> > Pathological example:
> >
> > rbd rm $image (successful deletion)
> > ceph pause immediately after that
> > Do the recovery procedure noted above
> >
> > How likely is it that we would be able to recovery the data?
>
> Like most filesystems, pretty likely at a certain granularity.  In the above 
> case, the RBD trash system may even be in play.
> I’m confident that users can’t get at data, but to protect against thieves, 
> liquidators etc., dmcrypt is your friend - just never get rid of the mon 
> SSDs, or at the very least issue crypto erase operations on them before 
> letting go.

Yes, I agree with the above statement. If you have a client using this
RBD and needs to make sure evil ceph admins can't get to the data,
they should definitely encrypt the partition where this RBD gets
mounted.
Then it is just a matter of forgetting the key to this and delete the
RBD image as you please.

If the secret you are hoping to protect is like a x509 cert key, it
will be around 1-2k at most, so anyone being able to read the raw
disks 5 seconds after you do "ceph pause" will then find this ------
BEGIN KEY -------- and be able to steal this super important key
because it will be lying around somewhere on three or more OSDs. If
you as a client on the other hand LUKS-encrypt the RBD mount, then
wipe the key (or reset key to a random value you don't know
afterwards) and then delete the RBD image, the encrypted data will
possibly be able to be found by people with root access to OSD hosts -
or the physical boxes, but they will not be able to read the secret
data you wanted to protect.

I'm somewhat of the idea that if someone asked me to successfully
piece together a 40G RBD image that was deleted some time ago on a
busy cluster, I would probably not be able to, not even to save my
kids lives. But others theoretically might, and auditors seldom care
for non-numeric values like "JJs kids lives" so if you have a real
case, just go with local disk or partition encryption and be done with
it. The perf hit is not so bad anymore and needing to trust someone
you might not trust and convince an auditor you can trust them is just
not worth the hassle. All major OSs have encrypted file system options
so this part is solved already, and if the data is important enough
for these kinds of questions you can take the burden of setting it up.

-- 
May the most significant bit of your life be positive.
_______________________________________________
ceph-users mailing list -- ceph-users@ceph.io
To unsubscribe send an email to ceph-users-le...@ceph.io

Reply via email to