Re: [RFC] Ceph encryption support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Gregory,
  Thanks for your comments.

On 11/13/2013 01:58 AM, Gregory Farnum wrote:
On Tue, Nov 12, 2013 at 6:10 AM, Li Wang <liwang@xxxxxxxxxxxxxxx> wrote:
Hi,
   We want to implement encryption support for Ceph.
   Currently, we have the draft design,

1 When user mount a ceph directory for the first time, he can specify a
passphrase and the encryption algorithm and length of key etc. These will be
stored as extend attribute of the current root directory, of course, with
the passphrase being hashed several times, call it TOKEN.
2 When user try to mount an encrypted directory, a passphrase is required to
given, then hash and compare with the stored TOKEN, if equal, accept to
mount, otherwise reject to mount.

How would this work? If I mount the root directory and then try to
navigate down into an encrypted directory, when do I get asked for the
passphrase?


I think the duty of encryption is to protect the confidence of the content of files, that is, user cannot view the plain text if without valid password. But not to prevent user from navigating into the directory, even damage and delete the file, those are something should be done by access control (acl, selinux etc). So, our design for the initial version of encryption is that we donot care this, user could navigate into the encyrpted directory, so what, he will see all encrypted text, and the encrypted file name. This is also what eCryptfs is doing, user could read/write/delete the encrypted file directly from the lower file system, provided the access control allows him to do so.

3 When a file is created, a random key (FEK, file encryption key) is
generated, and this key is encrypted by TOKEN, we get EFEK (encrypted FEK),
the EFEK and other encryption related information inherited from the root
directory are stored in the extend attribute of file.

So the hash is visible to clients who don't support encryption? Or do
you want to hide it somehow?


So we plan to not to store Token at all. If you enter wrong pass phrase, you could still mount the directory, but you will see encrypted text. This is basically what eCryptfs is doing. Maybe we could improve user experience a little bit by using HMAC on Token to get a hash value HToken to be stored. But HToken is only used to warn the valid user if he accidentally input wrong pass phrase.

So in a word, we think that encryption is for protecting the current content of files, rather than preventing damaging/deleting the files, that is what access control is supposed to do. And, in any case, we could hardly prevent the user using old client (without encryption support) or manipulating rados directly to damage/delete the encrypted file. But one thing we do could consider is to use HMAC to warn the valid user that the file has been modified by other unauthorized person.

4 When a file is opened, retrieve the extend attribute, we get EFEK,
use TOKEN to decrypt EFEK, get FEK, buffered in the inode
5 When a file is read in readpage()/readpages(), the encrypted pages are
decrypted transparently by using FEK, and the plain data are sent to
application
6 When a file is written in writepage()/writepages(), the pages are
encrypted transparently by using FEK, and then written to OSDs.

Some points,
1 We do client side encryption, the advantages are,
   (1) The data over network are encrypted;
   (2) OSDs are intended to do io intensive job, we donot wanna bother them
to do cpu intensive job, thus we can use cheap and low power machines
   (3) The implementation is OSD transparent, and mostly MDS transparent,
enjoys the simplification.
2 What about if no page cache?
   Block cipher algorithm is more secure than stream cipher algorithm, so we
prefer the former. If no page cache, we have two choices, with encryption
enabled, the same file is not allowed by opened by the second writer,
alternatively, we enforce O_LAZYIO on the file, but application is supposed
to be aware of this.

We plan to submit it as a blueprint for the incoming CDS, comments are
welcome.

This doesn't sound infeasible, but I'll welcome the details in a
blueprint. :) The main thing I'm worried about is that if anybody
breaks the TOKEN they have access to everything, and the hash is going
to be available to anybody who wants to see it.
When I've thought about this in the past I've tended more towards a
system that uses time-based passcodes derived from a secret which the
MDS and OSD share, which lets you do sharing without giving the client
unlimited permissions on a file. But that requires a lot more
modifications, and your system has some nice properties as well. You
might also find
https://www.usenix.org/system/files/conference/fast13/fast13-final142.pdf
interesting — it's a very different approach, but people have done
some thinking about distributed filesystem security before and it's
always good to consider what's out there before starting. :)
-Greg

--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux