From: Markus Armbruster <armbru@redhat.com>
To: "Hamilton, Peter A." <Peter.Hamilton@jhuapl.edu>
Cc: "Kevin Wolf" <kwolf@redhat.com>,
"Benoît Canet" <benoit.canet@irqsave.net>,
"qemu-devel@nongnu.org" <qemu-devel@nongnu.org>,
"Coffman, Joel M." <Joel.Coffman@jhuapl.edu>,
"Stefan Hajnoczi" <stefanha@redhat.com>
Subject: Re: [Qemu-devel] Adding dmcrypt to QEMU block drivers
Date: Tue, 18 Mar 2014 11:19:24 +0100 [thread overview]
Message-ID: <87bnx3reqb.fsf@blackfin.pond.sub.org> (raw)
In-Reply-To: <EE1A64E628992240A94E2B625745F0167602286166@aplesstripe.dom1.jhuapl.edu> (Peter A. Hamilton's message of "Mon, 17 Mar 2014 20:48:08 -0400")
Cc'ing a few interested parties.
"Hamilton, Peter A." <Peter.Hamilton@jhuapl.edu> writes:
> Hi qemu-devel,
>
> I am a member of a development team based out of the Johns Hopkins
> University Applied Physics Laboratory. Over the past year and a half,
> we've been working with the OpenStack community on several security
> features for their Compute and Block Storage services that leverage
> encrypted data storage. One of these features, ephemeral storage
> encryption for qcow2-based virtual machines, would leverage the
> encryption functionality built into the qcow2 file format. However,
> there are significant issues with the security and implementation of
> the qcow2 encryption feature that preclude us from using it in
> OpenStack. For example, there is no support for the following security
> features: rekeying of encrypted images, key stretching, and cipher
> configurability.
I think most, if not all of us would agree that the existing encryption
support in QEMU is fertilizer.
> After discussing some of these details with Daniel Berrange, we are
> interested in working with you to add and improve the encryption
> support offered by QEMU. In the past, Daniel has advocated the full
> adaptation of the LUKS file format used by dmcrypt, which we currently
> use in OpenStack. Our proposal would focus on adding a dmcrypt-style
> encryption layer above the QEMU block driver layer, which would
> transparently encrypt and decrypt all data written to or read from the
> underlying block device. This would provide encryption support for all
> backends and file formats supported by QEMU that leverage block
> drivers. Such support in QEMU provides significantly improved security
> and renders the existing encryption scheme provided by qcow2 obsolete.
>
> My intent at the moment is to get a feel for your thoughts and
> concerns about this proposal and to determine who is currently working
> on QEMU security features or would be interested in working with us on
> this feature. I've found past discussions in the QEMU community
> addressing these encryption concerns but am unaware at the moment what
> the status is for those development efforts. I'd be happy to provide
> additional information about our past and current work on OpenStack
> security if anyone is interested.
As far as I know, nobody is working on block device encryption in QEMU
at this time.
The block layer is maintained by Kevin and Stefan (both cc'ed).
They, Eric and myself can assist you with interfaces.
[...]
next prev parent reply other threads:[~2014-03-18 10:19 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-03-18 0:48 [Qemu-devel] Adding dmcrypt to QEMU block drivers Hamilton, Peter A.
2014-03-18 10:19 ` Markus Armbruster [this message]
2014-03-18 13:08 ` Stefan Hajnoczi
2014-03-18 13:30 ` Daniel P. Berrange
2014-03-18 14:09 ` Kevin Wolf
2014-03-20 8:23 ` Stefan Hajnoczi
2014-03-20 12:41 ` Daniel P. Berrange
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87bnx3reqb.fsf@blackfin.pond.sub.org \
--to=armbru@redhat.com \
--cc=Joel.Coffman@jhuapl.edu \
--cc=Peter.Hamilton@jhuapl.edu \
--cc=benoit.canet@irqsave.net \
--cc=kwolf@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.