On Wed, Dec 13, 2017 at 12:36 PM, Sage Weil <sweil@xxxxxxxxxx> wrote: > On Wed, 13 Dec 2017, Milan Broz wrote: >> On 12/12/2017 09:47 PM, Sage Weil wrote: >> > On Tue, 12 Dec 2017, Alfredo Deza wrote: >> >> On Tue, Dec 12, 2017 at 2:38 PM, Wyllys Ingersoll >> >> <wyllys.ingersoll@xxxxxxxxxxxxxx> wrote: >> >>> Its useful for legacy systems that installed with "plain" back when >> >>> that was the only option. Since there is no easy migration path for >> >>> re-keying an encrypted OSD to use a new encryption scheme, keeping >> >>> support for legacy "plain" is still very useful and desirable. >> >> >> >> Yes, for sure we are going to support that legacy option. But for >> >> *newly* created OSDs, I was looking forward to follow >> >> the preferred way with LUKS only. >> > >> > It's worth mentioning that the "new" way for new ceph-volume OSD >> > deployments will also be using LVM, and (presumably?) allow layering >> > dm-crypt on top of an LV--not just a PV or raw device. So this is more a >> > question of what, clean slate, we want to do to deploy dm-crypt when the >> > end result that we're after is an LV to feed to bluestore or filestore. >> > I'm not sure how/where LUKS fits in in the LVM world... >> >> I think LUKS fits in LVM world quite well. >> >> Standard Fedora (and most other distors as well) install stacks LVM over LUKS >> (so you activate only one encrypted device and then the partitioning is up to LVM. >> Also LVM metadata are then encrypted.) That is a very important distinction (encrypted LVM metadata) and why we don't want to go that route: we rely heavily on LVM metadata where we store the information about the OSD to be later queried. That metadata must be available without decryption. >> >> You can of course stack LUKS over LV as well, but for example LV resize >> will be two-step operation (well, fsadm can automate it but it is still two-steps). Right, this is what we are thinking to do. > > The problem I see is that we frequently carve up a single phsycial device > across lots of OSDs (usually for the journal or wal/db), and the key > management is currently structured around OSDs, not devices. We can > either (1) switch it all around so the key management is based on physical > devices instead of OSDs, or (2) carve the physical device into raw LVs, > dm-crypt those, and then consume the result. #2 here is my preference. Lets not switch key management around. I don't know how things like dmcache (which is made up of several physical devices) would work for option #1. > > We don't really have a need to resize devices, generally, so that's > probably not an issue... but I wonder if (1) is going to be an > easier/smaller change to make this work. It maps more directly onto the > threat model (a lost *device*) and probably also avoids some DM layers, > and so ought to be slightly faster? #1 would involve extra work for anything that is not a single device though right? On the ceph-volume side of things, there wouldn't be any overhead for #2 other than implementing the encryption. If #1 means we encrypt the physical device, then that makes LVM metadata encyrpted which wouldn't work for ceph-volume. LVM would be fine with #2 with lost disks too, I don't think that model changes. > > sage -- To unsubscribe from this list: send the line "unsubscribe ceph-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html