2017-09-11 06:34 AM
I am testing our clustered ontap with a nfs/krb5 client from Centos7. To our older ontap 7 filers we used arcfour encryption. Is there anyone who knows what has changed in ontap 9.2 ?
Is AES256 the only one supported and has anyone have a nfs/krb5 system that is working ?
2017-09-11 09:56 PM
Following Kerberos 5 are supported:
Krb5i uses checksums to verify the integrity of each NFS message transferred between client and server. This is useful both for security reasons, for example to ensure that data has not been tampered with, and data integrity reasons, for example to prevent data corruption when using NFS over unreliable networks.
Krb5p uses checksums to encrypt all the traffic between client and the server. This is more secure and also incurs more load.
Advanced Encryption Standard (AES) is an encryption algorithm for securing electronic data. Data ONTAP now supports AES with 128-bit keys (AES-128) and AES with 256-bit keys (AES-256) encryption for Kerberos for stronger security.
SVM administrators can now create Kerberos realm configurations at the SVM level. This means that SVM administrators no longer have to rely on the cluster administrator for Kerberos realm configuration and can create individual Kerberos realm configurations in a multi-tenancy environment.