[openstack-dev] [keystone][nova] New blueprint related to message security

Simo Sorce simo at redhat.com
Wed May 8 17:08:53 UTC 2013


On Wed, 2013-05-08 at 15:55 +0000, Jarret Raim wrote:
> On 5/7/13 3:31 PM, "Simo Sorce" <simo at redhat.com> wrote:
> 
> 
> >New blueprint:
> >https://blueprints.launchpad.net/keystone/+spec/key-distribution-server
> >
> >This is the server part needed to implement Message Security for Havana.
> 
> I agree that Keystone should own the assignment of keys to accounts for
> use in authentication and the /kds endpoint seems fine to me, but I would
> suggest that instead of keystone returning the keying material directly,
> it just return a URI to the barbican API.

> When we talked about key management at the design summit, it seemed like
> Keystone didn't want to take on a lot of the secure storage (common
> criteria, fips) stuff or the logging & auditing requirements for a key
> management solution. If Keystone uses Barbican as its backend store for
> keys (while still owning the lifecycle of those keys and the mapping of
> those to services) that seems to make the most sense?
> 
> 
> 
> Thoughts?

We already have too many moving parts in this project, and bouncing one
request to another server just adds latency (keys are sourced at the
time you need to send a message) and I do not see what is the benefit of
splitting storage this way.
Currently the only thing I store is a key, and the KDS does key
derivation and returns a ticket containing a session key. It's all it
does.
As a second step it will also start doing some simple ACL to handle
temporary group keys. But those keys are created on the spot and need no
long term storage.

I rather keep the hole thing simple and in one place.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York




More information about the OpenStack-dev mailing list