All of lore.kernel.org
 help / color / mirror / Atom feed
From: Loic Dachary <loic@dachary.org>
To: Joshua Schmid <jschmid@suse.de>,
	Ceph Development <ceph-devel@vger.kernel.org>
Subject: Re: Fwd: Re: osd dm-crypt key management, part... deux?
Date: Thu, 28 Jan 2016 19:00:00 +0700	[thread overview]
Message-ID: <56AA02C0.4050901@dachary.org> (raw)
In-Reply-To: <56A9E2EC.8040000@suse.de>

Hi Joshua,

Is there an issue related to your changes in http://tracker.ceph.com/ or would you like me to create one ?

Cheers

On 28/01/2016 16:44, Joshua Schmid wrote:
> 
> Hi Sage,
> 
> On 01/27/2016 03:26 PM, Sage Weil wrote:
>> We've had several partial starts to address this problem but haven't 
>> gotten anything over the line.  A quick summary:
>>
>> 1- Currently we store dm-crypt keys in /etc/ceph/dmcrypt-keys/$osd_uuid, 
>> on the boot disk.  This lets you throw away OSD disk but not boot disks 
>> and doesn't help you if someone walks away with a whole server.
>>
>> 2- SUSE had a pull request that made ceph-disk push/pull keys over (s)ftp.  
>> I can't find it now.. did it get closed?
> 
> It's here.
> 
> https://github.com/SUSE/ceph/commit/0f5644ef3d1b1a9a14be97717b9d8dfe0338b74d
> 
>>
>> I suggest we do something simple:
>>
>> 1- Update SUSE's ceph-disk changes to make it easy to plug in 
>> different key management strategies.
> 
> And there.
> 
> https://github.com/SUSE/ceph/commit/127a47ca7cf28f387d832da265f6955bb04107c3
> 
> SUSE currently sticks with this solution since its pluggable and works
> fairly well. It may not be the cleanest solution to rely on an external
> tool(ftp) but until now there is simply no other option.
> 
>>
>> 2- Implement a simple mon-based strategy upstream.  We've discussed this a 
>> fair bit in the past, and were getting stuck on the problem of where to 
>> store the key-fetching-key.  I.e., we want a key on the disk that you use 
>> to ask the monitor for the LUKS key, which you then provide to LUKS to 
>> unlock the actual encryption key.  This means that we need a unencrypted 
>> spot on the device to store it in.  Milan has indicated that putting it in 
>> a LUKS key slot would be a bad idea and difficult to maintain.  Instead, I 
>> propose we create a new GPT partition type called OSD_LOCKBOX (or 
>> similar), with a tiny filesystem and a few files indicating what to do.  
>> This will make it easy to store the info we need for the mon scheme, and 
>> to support new key management approaches later (we can put whatever we 
>> want there as long as it's not too big).
> 
> Sounds good! But i still see the possible scenario where you dump a
> whole rack with a MON + OSD. As a potential attacker, having these two
> components would grant you access to all the keys needed to decrypt the
> OSDdata. If I got understood it correctly that every MON should hold all
> available keys.
> 
> Some additions:
> 
> The MON should only hand out keys when authenticated or in a clean
> cluster context. So what i mean is basically some way to proof if the
> MON is not in a made up environment.
> 
> 
>>
>> I put some notes here:
>>
>> 	http://pad.ceph.com/p/osd-key-management
>>
>> Thoughts?
>> sage
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
> 

-- 
Loïc Dachary, Artisan Logiciel Libre
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

  reply	other threads:[~2016-01-28 12:00 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <56A9E13E.8050508@suse.de>
2016-01-28  9:44 ` Fwd: Re: osd dm-crypt key management, part... deux? Joshua Schmid
2016-01-28 12:00   ` Loic Dachary [this message]
2016-02-05 10:13     ` Loic Dachary
2016-02-05 10:22       ` Loic Dachary
2016-01-28 14:53   ` Sage Weil
2016-01-28 16:32     ` Joshua Schmid
2016-01-28 17:46       ` Sage Weil
2016-02-02 11:26         ` Joshua Schmid

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56AA02C0.4050901@dachary.org \
    --to=loic@dachary.org \
    --cc=ceph-devel@vger.kernel.org \
    --cc=jschmid@suse.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.