<div dir="ltr">On Tue, Jul 2, 2013 at 8:12 AM, Bryan D. Payne <span dir="ltr"><<a href="mailto:bdpayne@acm.org" target="_blank">bdpayne@acm.org</a>></span> wrote:<br><div class="gmail_extra"><div class="gmail_quote">
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><br><div class="gmail_extra"><div class="gmail_quote"><div class="im"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
<div>
> I don't understand. Users already have custody of their own keys. The<br>
> only thing that Keystone/Nova has is the public key fingerprint [1], not<br>
> the private key...<br>
<br>
</div>You acatually have the public key, not just the fingerprint, but indeed<br>
I do not see why abrbican should be involved here. apublic key does not<br>
need the same level of protection of a private key or a symmetric<br>
encryption key, so by storing this data in barbican we would only<br>
needlessly expose barbican to more access patternsand more<br>
logging/auditing volume than is needed.<br></blockquote><div><br></div></div><div>I believe you're confusing a couple of points here. In this case, for public keys, what matters is integrity. For the other cases that you mentioned, both integrity and confidentiality matter. I believe that given the high integrity requirements that it *does* make sense to store these in a more protected location.</div>
<div><br></div><div>+1 for using <span style="font-family:arial,sans-serif;font-size:13px">Barbican</span></div><span class="HOEnZb"><font color="#888888"><div><span style="font-family:arial,sans-serif;font-size:13px"><br>
</span></div></font></span></div></div></div></blockquote><div><br></div><div style>This would make Barbican a required service for running Nova. Keystone is already required and it has the necessary functionality.</div>
<div style>
<br></div><div style>- Ryan</div></div></div></div>