Re: Encrypted over WAN?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

As this quoted text came from the RGW server-side encryption docs [1], I'll add some details about that.

First, this is an S3-only feature that implements two of Amazon's specifications, SSE-C and SSE-KMS. For each upload, the S3 client must specifically request server side encryption by providing extra headers for each object upload. For example, you can do this with boto3 [2] by providing a ServerSideEncryption with either a SSEKMSKeyId or SSECustomerKey/SSECustomerAlgorithm when uploading an object.

Because this encryption must be requested by the client on a per-object basis, and will not apply to the Swift protocol at all, it can't be used to provide blanket encryption for all radosgw object data. At best, a bucket policy could require SSE-KMS encryption for all contained objects, but this is not yet implemented in RGW.

This encryption only applies to object data. Other metadata, such as object names, sizes and etags, are still visible to any client that can GET the bucket listing or HEAD the objects.


On 10/02/2017 02:18 AM, Two Spirit wrote:
The Ceph Object Gateway supports server-side encryption of uploaded objects, with 3 options for the management of encryption keys. Server-side encryption means that the data is sent over HTTP in its unencrypted form, and the Ceph Object Gateway stores that data in the Ceph Storage Cluster in encrypted form.

While this says that data is sent over HTTP in its unencrypted form, the Amazon specifications do require that SSE requests be made over an SSL connection, and RGW does enforce this.

It sounds like OSD to OSD traffic is unencrypted.

1) Does "stores data in the cluster in encrypted form" mean *only* if
the --dmcrypt option is used?

RGW server side encryption does not rely on the dmcrypt configuration of the OSDs. For SSE-enabled objects, RGW will encrypt the object data before sending it to OSDs, so unencrypted data is not sent over Ceph's client/cluster networks.


2) Does that mean the zone  to zone copy across a WAN is also unencrypted?

In a multisite configuration, SSE-enabled objects are replicated between zones in their encrypted form. The same requirements for decryption apply to both zones.

--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[1] http://docs.ceph.com/docs/luminous/radosgw/encryption/
[2] http://boto3.readthedocs.io/en/latest/reference/services/s3.html#S3.Client.put_object
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux