openstack havana块存储Cinder磁盘加密方法研究
在openstack havana的release note中有如下介绍“Attached Cinder volumes can now be encrypted. Data is decrypted as needed at read and write time while presenting instances with a normal block storage device”。众所周知,在以前版本的openstack中,块存储创建出volume后,将其挂载给虚拟机,就可以启动虚拟机。但这种实现方式也存在一些安全隐患:若存在不怀好意的系统管理员或者黑客在攻陷nova节点时,就可以从宿主系统中,查看guest os中用户存放的数据。如果用户在其磁盘中存在敏感私人数据时,则存在数据泄密的风险。
关于磁盘加密的BluePrint链接:https://wiki.openstack.org/wiki/VolumeEncryption ,通过分析其实现方式可以发现,cinder中的卷在挂载到HyperVisor主机上时,对其进行加密,再讲加密后的块设备提供给虚拟机使用,最终虚拟机使用的加密后的磁盘。如果此时黑客攻陷主机的话,他看到的将是加密后的volume,如果不知道磁盘的加密密码,他看到将是没有任何意义的一堆数据。
通过分析nova中代码实现,可以发现磁盘加密的实现细节,openstack中的磁盘加密使用了Linux中的一个加密组件:cryptsetup!
def _open_volume(self, passphrase, **kwargs):
"""Opens the LUKS partition on the volume using the specified
passphrase.
:param passphrase: the passphrase used to access the volume
"""
LOG.debug(_("opening encrypted volume %s"), self.dev_path)
# NOTE(joel-coffman): cryptsetup will strip trailing newlines from
# input specified on stdin unless --key-file=- is specified.
cmd = ["cryptsetup", "create", "--key-file=-"]
cipher = kwargs.get("cipher", None)
if cipher is not None:
cmd.extend(["--cipher", cipher])
key_size = kwargs.get("key_size", None)
if key_size is not None:
cmd.extend(["--key-size", key_size])
cmd.extend()
utils.execute(*cmd, process_input=passphrase,
check_exit_code=True, run_as_root=True)
def attach_volume(self, context, **kwargs):
"""Shadows the device and passes an unencrypted version to the
instance.
Transparent disk encryption is achieved by mounting the volume via
dm-crypt and passing the resulting device to the instance. The
instance is unaware of the underlying encryption due to modifying the
original symbolic link to refer to the device mounted by dm-crypt.
"""
key = self._get_key(context).get_encoded()
passphrase = self._get_passphrase(key)
self._open_volume(passphrase, **kwargs)
# modify the original symbolic link to refer to the decrypted device
utils.execute('ln', '--symbolic', '--force',
'/dev/mapper/%s' % self.dev_name, self.symlink_path,
run_as_root=True, check_exit_code=True)
可见,在attach_volume方法的_open_volume中,会调用cryptsetup系统命令对输入的待挂载设备进行加密,再将加密的设备生成挂载给虚拟机的软链接,这样虚拟机在启动时感知不到加密方法的存在,即磁盘加密对虚拟机是透明的。cryptsetup
由于手头没有havana的环境,下面打算根据cinder的实现原理对磁盘加密进行模拟,同时研究其实现:
1、首先使用truncate命令生成一个空洞文件
# truncate --size=10G 10G
#ll /tmp/10G
-rw-r--r--. 1 root root 10737418240 12月3 23:37 /tmp/10G
#
2、将上述空洞文件转化为loop设备
#
# losetup -f /tmp/10G
#
# losetup -a
/dev/loop0: :33006 (/tmp/10G)
#
3、在上述loop设备上创建pv、vg
# pvcreate qixiaozhen /dev/loop0
Device qixiaozhen not found (or ignored by filtering).
Physical volume "/dev/loop0" successfully created
#
# vgcreate qixiaozhen /dev/loop0
Volume group "qixiaozhen" successfully created
#
4、创建用以测试用的lv
# lvcreate -n test001 -L 100M qixiaozhen
Logical volume "test001" created
#
5、使用cryptsetup对上述lv进行加密(注意此处需要用户输入密码)
#
# cryptsetup luksFormat /dev/qixiaozhen/test001
WARNING!
========
This will overwrite data on /dev/qixiaozhen/test001 irrevocably.
Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
#
6、打开加密后的磁盘,生成供虚拟机使用磁盘(需要输入密码)
#
# cryptsetup luksOpen /dev/qixiaozhen/test001 qixiaozhen_device
Enter passphrase for /dev/qixiaozhen/test001:
#
7、在/dev/mapper路径下可以找到上述生成的qixiaozhen_device设备
#
# ll /dev/mapper/qixiaozhen_device
lrwxrwxrwx. 1 root root 7 12月3 23:48 /dev/mapper/qixiaozhen_device -> ../dm-4
#
#
8、分析逻辑卷test001与qixiaozhen_device设备间的关系
#
# dmsetup table
fedora_armstrong-swap: 0 12255232 linear 8:9 2048
fedora_armstrong-root: 0 104857600 linear 8:9 995198976
qixiaozhen-test001: 0 204800 linear 7:0 2048
qixiaozhen_device: 0 200704 crypt aes-cbc-essiv:sha256 0000000000000000000000000000000000000000000000000000000000000000 0 253:3 4096
fedora_armstrong-home: 0 982941696 linear 8:9 12257280
#
可见qixiaozhen_device设备是由test001设备偏移4096个扇区(2MB)而生成。
9、往qixiaozhen_device中写入部分数据,本文中通过格式化成ext4文件系统进行测试
# mkfs.ext4 /dev/mapper/qixiaozhen_device
mke2fs 1.42.5 (29-Jul-2012)
文件系统标签=
OS type: Linux
块大小=1024 (log=0)
分块大小=1024 (log=0)
Stride=0 blocks, Stripe width=0 blocks
25168 inodes, 100352 blocks
5017 blocks (5.00%) reserved for the super user
第一个数据块=1
Maximum filesystem blocks=67371008
13 block groups
8192 blocks per group, 8192 fragments per group
1936 inodes per group
Superblock backups stored on blocks:
8193, 24577, 40961, 57345, 73729
Allocating group tables: 完成
正在写入inode表: 完成
Creating journal (4096 blocks): 完成
Writing superblocks and filesystem accounting information: 完成
#
10、下面分析使用dd命令读取test001偏移2MB和qixiaozhen_device进行比较。
# dd if=/dev/qixiaozhen/test001 bs=1M count=1 iflag=directskip=2 | hexdump -C | less
000000004c a7 db 72 01 e4 18 1ebc 1e b9 bf fa 3b 25 01|L..r.........;%.|
00000010cc 22 46 96 aa b9 e8 2c53 60 7c b3 61 4a 02 33|."F....,S`|.aJ.3|
000000205d 39 4b 4f 6d b9 5a 5716 fb a5 f9 c8 7f 9d 65|]9KOm.ZW.......e|
000000303d 25 38 f5 4b e2 b0 6eef 92 24 bd fc cf 56 07|=%8.K..n..$...V.|
000000404b 5f d9 85 ad f4 01 5ddd a3 94 db 8b 58 0f a0|K_.....].....X..|
0000005003 0f 08 ad 7a 66 a8 3a72 16 47 58 0c ba f9 d0|....zf.:r.GX....|
0000006060 34 b4 ba 69 32 27 8cf8 97 cd 58 86 3e ce 34|`4..i2'....X.>.4|
00000070ae 28 4f e1 c8 a9 90 5c08 f9 30 9f a7 4b 6b 21|.(O....\..0..Kk!|
00000080ba d0 39 45 7a 0d a4 c5a6 c9 a8 40 a2 56 c9 27|..9Ez......@.V.'|
000000909d d4 77 05 77 ae b0 2aeb fa 3a 1d 1b d0 19 9d|..w.w..*..:.....|
000000a0fe c3 d9 1c ca 3c 51 fa84 d7 d8 a8 8d 42 1f e0|.....<Q......B..|
000000b0bd b0 09 84 69 25 6d 709f b6 78 25 87 52 07 70|....i%mp..x%.R.p|
000000c0e1 9c d9 9c 42 2d 1d fb92 fd 9d 62 d3 58 27 79|....B-.....b.X'y|
