[Gluster-devel] GlusterD 2.0 status updates

Jeff Darcy jdarcy at redhat.com
Mon Sep 7 20:01:27 UTC 2015


> Every day we hear about vulnerabilities and exploits. Have we not yet
> reached the point were we just start with security enabled as a matter
> of routine?
> 
> Why aren't we using TLS (the real name, FWIW) from day one?

I think making it default for 3.8+ would be a good idea.  The only
issue is who's going to sift through our ongoing stream of failed
regression tests to see which ones might be related to this, and to
fix anything they find.  There are very few eyeballs on some of
this code, and those tend to be among our busiest eyeballs.  It's
part of why we're even looking at alternative RPC infrastructures.
In fact, I sent an email in an earlier thread that I probably
should have cited here already (inline for convenience).

http://www.gluster.org/pipermail/gluster-devel/2015-August/046607.html

In short, we're not getting a lot of mileage out of using the
same XDR-based infrastructure for GlusterD as we are for the I/O
path.  We've had many networking bugs that only manifest in
GlusterD, and it doesn't need RDMA support.  IMO moving GlusterD
onto something else would actually *reduce* the maintenance
burden for our current network code, and we could get always-on
TLS almost for free as well.


More information about the Gluster-devel mailing list