 9263c4173f
			
		
	
	
		9263c4173f
		
	
	
	
	
		
			
			Signed-off-by: Hyman Huang <yong.huang@smartx.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
		
			
				
	
	
		
			183 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| ================================
 | |
| LUKS volume with detached header
 | |
| ================================
 | |
| 
 | |
| Introduction
 | |
| ============
 | |
| 
 | |
| This document gives an overview of the design of LUKS volume with detached
 | |
| header and how to use it.
 | |
| 
 | |
| Background
 | |
| ==========
 | |
| 
 | |
| The LUKS format has ability to store the header in a separate volume from
 | |
| the payload. We could extend the LUKS driver in QEMU to support this use
 | |
| case.
 | |
| 
 | |
| Normally a LUKS volume has a layout:
 | |
| 
 | |
| ::
 | |
| 
 | |
|          +-----------------------------------------------+
 | |
|          |         |                |                    |
 | |
|  disk    | header  |  key material  |  disk payload data |
 | |
|          |         |                |                    |
 | |
|          +-----------------------------------------------+
 | |
| 
 | |
| With a detached LUKS header, you need 2 disks so getting:
 | |
| 
 | |
| ::
 | |
| 
 | |
|          +--------------------------+
 | |
|  disk1   |   header  | key material |
 | |
|          +--------------------------+
 | |
|          +---------------------+
 | |
|  disk2   |  disk payload data  |
 | |
|          +---------------------+
 | |
| 
 | |
| There are a variety of benefits to doing this:
 | |
| 
 | |
|  * Secrecy - the disk2 cannot be identified as containing LUKS
 | |
|              volume since there's no header
 | |
|  * Control - if access to the disk1 is restricted, then even
 | |
|              if someone has access to disk2 they can't unlock
 | |
|              it. Might be useful if you have disks on NFS but
 | |
|              want to restrict which host can launch a VM
 | |
|              instance from it, by dynamically providing access
 | |
|              to the header to a designated host
 | |
|  * Flexibility - your application data volume may be a given
 | |
|                  size and it is inconvenient to resize it to
 | |
|                  add encryption.You can store the LUKS header
 | |
|                  separately and use the existing storage
 | |
|                  volume for payload
 | |
|  * Recovery - corruption of a bit in the header may make the
 | |
|               entire payload inaccessible. It might be
 | |
|               convenient to take backups of the header. If
 | |
|               your primary disk header becomes corrupt, you
 | |
|               can unlock the data still by pointing to the
 | |
|               backup detached header
 | |
| 
 | |
| Architecture
 | |
| ============
 | |
| 
 | |
| Take the qcow2 encryption, for example. The architecture of the
 | |
| LUKS volume with detached header is shown in the diagram below.
 | |
| 
 | |
| There are two children of the root node: a file and a header.
 | |
| Data from the disk payload is stored in the file node. The
 | |
| LUKS header and key material are located in the header node,
 | |
| as previously mentioned.
 | |
| 
 | |
| ::
 | |
| 
 | |
|                        +-----------------------------+
 | |
|   Root node            |          foo[luks]          |
 | |
|                        +-----------------------------+
 | |
|                           |                       |
 | |
|                      file |                header |
 | |
|                           |                       |
 | |
|                +---------------------+    +------------------+
 | |
|   Child node   |payload-format[qcow2]|    |header-format[raw]|
 | |
|                +---------------------+    +------------------+
 | |
|                           |                       |
 | |
|                      file |                 file  |
 | |
|                           |                       |
 | |
|                +----------------------+  +---------------------+
 | |
|   Child node   |payload-protocol[file]|  |header-protocol[file]|
 | |
|                +----------------------+  +---------------------+
 | |
|                           |                       |
 | |
|                           |                       |
 | |
|                           |                       |
 | |
|                      Host storage            Host storage
 | |
| 
 | |
| Usage
 | |
| =====
 | |
| 
 | |
| Create a LUKS disk with a detached header using qemu-img
 | |
| --------------------------------------------------------
 | |
| 
 | |
| Shell commandline::
 | |
| 
 | |
|   # qemu-img create --object secret,id=sec0,data=abc123 -f luks \
 | |
|     -o cipher-alg=aes-256,cipher-mode=xts -o key-secret=sec0 \
 | |
|     -o detached-header=true test-header.img
 | |
|   # qemu-img create -f qcow2 test-payload.qcow2 200G
 | |
|   # qemu-img info 'json:{"driver":"luks","file":{"filename": \
 | |
|     "test-payload.img"},"header":{"filename":"test-header.img"}}'
 | |
| 
 | |
| Set up a VM's LUKS volume with a detached header
 | |
| ------------------------------------------------
 | |
| 
 | |
| Qemu commandline::
 | |
| 
 | |
|   # qemu-system-x86_64 ... \
 | |
|     -object '{"qom-type":"secret","id":"libvirt-3-format-secret", \
 | |
|     "data":"abc123"}' \
 | |
|     -blockdev '{"driver":"file","filename":"/path/to/test-header.img", \
 | |
|     "node-name":"libvirt-1-storage"}' \
 | |
|     -blockdev '{"node-name":"libvirt-1-format","read-only":false, \
 | |
|     "driver":"raw","file":"libvirt-1-storage"}' \
 | |
|     -blockdev '{"driver":"file","filename":"/path/to/test-payload.qcow2", \
 | |
|     "node-name":"libvirt-2-storage"}' \
 | |
|     -blockdev '{"node-name":"libvirt-2-format","read-only":false, \
 | |
|     "driver":"qcow2","file":"libvirt-2-storage"}' \
 | |
|     -blockdev '{"node-name":"libvirt-3-format","driver":"luks", \
 | |
|     "file":"libvirt-2-format","header":"libvirt-1-format","key-secret": \
 | |
|     "libvirt-3-format-secret"}' \
 | |
|     -device '{"driver":"virtio-blk-pci","bus":XXX,"addr":YYY,"drive": \
 | |
|     "libvirt-3-format","id":"virtio-disk1"}'
 | |
| 
 | |
| Add LUKS volume to a VM with a detached header
 | |
| ----------------------------------------------
 | |
| 
 | |
| 1. object-add the secret for decrypting the cipher stored in
 | |
|    LUKS header above::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"object-add", \
 | |
|       "arguments":{"qom-type":"secret", "id": \
 | |
|       "libvirt-4-format-secret", "data":"abc123"}}'
 | |
| 
 | |
| 2. block-add the protocol node for LUKS header::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \
 | |
|       "arguments":{"node-name":"libvirt-1-storage", "driver":"file", \
 | |
|       "filename": "/path/to/test-header.img" }}'
 | |
| 
 | |
| 3. block-add the raw-drived node for LUKS header::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \
 | |
|       "arguments":{"node-name":"libvirt-1-format", "driver":"raw", \
 | |
|       "file":"libvirt-1-storage"}}'
 | |
| 
 | |
| 4. block-add the protocol node for disk payload image::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \
 | |
|       "arguments":{"node-name":"libvirt-2-storage", "driver":"file", \
 | |
|       "filename":"/path/to/test-payload.qcow2"}}'
 | |
| 
 | |
| 5. block-add the qcow2-drived format node for disk payload data::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \
 | |
|       "arguments":{"node-name":"libvirt-2-format", "driver":"qcow2", \
 | |
|       "file":"libvirt-2-storage"}}'
 | |
| 
 | |
| 6. block-add the luks-drived format node to link the qcow2 disk
 | |
|    with the LUKS header by specifying the field "header"::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \
 | |
|       "arguments":{"node-name":"libvirt-3-format", "driver":"luks", \
 | |
|       "file":"libvirt-2-format", "header":"libvirt-1-format", \
 | |
|       "key-secret":"libvirt-2-format-secret"}}'
 | |
| 
 | |
| 7. hot-plug the virtio-blk device finally::
 | |
| 
 | |
|     # virsh qemu-monitor-command vm '{"execute":"device_add", \
 | |
|       "arguments": {"driver":"virtio-blk-pci", \
 | |
|       "drive": "libvirt-3-format", "id":"virtio-disk2"}}
 | |
| 
 | |
| TODO
 | |
| ====
 | |
| 
 | |
| 1. Support the shared detached LUKS header within the VM.
 |