Re: fully encrypted ceph

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



If you're running Nautilus you can enable the new messenger encryption
option. That's marked experimental right now but has been stable in
testing so that flag will be removed in the next point release or two.

Not sure about setting up Ceph-volume with locally-stored keys; partly
we just assume your monitors are "farther away" from the OSD drives so
even if the keys are transmitted unencrypted that's more secure
against practical attacks...
-Greg

On Wed, May 29, 2019 at 11:28 AM Ugis <ugis22@xxxxxxxxx> wrote:
>
> Hi,
>
> What are current options to set up fully encrypted ceph cluster(data
> encrypted in transit & at rest)?
>
> From what I have gathered:
> option: ceph OSDs with dmcrypt and keys stored in monitors - this
> seems not secure because keys travel from monitors to OSDs unencrypted
> by default.
>
> workarounds would be:
> - best:to use OSDs on luks crypt devices and unlock luks locally but
> somehow ceph-volume refuses to create OSD on /dev/mapper/..crypt
> device - why that?
> - not avaialable: to store OSD dmcrypt keys in TANG server and use
> clevis to retrieve keys.
> - viable but unconvenient: create VPN between osds and mons
>
> What could be other suggestions to set up fully encrypted ceph?
>
> Best regards,
> Ugis



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux