2017-02-15 23:47:32 +00:00
|
|
|
==========
|
|
|
|
Encryption
|
|
|
|
==========
|
|
|
|
|
|
|
|
.. versionadded:: Luminous
|
|
|
|
|
|
|
|
The Ceph Object Gateway supports server-side encryption of uploaded objects,
|
|
|
|
with 3 options for the management of encryption keys. Server-side encryption
|
|
|
|
means that the data is sent over HTTP in its unencrypted form, and the Ceph
|
|
|
|
Object Gateway stores that data in the Ceph Storage Cluster in encrypted form.
|
|
|
|
|
2018-10-22 15:04:55 +00:00
|
|
|
.. note:: Requests for server-side encryption must be sent over a secure HTTPS
|
|
|
|
connection to avoid sending secrets in plaintext. If a proxy is used
|
|
|
|
for SSL termination, ``rgw trust forwarded https`` must be enabled
|
|
|
|
before forwarded requests will be trusted as secure.
|
|
|
|
|
2019-10-14 10:39:45 +00:00
|
|
|
.. note:: Server-side encryption keys must be 256-bit long and base64 encoded.
|
|
|
|
|
2017-02-15 23:47:32 +00:00
|
|
|
Customer-Provided Keys
|
|
|
|
======================
|
|
|
|
|
|
|
|
In this mode, the client passes an encryption key along with each request to
|
|
|
|
read or write encrypted data. It is the client's responsibility to manage those
|
|
|
|
keys and remember which key was used to encrypt each object.
|
|
|
|
|
|
|
|
This is implemented in S3 according to the `Amazon SSE-C`_ specification.
|
|
|
|
|
2022-01-13 23:05:06 +00:00
|
|
|
As all key management is handled by the client, no special Ceph configuration
|
|
|
|
is needed to support this encryption mode.
|
2017-02-15 23:47:32 +00:00
|
|
|
|
|
|
|
Key Management Service
|
|
|
|
======================
|
|
|
|
|
2022-01-13 23:05:06 +00:00
|
|
|
In this mode, an administrator stores keys in a secure key management service.
|
|
|
|
These keys are then
|
2017-05-19 01:34:48 +00:00
|
|
|
retrieved on demand by the Ceph Object Gateway to serve requests to encrypt
|
2017-02-15 23:47:32 +00:00
|
|
|
or decrypt data.
|
|
|
|
|
|
|
|
This is implemented in S3 according to the `Amazon SSE-KMS`_ specification.
|
|
|
|
|
2021-02-03 19:26:46 +00:00
|
|
|
In principle, any key management service could be used here. Currently
|
|
|
|
integration with `Barbican`_, `Vault`_, and `KMIP`_ are implemented.
|
2017-02-15 23:47:32 +00:00
|
|
|
|
2021-02-03 19:26:46 +00:00
|
|
|
See `OpenStack Barbican Integration`_, `HashiCorp Vault Integration`_,
|
|
|
|
and `KMIP Integration`_.
|
2017-02-15 23:47:32 +00:00
|
|
|
|
2022-01-13 23:05:06 +00:00
|
|
|
SSE-S3
|
|
|
|
======
|
|
|
|
|
|
|
|
This makes key management invisible to the user. They are still stored
|
2022-08-21 13:29:41 +00:00
|
|
|
in Vault, but they are automatically created and deleted by Ceph and
|
2022-01-13 23:05:06 +00:00
|
|
|
retrieved as required to serve requests to encrypt
|
|
|
|
or decrypt data.
|
|
|
|
|
|
|
|
This is implemented in S3 according to the `Amazon SSE-S3`_ specification.
|
|
|
|
|
|
|
|
In principle, any key management service could be used here. Currently
|
|
|
|
only integration with `Vault`_, is implemented.
|
|
|
|
|
|
|
|
See `HashiCorp Vault Integration`_.
|
|
|
|
|
2021-07-19 07:18:14 +00:00
|
|
|
Bucket Encryption APIs
|
|
|
|
======================
|
|
|
|
|
|
|
|
Bucket Encryption APIs to support server-side encryption with Amazon
|
|
|
|
S3-managed keys (SSE-S3) or AWS KMS customer master keys (SSE-KMS).
|
|
|
|
|
|
|
|
See `PutBucketEncryption`_, `GetBucketEncryption`_, `DeleteBucketEncryption`_
|
|
|
|
|
2017-02-15 23:47:32 +00:00
|
|
|
Automatic Encryption (for testing only)
|
|
|
|
=======================================
|
|
|
|
|
|
|
|
A ``rgw crypt default encryption key`` can be set in ceph.conf to force the
|
|
|
|
encryption of all objects that do not otherwise specify an encryption mode.
|
|
|
|
|
|
|
|
The configuration expects a base64-encoded 256 bit key. For example::
|
|
|
|
|
|
|
|
rgw crypt default encryption key = 4YSmvJtBv0aZ7geVgAsdpRnLBEwWSWlMIGnRS8a9TSA=
|
|
|
|
|
|
|
|
.. important:: This mode is for diagnostic purposes only! The ceph configuration
|
|
|
|
file is not a secure method for storing encryption keys. Keys that are
|
|
|
|
accidentally exposed in this way should be considered compromised.
|
|
|
|
|
|
|
|
|
|
|
|
.. _Amazon SSE-C: https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerSideEncryptionCustomerKeys.html
|
|
|
|
.. _Amazon SSE-KMS: http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html
|
2022-01-13 23:05:06 +00:00
|
|
|
.. _Amazon SSE-S3: https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingServerSideEncryption.html
|
2017-02-15 23:47:32 +00:00
|
|
|
.. _Barbican: https://wiki.openstack.org/wiki/Barbican
|
2019-08-15 14:09:08 +00:00
|
|
|
.. _Vault: https://www.vaultproject.io/docs/
|
2021-02-03 19:26:46 +00:00
|
|
|
.. _KMIP: http://www.oasis-open.org/committees/kmip/
|
2021-07-19 07:18:14 +00:00
|
|
|
.. _PutBucketEncryption: https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
|
|
|
|
.. _GetBucketEncryption: https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketEncryption.html
|
|
|
|
.. _DeleteBucketEncryption: https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucketEncryption.html
|
2017-02-15 23:47:32 +00:00
|
|
|
.. _OpenStack Barbican Integration: ../barbican
|
2019-08-15 14:09:08 +00:00
|
|
|
.. _HashiCorp Vault Integration: ../vault
|
2021-02-03 19:26:46 +00:00
|
|
|
.. _KMIP Integration: ../kmip
|