Re: cephx auth question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 12 Jun 2012, John Axel Eriksson wrote:
> Thanks alot for your input Sage!
> 
> I get a feeling that this is good for a larger cluster, especially
> when you have many people logging in - some without root access.
> We are currently a VERY small company (two people have logins and root
> access - noone else has a login at all). We've been running
> another distributed object storage solution for quite some time which
> has no authentication whatsoever and it has worked just fine for
> us. Now we're looking for a replacement since we're not entirely happy
> with our current solution - it hasn't been entirely stable and we've
> lost data twice.
> 
> I guess we could simply start off without authentication and later on
> enable it if we do need it. Is that relatively easy to do in a running
> cluster?

Yes.  The doc linked below outlines the steps that will be needed.

> Also is there a good place where I could read up on exactly what
> happens if an OSD or something else fails? For example with the
> default two replicas - will that data be copied to another OSD if one
> fails, do I have to manually do anything, can I read the data as long
> as there is one copy somewhere?

http://ceph.com/docs/master/ops/manage/failures/

has lots of information about managing and diagnosing failures.  If there 
are gaps, please let us know!

sage


> 
> john
> 
> On Tue, Jun 12, 2012 at 6:56 PM, Sage Weil <sage@xxxxxxxxxxx> wrote:
> > A few things that Wido missed:
> >
> > On Tue, 12 Jun 2012, John Axel Eriksson wrote:
> >
> >> I asked a similar question in a previous email but I didn't get any
> >> satisfying answers. What exactly does cephx auth secure?
> >> >From the wiki I just get "this makes your cluster more secure", well
> >> from what? If I run on an internal network accessible only
> >> by a few trusted people - what does cephx auth secure in such a scenario?
> >
> > There is some very preliminary docs at
> >
> >        http://ceph.com/docs/wip-auth/ops/manage/security/
> >
> > Basically:
> >
> >  * mutual authentication between client and server
> >  * capabilities limiting what clients are allowed to do
> >
> > But:
> >
> >  * no encryption of over-the-wire communications
> >  * no protection from hijacked TCP sessions (although simpler
> >   man-in-the-middle attacks aren't possible)
> >
> >> In that previous email I got the answer that it secures the cluster
> >> from mistakenly connecting to wrong cluster with rados and
> >> accidentally deleting a pool... well, can rados really "accidentally"
> >> connect to the wrong cluster?
> >
> > The client can accidentally connect to the wrong cluster if fed the
> > wrong monitor address or config.
> >
> >> Only if I have the wrong config
> >> file right? And if I have the wrong config-file won't it be possible
> >> that I also have the "wrong" key in that case?
> >
> > Yes.
> >
> > That said, daemons are careful to validate the cluster fsid before
> > communicating regardless of whether cephx is enabled or not.
> >
> > You *can* put fsid = ... in the config file, but the client side isn't
> > validating it currently, and that won't help if you point at the wrong
> > config file.
> >
> >> Another scenario would be if I take down an OSD that just sits in
> >> storage for say 6 months and then someone starts that machine
> >> again - with key-based auth that OSD wouldn't be able to
> >> connect(somehow? but if it has a working key?) but without auth it
> >> could
> >> possibly connect and wreak havoc in the cluster (since it is so much
> >> behind perhaps in both version of software and what's stored on it).
> >> I thought marking and OSD as down or out would do that?
> >
> > Marking out manually will prevent the osd from being marked in
> > automatically, but it will still start up and 'join' the cluster.
> > However, whenever there is an incompatible change, we bump protocol
> > numbers or add feature fits, so it shouldn't be able to do any damage.
> >
> > I think the main motivation is to prevent a non-root user from, say,
> > deleting your data pool, or to limit such 'admin' activity to a select
> > number of nodes (e.g., the monitor hosts).
> >
> > sage
> >
> >> Are those the main reasons for having cephx auth? Is it to secure the
> >> cluster against people (myself included) making mistakes or  from
> >> hacking, or is there some technical reason that I don't know of or understand?
> >>
> >> The reason I'm asking is because having cephx enabled makes cluster
> >> setup much more complicated...
> >>
> >>
> >> Thanks,
> >>
> >> John
> >> --
> >> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> >> the body of a message to majordomo@xxxxxxxxxxxxxxx
> >> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> >>
> >>
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
> 

[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux