[openstack-dev] [barbican] Key Manager Update

Bhandaru, Malini K malini.k.bhandaru at intel.com
Fri Apr 26 20:43:01 UTC 2013


Hello Everyone!

Just wanted to let you know that the key manager folks are busy ..

Our postings to the mailing list will have the subject prefix: [openstack-dev] [barbican]
Freenode IRC hangout:  '#openstack-cloudkeep'
Wiki https://github.com/cloudkeep/barbican/wiki/_pages


Early developers and adoptors:
John Wood john.wood at RACKSPACE.COM<mailto:john.wood at RACKSPACE.COM>
Douglas Mendizabal <douglas.mendizabal at RACKSPACE.COM<mailto:douglas.mendizabal at RACKSPACE.COM>>;
Andrew Hartnett andrew.hartnett at RACKSPACE.COM<mailto:andrew.hartnett at RACKSPACE.COM>
Jarret Raim jarret.raim at RACKSPACE.COM<mailto:jarret.raim at RACKSPACE.COM>;
Malini Bhandaru malini.k.bhandaru at intel.com<mailto:malini.k.bhandaru at intel.com>
Reller, Nathan S. <Nathan.Reller at jhuapl.edu<mailto:Nathan.Reller at jhuapl.edu>>;
Coffman, Joel M. <Joel.Coffman at jhuapl.edu<mailto:Joel.Coffman at jhuapl.edu>>;
Glendenning, Laura J. <Laura.Glendenning at jhuapl.edu<mailto:Laura.Glendenning at jhuapl.edu>>;
Nate Reller (rellerreller at yahoo.com<mailto:rellerreller at yahoo.com>);
Benjamin, Bruce P. <Bruce.Benjamin at jhuapl.edu<mailto:Bruce.Benjamin at jhuapl.edu>>

Meeting minutes from today, April 26, 2013
.

1)      Acknowledged: team has a common goal of getting volume encryption and key manager into Havana.

  Volume encryption needs key management

  Key manager needs a user and demonstrate integration

2)      Goal: July 18, 2013 incubation target for Havana. Need a stable, minimally functional, integrated implementation.

3)      API:  create_key (optional args: type, length)
                           Returns key-id, and key-string
                           First cut: symmetric key

                           (Stub API implementation could return the exact same string for all key-ids)
               Get_key (key-id), returns key-string
                Delete_key

4)      Client for key manager   -- ala python-barbican_client

  Data formats json and xml.

  Initial json

5)      Defer tackling split-keys, user holding a part, or user part domain/project/etc specific in keystone or ..

6)      Flesh out concept of key-access.  We could separate owner and delegated-access aspects.

  A key could have delegated-access = {Nova-compute, swift, cinder ..} etc  typically openstack services

                             Scope-access = domain/project(s)/user

Through keystone delegation, limit access time to keys and which keys

7)     Meta data:

Cinder will hold meta data with volume regarding key-id, algorithm etc

Current thinking how key is used and where, can be key agnostic (will revisit later if necessary based on use case convulsions, JHU_APL at this point fine with this.)

8)   First cut: supporting above API. How the encryption, random keys etc generate, all internal. An HSM, a KMIP implementation whatever.

9)    First cut, users can pull functionality from git and have their own service instance, ala devstack one-all-in-box model or other.  Will speed integration effort.

10)   TODO - move code into sourceforge to take advantage of the code review, build and other tools

11)   Questions:

a)      What auth tokens that come along with a request - user only? Delegated-user?  (learn more from OpenStack and Keystone folks)

b)      Token expiration- what happens if primary user token is 24 hrs. long and a volume request comes in the last minute and falls on the edge of expiration during the process

c)      JHU-APL to discuss and learn more about KMIP requirements from their sponsor.

d)      Later on - for an open key management system might want to request some port number like keystone with IANA

e)      Maintaining re-key history

  Event logs would contain it but elsewhere?  if yes, what ..

f)       Is there any OpenStack requirement that a product needs to support Python 2.6 too. Most of the projects seem to mention Python 2.6.

g)      Should keys maintain a URI to the object they wrap - from a security point may be not, some opacity is nice!!

Adds a layer of work in that if a resource moves, we need some other middleware to transparently take care of the mapping. First cut - not supporting.

h)      Volumes --  At point of attach, through horizon UI specify encryption yes/no, algorithm etc. May  be later this could be part of user preference.





Regards

John, Jarret & Malini






-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20130426/a880aee5/attachment.html>


More information about the OpenStack-dev mailing list