looks interesting. I just checked if I got such a CPU in our testlab (http://ark.intel.com/search/advanced/?s=t&AESTech=true) but it looks not good so I cannot test this here.
looks interesting. I just checked if I got such a CPU in our testlab (http://ark.intel.com/search/advanced/?s=t&AESTech=true) but it looks not good so I cannot test this here.
Not secure enough?
I guess the rsync devolopers knows what they do, so why do the use a slow digest for error detection (i just wonder)?
As I mentioned, for unsecure networks this might be a good option to sacrifice performance for security.
We cannot assume that the network is secure, so the best we can do is to make that configurable.
1. If you are using a secure management/storage network then maybe rsync (with possibility to set your own options)
IMHO this is a very dangerous option (so this is not my top priority). Using ssh 'none' cipher would be more appropriate, but AFAIK that is still not implemented.
What we are missing is a simple way to define what cipher to use.
And by using the older protocol MD4 (which rsync used prior to v. 3) you do get the benefit of better performance and also less load on the actual process.
Maybe an option in /etc/pve/datacenter.cfg like:
ciphers: arcfour256,blowfish
And use arcfour256 by default (or is that too insecure?)
If people want to be less secure to get more speed they should make that decision on their own.