Hello, Malini<div><br></div><div>Sorry for long delay, please see some answers inline. Thanks for your interest and insightful questions and links!</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Dec 7, 2012 at 4:43 AM, Bhandaru, Malini K <span dir="ltr"><<a href="mailto:malini.k.bhandaru@intel.com" target="_blank">malini.k.bhandaru@intel.com</a>></span> wrote:<br>



<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">





<div lang="EN-US" link="blue" vlink="purple">
<div>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Glad to hear from you Oleg!
<u></u><u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Intel is interested in building encryption support for object storage.<u></u><u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Our initial exploration resulted in catching the Mirantis blog!  Establishes it is an important feature and the time is right.<u></u><u></u></span></p>




<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>1)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Would the Mirantis prototype be open source? Looking forward to its debut.</span></p></div></div>
</blockquote><div>Yes, currently we're preparing the code and design description for publishing. Please, follow our blog for updates later this week.</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">


<div lang="EN-US" link="blue" vlink="purple"><div><p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u><u></u></span></p>

<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Intel’s special interest – achieving encryption speed up using the AES_NI Intel  hardware instructions for encryption speed and<u></u><u></u></span></p>




<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">                                            its open source libraries fast encryption that exploits parallelism and function stitching,
 and HW register width increases. <u></u><u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><a href="http://www.intel.com/content/www/us/en/communications/communications-ia-multi-buffer-paper.html" target="_blank">http://www.intel.com/content/www/us/en/communications/communications-ia-multi-buffer-paper.html</a><u></u><u></u></span></p>




<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><a href="http://www.intel.com/content/www/us/en/communications/communications-ia-cryptographic-paper.html" target="_blank">http://www.intel.com/content/www/us/en/communications/communications-ia-cryptographic-paper.html</a><u></u><u></u></span></p>




<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>2)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">More specifically – what algorithm will you be using for encryption? Will it be user configurable?<u></u><u></u></span></p>




<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">The data in motion AES approaches to encryption typically use an initial vector (random for the session) and the key<u></u><u></u></span></p>




<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">And anything that has chaining will result in large changes in the byte stream for a small change in the plain text object, which<u></u><u></u></span></p>




<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">would result in more network traffic to move the object using rsync. Or are you dismissing the initial vector, and keeping chaining
 or dismissing it too.<u></u><u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Or are you using a data at rest encryption method?  The Intel library of XTS encryption is in use by True Crypt which offers storage
 encryption.<u></u><u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">       
<a href="http://download.intel.com/design/intarch/PAPERS/324310.pdf" target="_blank">http</a><a href="http://download.intel.com/design/intarch/PAPERS/324310.pdf" target="_blank">://</a><a href="http://download.intel.com/design/intarch/PAPERS/324310.pdf" target="_blank">download.intel.com/design/intarch/PAPERS/324310.pdf</a></span></p>


</div></div></blockquote><div><br></div><div>We're focusing on data-at-rest encryption right now, and we're using AES-128-CBC algorithm as a primary method. Thanks for the links, we'll look how to integrate those libs in our work.</div>


<div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple">

<div><p class="" style="margin-left:0.25in"></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>3)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Do you see any use cases not covered? Would like to collaborate.<u></u><u></u></span></p>
<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>4)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">To provide an additional layer of protection, along with the key mentioned in the Mirantis article, a secondary random-key could be used with each
 object, possibly XOR-ed with the account or container key, to encrypt objects. Thus should result in key-loss/compromise not exposing the data unless the Key Manager is also compromised and these secondary keys get exposed.</span></p>

</div></div></blockquote><div>We're planning on storing IV/salt/secondary key in the container DB for each object. This will help increase overall security of the solution, but will require modification of container-server.</div>

<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u><u></u></span></p>




<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>5)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Am sure you have thought of this .. but the key manager itself could use the encrypted storage system to back up its vital data.</span></p>

</div></div></blockquote><div>This is an interesting idea, but it generally affects the key storage part of the architecture, which is basically out of scope of our prototype.</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">

<div lang="EN-US" link="blue" vlink="purple"><div><p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u><u></u></span></p>


<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>6)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">From your design looks like the key manager is  a separate service from the authentication system (Keystone or other).  Was this to partition functionality
 and increase availability?</span></p></div></div></blockquote><div>Key manager is a middleware in Swift that talks to the key storage system. We implemented it as driver-based, which means we can easily integrate with any key store, including one integrated into auth system. We want to separate the key-manager from any particular auth system supported by Swift to be able to work with all of them.</div>

<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u><u></u></span></p>


<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>7)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">We believe the encryption component with key management could be used in other places within Open Stack, for example booting from encrypted boot volume.</span></p>

</div></div></blockquote><div>This is also very interesting idea. It will probably require modifications to the current prototype implementation of key manager, of course. </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">

<div lang="EN-US" link="blue" vlink="purple"><div><p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u><u></u></span></p>


<p><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><span>8)<span style="font-style:normal;font-variant:normal;font-weight:normal;font-size:7pt;line-height:normal;font-family:'Times New Roman'">     
</span></span></span><u></u><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Also believe the Keystone enhancements under discussion– “Trust”/delegation
<a href="http://wiki.openstack.org/keystone/Delegation" target="_blank">http://wiki.openstack.org/keystone/Delegation</a><u></u><u></u></span></p>
<p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">would be useful for handing off access to encrypted objects, say for a one time  use, or limited period (use case: pay-per-view video) to an application
 that would stream the media content.<u></u><u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Regards<u></u><u></u></span></p>
<p class=""><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">Malini<u></u><u></u></span></p>
<p><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class="" style="margin-left:0.25in"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></p>
<p class=""><b><span style="font-size:10pt;font-family:Tahoma,sans-serif">From:</span></b><span style="font-size:10pt;font-family:Tahoma,sans-serif"> Oleg Gelbukh [mailto:<a href="mailto:ogelbukh@mirantis.com" target="_blank">ogelbukh@mirantis.com</a>]
<br>
<b>Sent:</b> Thursday, December 06, 2012 2:20 AM<br>
<b>To:</b> OpenStack Development Mailing List<br>
<b>Subject:</b> Re: [openstack-dev] Encrypted Objects in Swift<u></u><u></u></span></p><div><div>
<p class=""><u></u> <u></u></p>
<p class="">Hello,<u></u><u></u></p>
<div>
<p class=""><u></u> <u></u></p>
</div>
<div>
<p class="">Yes, we have the prototype implementation of this feature waiting for publication. I believe we'll be able to publish it in a week or so.<u></u><u></u></p>
</div>
<div>
<p class=""><u></u> <u></u></p>
</div>
<div>
<p class="">Do you have some specific interest in this development? We greatly appreciate any feedback, including questions and example use cases.<u></u><u></u></p>
</div>
<div>
<p class=""><u></u> <u></u></p>
</div>
<div>
<p class="">--<u></u><u></u></p>
</div>
<div>
<p class="">Best regards,<u></u><u></u></p>
</div>
<div>
<p class="">Oleg Gelbukh<u></u><u></u></p>
</div>
<div>
<p class="">Sr. IT engineer<u></u><u></u></p>
</div>
<div>
<p class="">Mirantis Inc.<u></u><u></u></p>
</div>
<div>
<p class="" style="margin-bottom:12pt"><u></u> <u></u></p>
<div>
<p class="">On Thu, Dec 6, 2012 at 7:07 AM, Bhandaru, Malini K <<a href="mailto:malini.k.bhandaru@intel.com" target="_blank">malini.k.bhandaru@intel.com</a>> wrote:<u></u><u></u></p>
<div>
<div>
<p class="">Hello All!<u></u><u></u></p>
<p class=""> <u></u><u></u></p>
<p class="">Is there development effort associated with
<a href="http://www.mirantis.com/blog/openstack-swift-encryption-architecture/" target="_blank">
http://www.mirantis.com/blog/openstack-swift-encryption-architecture/</a><u></u><u></u></p>
<p class="">in OpenStack?<u></u><u></u></p>
<p class=""> <u></u><u></u></p>
<p class="">Regards<u></u><u></u></p>
<p class=""><span style="color:rgb(136,136,136)">Malini<u></u><u></u></span></p>
</div>
</div>
<p class="" style="margin-bottom:12pt"><br>
_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org" target="_blank">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><u></u><u></u></p>
</div>
<p class=""><u></u> <u></u></p>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org" target="_blank">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div><br></div><div class="gmail_extra"><div>--</div><div>Best regards,</div><div>Oleg Gelbukh</div><div>Sr. IT Engineer</div><div>Mirantis Inc.</div></div>