Re: CDS blueprint: strong auth for cephfs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Nov 14, 2013, at 5:37 PM, Gregory Farnum <greg@xxxxxxxxxxx>
 wrote:

> On Thu, Nov 14, 2013 at 8:21 AM, Dan van der Ster <dan@xxxxxxxxxxxxxx> wrote:
>> On Thu, Nov 14, 2013 at 4:55 PM, Gregory Farnum <greg@xxxxxxxxxxx> wrote:
>>> Ah, I hadn't gotten that from skimming the blueprint. So this isn't
>>> just about hooking into Kerberos when we do a mount, you want to
>>> dynamically retrieve different caps from the monitors as users log on,
>>> and have that single client choose between them based on who's making
>>> the request?
>> 
>> In our proposal the "additional capabilities" (which allow IOs with a
>> particular file/object) are encrypted and sent by the MDS to the
>> client who passes it on to the OSD for object IOs.
> 
> I'm confused; if two different people are using the same client mount,
> the MDS can't distinguish between them unless the client is
> cooperating. Isn't that what you were saying it needs to do?

It's the "who passes it on" which created the confusion? This was to say that
the client kernel module can't decrypt the additional capability (as it does not
have the corresponding key). That does however not mean that the MDS or
the CephFS client module can't distinguish between users as all communication
is done using session keys. That's at least how I understood it :)

>>>>> the MDS tickets in a lot more detail than you have there, though — for
>>>>> instance, with your current description you'll need a shared secret
>>>>> between the OSD and MDS, and you'll need to expire the client extra
>>>> 
>>>> Right, the shared secret is the kerberos service key in our model.
>>> 
>>> So the whole Ceph cluster has one shared service key, and they use
>>> that for securing everything that anybody does? (Sorry, that's
>>> probably an elementary question, but I haven't looked at Kerberos
>>> since Yehuda implemented the initial CephX auth.)
>> 
>> We've used the shared service key in the past with other distributed
>> file systems. But perhaps the model can be changed to per-OSD/MDS
>> keys.
>> 
>>> By the time I arrived this was all history; you'll have to wait until
>>> Sage gets back for that one. I suspect he didn't like the performance
>>> enough and the trees had diverged non-trivially by the time Maat was
>>> in a useful state. But if you are brave, you can go back in time
>>> (couple years ago) and look for the "security" folder, which I think
>>> contained the Maat changes, and see what would be involved in
>>> extracting them. :)
>> 
>> Is it this one?
>>   https://github.com/ceph/ceph/tree/historic/aleung_mds_security/
> 
> Specifically the branches/aleung/security1/ folder in there. (This is
> all svn branches converted to a git repository, etc, so the
> organization is a bit weird.)

Cheers,
 Arne




--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux