On 12/03/2015 07:40 AM, Duncan Thomas wrote:
On 3 December 2015 at 11:14, Li, Xiaoyan <xiaoyan...@intel.com
<mailto:xiaoyan...@intel.com>> wrote:
Just to clear the data operations cinder needs to touch plaintext
data are:
1) Create volume from glance image
2) Create glance image from volume
3) Retype encrypted volumes. That is to change a volume from
unencrypted to encrypted, or vice visa.
Backup/Restore doesn't need to decrypt data.
Backup / restore doesn't currently decrypt the data. There are some
people commenting that it is not useful for DR work to have a backup
that requires keys from a key service that is itself not backed up, so
there may be some proposal incoming about not encrypting backups, or
else giving them their own key rather than require access to the
original volume key during restore - needing that access also makes
things like re-keying the original volume difficult/impossible.
Again, we have multiple use-cases for encryption, and they are not all
going to be solved by solved by draconian dictates that there shall only
be one way of doing things.
There are other very good reasons for multiple encryption keys for
different purposes. Client side data encryption is known to prevent
server-side compression and deduplication technologies from working at
all, and it makes backups wildly less efficient. The upshot is that if
choose to do implement security by encryption everything in the guest or
hypervisor rather than in the storage controller, you're going to spend
a ton more on disks.
Assuming your threat model involves evil people sniffing network wires,
and pulling disks from machines in the datacenter, rather than assuming
to storage admin himself is evil, you can devise schemes that involve
separate encryption for in-flight data and at-rest data which allow the
storage controller to do compression and deduplication and store your
data in both a secure AND EFFICIENT manner.
The above isn't a future fantasy -- there are storage controllers that
do this TODAY with unmodified cinder and nova. You just need a storage
controller that features full-disk-encryption and also transport level
security (such as blocks over Kerberized NFS) as well as the compression
and deduplication technologies which are quickly becoming standardized.
-Ben
__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev