diff for duplicates of <1518024719.2870.39.camel@wdc.com>
diff --git a/a/1.txt b/N1/1.txt
index e4db7d5..349c565 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,13 +1,18 @@
-T24gV2VkLCAyMDE4LTAyLTA3IGF0IDE4OjE4ICswMTAwLCBSb21hbiBQZW55YWV2IHdyb3RlOg0K
-PiBTbyB0aGUgcXVlc3Rpb24gaXM6IGFyZSB0aGVyZSByZWFsIGxpZmUgc2V0dXBzIHdoZXJlDQo+
-IHNvbWUgb2YgdGhlIGxvY2FsIElCIG5ldHdvcmsgbWVtYmVycyBjYW4gYmUgdW50cnVzdGVkPw0K
-DQpIZWxsbyBSb21hbiwNCg0KWW91IG1heSB3YW50IHRvIHJlYWQgbW9yZSBhYm91dCB0aGUgbGF0
-ZXN0IGV2b2x1dGlvbnMgd2l0aCByZWdhcmQgdG8gbmV0d29yaw0Kc2VjdXJpdHkuIEFuIGFydGlj
-bGUgdGhhdCBJIGNhbiByZWNvbW1lbmQgaXMgdGhlIGZvbGxvd2luZzogIkdvb2dsZSByZXZlYWxz
-DQpvd24gc2VjdXJpdHkgcmVnaW1lIHBvbGljeSB0cnVzdHMgbm8gbmV0d29yaywgYW55d2hlcmUs
-IGV2ZXIiDQooaHR0cHM6Ly93d3cudGhlcmVnaXN0ZXIuY28udWsvMjAxNi8wNC8wNi9nb29nbGVz
-X2JleW9uZGNvcnBfc2VjdXJpdHlfcG9saWN5LykuDQoNCklmIGRhdGEtY2VudGVycyB3b3VsZCBz
-dGFydCBkZXBsb3lpbmcgUkRNQSBhbW9uZyB0aGVpciBlbnRpcmUgZGF0YSBjZW50ZXJzDQoobWF5
-YmUgdGhleSBhcmUgYWxyZWFkeSBkb2luZyB0aGlzKSB0aGVuIEkgdGhpbmsgdGhleSB3aWxsIHdh
-bnQgdG8gcmVzdHJpY3QNCmFjY2VzcyB0byBibG9jayBkZXZpY2VzIHRvIG9ubHkgdGhvc2UgaW5p
-dGlhdG9yIHN5c3RlbXMgdGhhdCBuZWVkIGl0Lg0KDQpUaGFua3MsDQoNCkJhcnQuDQoNCg0K
\ No newline at end of file
+On Wed, 2018-02-07 at 18:18 +0100, Roman Penyaev wrote:
+> So the question is: are there real life setups where
+> some of the local IB network members can be untrusted?
+
+Hello Roman,
+
+You may want to read more about the latest evolutions with regard to network
+security. An article that I can recommend is the following: "Google reveals
+own security regime policy trusts no network, anywhere, ever"
+(https://www.theregister.co.uk/2016/04/06/googles_beyondcorp_security_policy/).
+
+If data-centers would start deploying RDMA among their entire data centers
+(maybe they are already doing this) then I think they will want to restrict
+access to block devices to only those initiator systems that need it.
+
+Thanks,
+
+Bart.
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 2ced825..a847081 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -46,19 +46,24 @@
"b\0"
]
[
- "T24gV2VkLCAyMDE4LTAyLTA3IGF0IDE4OjE4ICswMTAwLCBSb21hbiBQZW55YWV2IHdyb3RlOg0K\n",
- "PiBTbyB0aGUgcXVlc3Rpb24gaXM6IGFyZSB0aGVyZSByZWFsIGxpZmUgc2V0dXBzIHdoZXJlDQo+\n",
- "IHNvbWUgb2YgdGhlIGxvY2FsIElCIG5ldHdvcmsgbWVtYmVycyBjYW4gYmUgdW50cnVzdGVkPw0K\n",
- "DQpIZWxsbyBSb21hbiwNCg0KWW91IG1heSB3YW50IHRvIHJlYWQgbW9yZSBhYm91dCB0aGUgbGF0\n",
- "ZXN0IGV2b2x1dGlvbnMgd2l0aCByZWdhcmQgdG8gbmV0d29yaw0Kc2VjdXJpdHkuIEFuIGFydGlj\n",
- "bGUgdGhhdCBJIGNhbiByZWNvbW1lbmQgaXMgdGhlIGZvbGxvd2luZzogIkdvb2dsZSByZXZlYWxz\n",
- "DQpvd24gc2VjdXJpdHkgcmVnaW1lIHBvbGljeSB0cnVzdHMgbm8gbmV0d29yaywgYW55d2hlcmUs\n",
- "IGV2ZXIiDQooaHR0cHM6Ly93d3cudGhlcmVnaXN0ZXIuY28udWsvMjAxNi8wNC8wNi9nb29nbGVz\n",
- "X2JleW9uZGNvcnBfc2VjdXJpdHlfcG9saWN5LykuDQoNCklmIGRhdGEtY2VudGVycyB3b3VsZCBz\n",
- "dGFydCBkZXBsb3lpbmcgUkRNQSBhbW9uZyB0aGVpciBlbnRpcmUgZGF0YSBjZW50ZXJzDQoobWF5\n",
- "YmUgdGhleSBhcmUgYWxyZWFkeSBkb2luZyB0aGlzKSB0aGVuIEkgdGhpbmsgdGhleSB3aWxsIHdh\n",
- "bnQgdG8gcmVzdHJpY3QNCmFjY2VzcyB0byBibG9jayBkZXZpY2VzIHRvIG9ubHkgdGhvc2UgaW5p\n",
- "dGlhdG9yIHN5c3RlbXMgdGhhdCBuZWVkIGl0Lg0KDQpUaGFua3MsDQoNCkJhcnQuDQoNCg0K"
+ "On Wed, 2018-02-07 at 18:18 +0100, Roman Penyaev wrote:\n",
+ "> So the question is: are there real life setups where\n",
+ "> some of the local IB network members can be untrusted?\n",
+ "\n",
+ "Hello Roman,\n",
+ "\n",
+ "You may want to read more about the latest evolutions with regard to network\n",
+ "security. An article that I can recommend is the following: \"Google reveals\n",
+ "own security regime policy trusts no network, anywhere, ever\"\n",
+ "(https://www.theregister.co.uk/2016/04/06/googles_beyondcorp_security_policy/).\n",
+ "\n",
+ "If data-centers would start deploying RDMA among their entire data centers\n",
+ "(maybe they are already doing this) then I think they will want to restrict\n",
+ "access to block devices to only those initiator systems that need it.\n",
+ "\n",
+ "Thanks,\n",
+ "\n",
+ "Bart."
]
-349880f51a780f34f5f75f0baca4e03e5cd44fab7f5f6f4abc9d16abf4e51046
+2bfc2a8e786de76759d1e3a03e23e7860605865333415a1f2f2f4d34d098f27f
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.