Re: on disk encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Correct.

I wasn't actually involved in this (or any other real) work,
but as I recall the only real trick is how much key management
you want:

  Do we want to be able to recover the key if a good disk
  is rescued from a destroyed server and added to a new
  server?

  Do we want to ensure that the keys are not persisted on
  the server, so that an entire server can be decommissioned
  without having to worry about the data being recovered
  by somebody who knows where to look?

If you are willing to keep the key on the server and lose
the data when the server fails, this is trivial.  If you
are unwilling to keep the key on the server, or if you need
the disk to remain readable after the server is lost, we
need some third party (like the monitors) to maintain the
keys.

We thought these might be important, so we were looking
at how to get the monitors to keep track of the encryption
keys.

On 01/31/2013 03:42 PM, Marcus Sorensen wrote:
Yes, anyone could do this now by setting up the OSDs on top of
dm-crypted disks, correct? This would just automate the process, and
manage keys for us?

--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux