From: "Daniel P. Berrange" <berrange@redhat.com>
To: Max Reitz <mreitz@redhat.com>
Cc: qemu-devel@nongnu.org, qemu-block@nongnu.org,
Eric Blake <eblake@redhat.com>, Kevin Wolf <kwolf@redhat.com>,
Alberto Garcia <berto@igalia.com>
Subject: Re: [Qemu-devel] [PATCH v9 13/20] qcow2: add support for LUKS encryption format
Date: Fri, 23 Jun 2017 11:06:29 +0100 [thread overview]
Message-ID: <20170623100629.GD28635@redhat.com> (raw)
In-Reply-To: <48afe1ce-e500-e7a7-18de-2ed67d808df3@redhat.com>
On Wed, Jun 21, 2017 at 04:59:02PM +0200, Max Reitz wrote:
> On 2017-06-21 16:46, Max Reitz wrote:
> > On 2017-06-21 16:42, Max Reitz wrote:
> >> On 2017-06-19 19:34, Daniel P. Berrange wrote:
> >>> This adds support for using LUKS as an encryption format
> >>> with the qcow2 file, using the new encrypt.format parameter
> >>> to request "luks" format. e.g.
> >>>
> >>> # qemu-img create --object secret,data=123456,id=sec0 \
> >>> -f qcow2 -o encrypt.format=luks,encrypt.key-secret=sec0 \
> >>> test.qcow2 10G
> >>>
> >>> The legacy "encryption=on" parameter still results in
> >>> creation of the old qcow2 AES format (and is equivalent
> >>> to the new 'encryption-format=aes'). e.g. the following are
> >>> equivalent:
> >>>
> >>> # qemu-img create --object secret,data=123456,id=sec0 \
> >>> -f qcow2 -o encryption=on,encrypt.key-secret=sec0 \
> >>> test.qcow2 10G
> >>>
> >>> # qemu-img create --object secret,data=123456,id=sec0 \
> >>> -f qcow2 -o encryption-format=aes,encrypt.key-secret=sec0 \
> >>> test.qcow2 10G
> >>>
> >>> With the LUKS format it is necessary to store the LUKS
> >>> partition header and key material in the QCow2 file. This
> >>> data can be many MB in size, so cannot go into the QCow2
> >>> header region directly. Thus the spec defines a FDE
> >>> (Full Disk Encryption) header extension that specifies
> >>> the offset of a set of clusters to hold the FDE headers,
> >>> as well as the length of that region. The LUKS header is
> >>> thus stored in these extra allocated clusters before the
> >>> main image payload.
> >>>
> >>> Aside from all the cryptographic differences implied by
> >>> use of the LUKS format, there is one further key difference
> >>> between the use of legacy AES and LUKS encryption in qcow2.
> >>> For LUKS, the initialiazation vectors are generated using
> >>> the host physical sector as the input, rather than the
> >>> guest virtual sector. This guarantees unique initialization
> >>> vectors for all sectors when qcow2 internal snapshots are
> >>> used, thus giving stronger protection against watermarking
> >>> attacks.
> >>>
> >>> Reviewed-by: Eric Blake <eblake@redhat.com>
> >>> Reviewed-by: Alberto Garcia <berto@igalia.com>
> >>> Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
> >>> ---
> >>> block/qcow2-cluster.c | 4 +-
> >>> block/qcow2-refcount.c | 10 ++
> >>> block/qcow2.c | 268 ++++++++++++++++++++++++++++++++++++++------
> >>> block/qcow2.h | 9 ++
> >>> qapi/block-core.json | 5 +-
> >>> tests/qemu-iotests/082.out | 270 ++++++++++++++++++++++++++++++++++++---------
> >>> 6 files changed, 478 insertions(+), 88 deletions(-)
> >>
> >> Reviewed-by: Max Reitz <mreitz@redhat.com>
> >
> > (But due to the split of do_perform_cow(), this will need the same
> > changes that patch 10 and 11 will need (in this case only contextual, in
> > the cases of 10 and 11 there are also functional changes required).)
>
> (Turns out it will need a functional change, too, because
> do_perform_cow_encrypt() doesn't take the host offset yet.)
Yep, I've just rebased to kevin/block and resolved these problems
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|
next prev parent reply other threads:[~2017-06-23 10:06 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-06-19 17:34 [Qemu-devel] [PATCH v9 00/20] Convert QCow[2] to QCryptoBlock & add LUKS support Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 01/20] block: expose crypto option names / defs to other drivers Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 02/20] block: add ability to set a prefix for opt names Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 03/20] qcow: document another weakness of qcow AES encryption Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 04/20] qcow: require image size to be > 1 for new images Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 05/20] iotests: skip 042 with qcow which dosn't support zero sized images Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 06/20] iotests: skip 048 with qcow which doesn't support resize Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 07/20] block: deprecate "encryption=on" in favor of "encrypt.format=aes" Daniel P. Berrange
2017-06-20 11:44 ` Alberto Garcia
2017-06-20 12:02 ` Daniel P. Berrange
2017-06-20 14:07 ` Alberto Garcia
2017-06-23 10:08 ` Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 08/20] qcow: make encrypt_sectors encrypt in place Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 09/20] qcow: convert QCow to use QCryptoBlock for encryption Daniel P. Berrange
2017-06-21 14:29 ` Max Reitz
2017-06-23 10:06 ` Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 10/20] qcow2: make qcow2_encrypt_sectors encrypt in place Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 11/20] qcow2: convert QCow2 to use QCryptoBlock for encryption Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 12/20] qcow2: extend specification to cover LUKS encryption Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 13/20] qcow2: add support for LUKS encryption format Daniel P. Berrange
2017-06-21 14:42 ` Max Reitz
2017-06-21 14:46 ` Max Reitz
2017-06-21 14:59 ` Max Reitz
2017-06-23 10:06 ` Daniel P. Berrange [this message]
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 14/20] qcow2: add iotests to cover LUKS encryption support Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 15/20] iotests: enable tests 134 and 158 to work with qcow (v1) Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 16/20] block: rip out all traces of password prompting Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 17/20] block: remove all encryption handling APIs Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 18/20] block: pass option prefix down to crypto layer Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 19/20] qcow2: report encryption specific image information Daniel P. Berrange
2017-06-19 17:34 ` [Qemu-devel] [PATCH v9 20/20] docs: document encryption options for qcow, qcow2 and luks Daniel P. Berrange
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170623100629.GD28635@redhat.com \
--to=berrange@redhat.com \
--cc=berto@igalia.com \
--cc=eblake@redhat.com \
--cc=kwolf@redhat.com \
--cc=mreitz@redhat.com \
--cc=qemu-block@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).