<div dir="ltr"><br><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, Sep 3, 2013 at 4:38 PM, Coffman, Joel M. <span dir="ltr"><<a href="mailto:Joel.Coffman@jhuapl.edu" target="_blank">Joel.Coffman@jhuapl.edu</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal">We have fully implemented support for <a href="https://blueprints.launchpad.net/nova/+spec/encrypt-cinder-volumes" target="_blank">transparently encrypting Cinder volumes</a> from within Nova (see <a href="https://review.openstack.org/#/c/30976/" target="_blank">https://review.openstack.org/#/c/30976/</a>), but the lack of a secure key manager within OpenStack currently precludes us from integrating our work with that piece of the overall architecture. Instead, a key manager interface (see <a href="https://review.openstack.org/#/c/30973/" target="_blank">https://review.openstack.org/#/c/30973/</a>) abstracts this interaction. We would appreciate the consideration of the Nova core team regarding merging our existing work because 1) there is nothing immediately available with which to integrate; 2) services such as <a href="https://launchpad.net/cloudkeep/+announcements" target="_blank">Barbican</a> are on the path to incubation and alternative key management schemes (e.g., <a href="https://blueprints.launchpad.net/nova/+spec/kmip-client-for-volume-encryption" target="_blank">KMIP Client for volume encryption key management</a>) have also been proposed; 3) we avoid the hassle of rebasing until the aforementioned services become available; and 4) our code does not directly depend upon a particular key manager but upon the aforementioned interface, which should be simple for key managers to implement. Furthermore, the current dearth of key management within OpenStack does not preclude the use of our existing work within a production environment; although the security is diminished, our implementation provides protection against certain attacks like intercepting the iSCSI communication between the compute and storage host.<u></u><u></u></p>
<p class="MsoNormal"><u></u> </p></div></div></blockquote><div><br></div><div>How can someone use your code without a key manager?</div><div> </div><div><br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal"><u></u></p><p class="MsoNormal">Feedback regarding the possibility of merging our work would be appreciated.<span class="HOEnZb"><font color="#888888"><u></u><u></u></font></span></p>
<span class="HOEnZb"><font color="#888888"><p class="MsoNormal"><u></u> <u></u></p><p class="MsoNormal">Joel<u></u><u></u></p></font></span></div></div><br>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div><br></div></div>