Re: Proposal: data-at-rest encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 08/27/2015 03:38 PM, Sage Weil wrote:
> On Thu, 27 Aug 2015, Joshua Schmid wrote:
>>
>> On 08/27/2015 02:49 AM, Sage Weil wrote:
>>> Hi Joshua!
>>>
>>
>> Hi Sage,
>>
>>
>>> Overall the ceph-disk changes look pretty good, and it looks like Andrew 
>>> and David have both reviewed.  My only real concern/request is that the 
>>> key server be as pluggable as possible.  You're using ftps here, but we'd 
>>> also like to allow deo[1], or even the mon config-key service.
>>
>> Thank for having a look!
>> I think this should do:
>>
>> https://github.com/jschmid1/ceph/commit/7dd64c70bcb8d986568d6f379a6fbf9a0e40a441
>>
>> Service of choice can now be set in the ceph.conf and will be handled
>> separately. This is currently only for unlocking/mapping but will be
>> extended for locking/new if this solution is acceptable.
> 
> Yep!  It'd probably be much cleaner to wrap this up in a class with 
> fetch_key() and create_key(), etc. methods so that there is only one place 
> that has to instantiate the implemetnation based on type.
> 

I dont know if i understood you correctly here. But, since ceph-disk is
classless wouldn't it be a bit strange to introduce one?
I now put anything associated with fetching/creating key in a seperate
method retrieve_key() and create_key() which will behave accordingly.



>>> With the original mon proposal, we also wanted an additional layer of 
>>> security (beyond simply access to the storage network) by 
>>> storing some key-fetching-key on the disk.
>>
>> Like deo does it? (From the deo README)
>>
>> """
>> Second, we will add a new random key to the pre-existing LUKS encrypted
>> disk and then encrypt it using Deo in a known location.
>> """
>>
>>
>>   It looks like the ftps
>>> access is unauthenticated... is that right?  I would assume (I'm not hte 
>>> expert!) that most key management systems require some credentials to 
>>> store/fetch keys?
>>
>> Its totally unauthenticated, thats right. It'd be possible to require
>> USER/PASS for ftp.
> 
> Yeah.  If we have a general method to store a key-fetching-key on the disk 
> (in the LUKS table?  I forget if this was practical) on the LUKS disk the 
> might work?  Hopefully such that various backends can all use it (e.g., as 
> the ftps password, or as a mon key)..


I guess putting it in the LuksKeySlot[1] might work. But plain-dmcrypt
has to be handled differently then. For compatibility reasons i suggest
to avoid that. But storing it on the root partition is not a good idea
either. This area definitely needs more heavy thinking..


> 
> sage
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 

-- 
Freundliche Grüße - Kind regards,
Joshua Schmid
Trainee - Storage
SUSE Linux GmbH - Maxfeldstr. 5 - 90409 Nürnberg
--------------------------------------------------------------------------------------------------------------------
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard,
Jennifer Guild, Dilip Upmanyu, Graham Norton, HRB 21284 (AG Nürnberg)
--------------------------------------------------------------------------------------------------------------------
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux