charged for
> >whatever cycles they use for ZFS crypto?  (I guess additional memory use
> >is another story.)
> 
> That is one reason, another might be site policy (for what ever reason) 
> or because they are using crypto below ZFS using some other "hardware".

*shrug*

Resource usage is the only really good reason for restricting ZFS crypto
usage that I can come up with.

> >(b) means that zfs create -o encryption=on could be interactive.  I
> >think that's OK, but see below.
> 
> I was explicitly trying to avoid making any existing command go interactive.

As long as it only happens with new options I don't see why not.  What
sort of principle applies that couldn't be excepted?

> >Alternatively, let zfs create -o encryption=on create "larval" datasets
> >that aren't actually created until keyed, but which do persist on disk
> >until destroyed, and can be listed, even renamed, but not snapshotted
> >nor mounted.
> 
> I'm looking at that just now but it isn't as trivial as it might appear.

Oh, I imagine it isn't.  It might be, but probably isn't.

Reply via email to