Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-3289

IU Shared Secret Key authentication and encryption

Details

    • New Feature
    • Resolution: Fixed
    • Minor
    • Lustre 2.9.0
    • None
    • 8147

    Description

      Tracking bug for Indiana University's Shared Secret Key authentication and encryption security feature.

      Attachments

        Issue Links

          Activity

            [LU-3289] IU Shared Secret Key authentication and encryption

            Oleg Drokin (oleg.drokin@intel.com) merged in patch http://review.whamcloud.com/22626/
            Subject: LU-3289 gss: Change the handling of keys for SK
            Project: fs/lustre-release
            Branch: master
            Current Patch Set:
            Commit: 7b596ad0b36ec5f0281be368b67b7e624457de18

            gerrit Gerrit Updater added a comment - Oleg Drokin (oleg.drokin@intel.com) merged in patch http://review.whamcloud.com/22626/ Subject: LU-3289 gss: Change the handling of keys for SK Project: fs/lustre-release Branch: master Current Patch Set: Commit: 7b596ad0b36ec5f0281be368b67b7e624457de18

            Oleg Drokin (oleg.drokin@intel.com) merged in patch http://review.whamcloud.com/22806/
            Subject: LU-3289 gss: don't build SSK if libssl-1.0+ not available
            Project: fs/lustre-release
            Branch: master
            Current Patch Set:
            Commit: bbee5d1ae941a208d7a07d0348e835ab58ca90ce

            gerrit Gerrit Updater added a comment - Oleg Drokin (oleg.drokin@intel.com) merged in patch http://review.whamcloud.com/22806/ Subject: LU-3289 gss: don't build SSK if libssl-1.0+ not available Project: fs/lustre-release Branch: master Current Patch Set: Commit: bbee5d1ae941a208d7a07d0348e835ab58ca90ce

            Andreas Dilger (andreas.dilger@intel.com) uploaded a new patch: http://review.whamcloud.com/22806
            Subject: LU-3289 gss: don't build SSK if libssl-1.0+ not available
            Project: fs/lustre-release
            Branch: master
            Current Patch Set: 1
            Commit: 3d750b41a6892e5b19f3bab4de75ca4dd0b6c033

            gerrit Gerrit Updater added a comment - Andreas Dilger (andreas.dilger@intel.com) uploaded a new patch: http://review.whamcloud.com/22806 Subject: LU-3289 gss: don't build SSK if libssl-1.0+ not available Project: fs/lustre-release Branch: master Current Patch Set: 1 Commit: 3d750b41a6892e5b19f3bab4de75ca4dd0b6c033

            Jeremy Filizetti (jeremy.filizetti@gmail.com) uploaded a new patch: http://review.whamcloud.com/22801
            Subject: LU-3289 gss: Add autoconf check to prevent GSS with SLES11
            Project: fs/lustre-release
            Branch: master
            Current Patch Set: 1
            Commit: 2807d42f2dcead6092d4ffc58c1aaf9631e41253

            gerrit Gerrit Updater added a comment - Jeremy Filizetti (jeremy.filizetti@gmail.com) uploaded a new patch: http://review.whamcloud.com/22801 Subject: LU-3289 gss: Add autoconf check to prevent GSS with SLES11 Project: fs/lustre-release Branch: master Current Patch Set: 1 Commit: 2807d42f2dcead6092d4ffc58c1aaf9631e41253

            Jeremy Filizetti (jeremy.filizetti@gmail.com) uploaded a new patch: http://review.whamcloud.com/22626
            Subject: LU-3289 gss: Change the handling of keys for SK
            Project: fs/lustre-release
            Branch: master
            Current Patch Set: 1
            Commit: 8ae0caabad096181b21ba7d7013662f928327738

            gerrit Gerrit Updater added a comment - Jeremy Filizetti (jeremy.filizetti@gmail.com) uploaded a new patch: http://review.whamcloud.com/22626 Subject: LU-3289 gss: Change the handling of keys for SK Project: fs/lustre-release Branch: master Current Patch Set: 1 Commit: 8ae0caabad096181b21ba7d7013662f928327738

            I created ticket LU-8602 for the crypto API changes in 4.6+ kernels.

            simmonsja James A Simmons added a comment - I created ticket LU-8602 for the crypto API changes in 4.6+ kernels.
            pjones Peter Jones added a comment -

            It really sounds to me like sometihng to spin out into a separate ticket

            pjones Peter Jones added a comment - It really sounds to me like sometihng to spin out into a separate ticket

            I just noticed that this ticket is closed, since the SSK code is landed for 2.9.0.

            James, can you please file a separate ticket for the crypto API changes for 4.6 so that this can be tracked separately.

            adilger Andreas Dilger added a comment - I just noticed that this ticket is closed, since the SSK code is landed for 2.9.0. James, can you please file a separate ticket for the crypto API changes for 4.6 so that this can be tracked separately.

            Since this affects the network protocol compatibility, I don't think we should allow arbitrary crypto algorithms for SSK. I argued in the past that we shouldn't even allow old algorithms like 3DES for Kerberos, but this might be needed for backward compatibility. For SSK the current plan is to allow only AES with varying key sizes. We'll need more input from Jeremy before this moves forward.

            adilger Andreas Dilger added a comment - Since this affects the network protocol compatibility, I don't think we should allow arbitrary crypto algorithms for SSK. I argued in the past that we shouldn't even allow old algorithms like 3DES for Kerberos, but this might be needed for backward compatibility. For SSK the current plan is to allow only AES with varying key sizes. We'll need more input from Jeremy before this moves forward.

            I can do the work The question is what approach should be done? Do I use the libcfs crypto API's or the kernel internal APIs. Their are pros and cons to both approaches. The main difference being that libcfs crypto is limited to the number of algo's it supports and the digest size. If I remembering right libcfs crypto API's limits the digest to 64 bytes whereas the kernel's api can support up to 2K if I remember right.

            simmonsja James A Simmons added a comment - I can do the work The question is what approach should be done? Do I use the libcfs crypto API's or the kernel internal APIs. Their are pros and cons to both approaches. The main difference being that libcfs crypto is limited to the number of algo's it supports and the digest size. If I remembering right libcfs crypto API's limits the digest to 64 bytes whereas the kernel's api can support up to 2K if I remember right.

            The scope of Lustre 2.9 does not include support for such new kernels; we will defer any work for supporting 4.6 until Lustre 2.10.

            nrutman Nathan Rutman added a comment - The scope of Lustre 2.9 does not include support for such new kernels; we will defer any work for supporting 4.6 until Lustre 2.10.

            People

              jfilizetti Jeremy Filizetti
              adilger Andreas Dilger
              Votes:
              0 Vote for this issue
              Watchers:
              19 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: