On 12/14/2017 02:17 PM, Alfredo Deza wrote: >>> Standard Fedora (and most other distors as well) install stacks LVM over LUKS >>> (so you activate only one encrypted device and then the partitioning is up to LVM. >>> Also LVM metadata are then encrypted.) > > That is a very important distinction (encrypted LVM metadata) and why > we don't want to go that route: we rely heavily on LVM metadata where > we store the > information about the OSD to be later queried. That metadata must be > available without decryption. LUKS2 allows you to store store your JSON data to LUKS header. For the identification of OSD or whatever you need it is even simpler. >> The problem I see is that we frequently carve up a single phsycial device >> across lots of OSDs (usually for the journal or wal/db), and the key >> management is currently structured around OSDs, not devices. We can >> either (1) switch it all around so the key management is based on physical >> devices instead of OSDs, or (2) carve the physical device into raw LVs, >> dm-crypt those, and then consume the result. > > #2 here is my preference. Lets not switch key management around. I > don't know how things like dmcache > (which is made up of several physical devices) would work for option #1. I currently lost overview what is Ceph doing, but for unlocking of crypt device - LUKS2 allows you to store passphrase to kernel keyring (in advance) and then device is unlocked automatically. (It needs to configure a "token" for metadata - in the case of keyring it is just name in keyring.) Maybe it can simplify your key management in future with LUKS. (LUKS2 is already in Fedora rawhide and in some experimental repos of other distros. It need some time to be widely used and I know it will need some fixes - but in principle things mentioned above already work.) Milan -- To unsubscribe from this list: send the line "unsubscribe ceph-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html