[Info-vax] Moving away from OpenVMS
johnson.eric at gmail.com
johnson.eric at gmail.com
Thu May 24 07:52:15 EDT 2012
> I don't know ATA over Ethernet (or iSCSI).
> What's the security model with them?
> Does it credibly map onto a VMS security
> model , or does the storage have one
> level of authentication which entitles any
> authenticated client to get at all the blocks?
Darn. I created confusion with my quick broad stroke comparison to ATA over Ethernet. It's not something to use here. I liked that they took a traditional (legacy?) protocol and put new life into it by effectively redirecting it over a commodity medium - Ethernet. When you start using 10 gig and wring out the latency, good things can happen.
But still - you asked about the security model and how would that work. In my view, each Linux side process would have a corresponding VMS side process to represent it in the VMS cluster. The one to one client/server process relationship makes it easier to preserve an existing security model. So if the code invokes SYS$GET_SECURITY then that function on the x86 side would be forwarded to the corresponding buddy process for execution on VMS.
> they [sector 7] (allegedly) already have
> (for fee) versions of SYS $CONNECT
> and a wide variety of VMS-derived stuff.
You are certainly right that they offer that. The difference in what I'm proposing is that the sector7 style solution is effectively creating a new cluster. Whereas what I'm describing gives you concurrent real time access to your current cluster and the data it has access to. It's the same difference between adding a node to a cluster versus starting a new one.
I think that some systems may do better transitioning to a newer system with an "add a node to the cluster" model versus "let's make a new cluster". That premise may be wrong though.
EJ
More information about the Info-vax
mailing list