000000d02c b3 a5 a8 67 7d 3e 5d01 15 3d ac 7e 44 77 67|,...g}>]..=.~Dwg|
000000e08f 4f 71 e9 4e 63 06 4d9a 78 7c 0f 60 4a da 3b|.Oq.Nc.M.x|.`J.;|
000000f00d f2 46 ac c0 c7 44 0c61 dc 6c ef 00 c0 7b 9f|..F...D.a.l...{.|
0000010060 55 94 7f 1f c2 87 1b10 93 c0 78 92 6a 8f bf|`U.........x.j..|
000001106d 08 b1 b7 51 86 6e 8346 26 cb fe 0d 0f c4 72|m...Q.n.F&.....r|
00000120b1 48 88 c5 05 be a9 f18a ac a2 ed f6 73 40 f5|.H...........s@.|
0000013074 51 76 ba f4 db 8c bef8 9d 73 14 e8 7b 8c 0f|tQv.......s..{..|
0000014006 bb 89 f9 e4 2e 81 8e5f c8 f4 a2 70 27 03 a5|........_...p'..|
000001503e 93 80 b1 38 4d ad 129f ca 4c e8 01 5b 26 41|>...8M....L..[&A|
0000016073 f9 3f db 75 c5 d5 d9c7 25 b9 6d 03 4d 39 98|s.?.u....%.m.M9.|
0000017072 7e 5f 10 31 be e9 92fa 5c d5 54 9f 61 65 00|r~_.1....\.T.ae.|
00000180bd e0 4a 8f 8a 84 b4 415d b5 6c 42 f5 d5 ff 7a|..J....A].lB...z|
000001907f 97 c5 dc 73 74 c8 94f7 03 f0 bd 8d 1d 69 9e|....st........i.|
000001a093 c4 52 52 d8 9e 21 6a74 2d 1e d4 29 1e 1e 92|..RR..!jt-..)...|
000001b08a 61 03 9d ed 0c ca c0e5 33 38 49 d3 7e 5f 94|.a.......38I.~_.|
000001c044 f9 ae 5d 5f 9c 5a 5102 20 77 46 9c 46 23 6b|D..]_.ZQ. wF.F#k|
000001d08b 5e 15 28 4f 09 ce 3e36 e8 62 21 e4 08 43 e9|.^.(O..>6.b!..C.|
000001e0b3 53 90 e2 68 fb 28 4dfa 24 e8 7a 3a ce b1 0a|.S..h.(M.$.z:...|
000001f0f8 f1 ae a0 c9 57 82 9d0e 56 6e f8 d9 d5 81 f8|.....W...Vn.....|
000002009d f6 fa 8b d2 f2 bd cfd3 f0 ff e8 52 1f d1 f3|............R...|
00000210c1 aa ed db 78 55 f8 e37c 85 bf ec d2 a3 15 ec|....xU..|.......|
000002208b 6d 04 cf 2d 14 37 1bf4 22 06 5f c1 8d eb df|.m..-.7.."._....|
0000023077 7b b9 f2 36 f7 b2 63ad 23 06 ff 23 a1 b5 dc|w{..6..c.#..#...|
0000024056 67 85 1f a2 f5 59 4ccc a0 c0 97 c1 b1 7e b2|Vg....YL......~.|
00000250e5 7f 6e 3c d2 ee 65 fa52 10 ea b8 fb e0 38 e8|..n<..e.R.....8.|
00000260cf 95 9e 80 72 e4 5b 222b 9f 72 f6 22 2f e1 f7|....r.["+.r."/..|
00000270ec f4 49 cf c3 d2 f4 34de 00 55 17 e9 1c cf 5a|..I....4..U....Z|
0000028019 7f a0 f4 48 14 f5 ee2f 75 76 ca 0e 94 9f 16|....H.../uv.....|
0000029051 aa 80 03 a9 e6 2c 6931 d4 35 d5 d5 b7 e9 58|Q.....,i1.5....X|
000002a0bc a1 f5 8f 56 bc 12 949e d7 d8 cc 7d f7 61 bd|....V.......}.a.|
# dd if=/dev/mapper/qixiaozhen_device bs=1M count=1 iflag=direct | hexdump -C | less
0000000000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
*
0000040050 62 00 00 00 88 01 0099 13 00 00 81 65 01 00|Pb...........e..|
0000041045 62 00 00 01 00 00 0000 00 00 00 00 00 00 00|Eb..............|
0000042000 20 00 00 00 20 00 0090 07 00 00 00 00 00 00|. ... ..........|
000004308c ff 9d 52 00 00 ff ff53 ef 01 00 01 00 00 00|...R....S.......|
000004408c ff 9d 52 00 00 00 0000 00 00 00 01 00 00 00|...R............|
0000045000 00 00 00 0b 00 00 0080 00 00 00 3c 00 00 00|............<...|
0000046042 02 00 00 79 00 00 000e 6c 42 94 c7 e6 4b 18|B...y....lB...K.|
0000047099 55 8d 81 b6 2c 5a 9a00 00 00 00 00 00 00 00|.U...,Z.........|
0000048000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
*
000004c000 00 00 00 00 00 00 0000 00 00 00 00 00 00 01|................|
000004d000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
000004e008 00 00 00 00 00 00 0000 00 00 00 25 2a 68 6f|............%*ho|
000004f014 38 4a d7 b2 35 fb 6220 5c ec 36 01 01 00 00|.8J..5.b \.6....|
000005000c 00 00 00 00 00 00 008c ff 9d 52 0a f3 01 00|...........R....|
0000051004 00 00 00 00 00 00 0000 00 00 00 00 10 00 00|................|
0000052001 c0 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
0000053000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
0000054000 00 00 00 00 00 00 0000 00 00 00 00 00 40 00|..............@.|
0000055000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
0000056001 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
0000057000 00 00 00 04 00 00 005f 11 00 00 00 00 00 00|........_.......|
0000058000 00 00 00 00 00 00 0000 00 00 00 00 00 00 00|................|
*
0000080003 01 00 00 13 01 00 0023 01 00 00 8c 12 85 07|........#.......|
0000081002 00 00 00 00 00 00 0000 00 00 00 85 07 b9 cc|................|
0000082004 01 00 00 14 01 00 0015 02 00 00 fe 1e 90 07|................|
0000083000 00 01 00 00 00 00 0000 00 00 00 90 07 f4 ce|................|
0000084005 01 00 00 15 01 00 0007 03 00 00 00 20 90 07|............. ..|
0000085000 00 03 00 00 00 00 0000 00 00 00 90 07 77 60|..............w`|
0000086006 01 00 00 16 01 00 00f9 03 00 00 fe 1e 90 07|................|
0000087000 00 01 00 00 00 00 0000 00 00 00 90 07 36 89|..............6.|
0000088007 01 00 00 17 01 00 00eb 04 00 00 00 20 90 07|............. ..|
0000089000 00 03 00 00 00 00 0000 00 00 00 90 07 d2 35|...............5|
000008a008 01 00 00 18 01 00 00dd 05 00 00 fe 1e 90 07|................|
000008b000 00 01 00 00 00 00 0000 00 00 00 90 07 e0 b7|................|
000008c009 01 00 00 19 01 00 00cf 06 00 00 00 10 90 07|................|
000008d000 00 01 00 00 00 00 0000 00 00 00 90 07 ad 33|...............3|
000008e00a 01 00 00 1a 01 00 00c1 07 00 00 fe 1e 90 07|................|
000008f000 00 01 00 00 00 00 0000 00 00 00 90 07 ee 88|................|
000009000b 01 00 00 1b 01 00 00b3 08 00 00 00 20 90 07|............. ..|
结论:可见,直接在主机上读取裸设备上的裸数据时,从加密前设备和加密后设备上的是完全不同的。使用磁盘加密的方法,在删除磁盘时,不需要对磁盘进行格式化,直接把加密用的密码删除即可,再也不用往裸设备中填0实现格式化。
版权声明:本文为博主原创文章,未经博主允许不得转载。
页:
[1]