| ================================ |
| LUKS volume with detached header |
| ================================ |
| |
| Introduction |
| ============ |
| |
| This document gives an overview of the design of LUKS volume with detached |
| header and how to use it. |
| |
| Background |
| ========== |
| |
| The LUKS format has ability to store the header in a separate volume from |
| the payload. We could extend the LUKS driver in QEMU to support this use |
| case. |
| |
| Normally a LUKS volume has a layout: |
| |
| :: |
| |
| +-----------------------------------------------+ |
| | | | | |
| disk | header | key material | disk payload data | |
| | | | | |
| +-----------------------------------------------+ |
| |
| With a detached LUKS header, you need 2 disks so getting: |
| |
| :: |
| |
| +--------------------------+ |
| disk1 | header | key material | |
| +--------------------------+ |
| +---------------------+ |
| disk2 | disk payload data | |
| +---------------------+ |
| |
| There are a variety of benefits to doing this: |
| |
| * Secrecy - the disk2 cannot be identified as containing LUKS |
| volume since there's no header |
| * Control - if access to the disk1 is restricted, then even |
| if someone has access to disk2 they can't unlock |
| it. Might be useful if you have disks on NFS but |
| want to restrict which host can launch a VM |
| instance from it, by dynamically providing access |
| to the header to a designated host |
| * Flexibility - your application data volume may be a given |
| size and it is inconvenient to resize it to |
| add encryption.You can store the LUKS header |
| separately and use the existing storage |
| volume for payload |
| * Recovery - corruption of a bit in the header may make the |
| entire payload inaccessible. It might be |
| convenient to take backups of the header. If |
| your primary disk header becomes corrupt, you |
| can unlock the data still by pointing to the |
| backup detached header |
| |
| Architecture |
| ============ |
| |
| Take the qcow2 encryption, for example. The architecture of the |
| LUKS volume with detached header is shown in the diagram below. |
| |
| There are two children of the root node: a file and a header. |
| Data from the disk payload is stored in the file node. The |
| LUKS header and key material are located in the header node, |
| as previously mentioned. |
| |
| :: |
| |
| +-----------------------------+ |
| Root node | foo[luks] | |
| +-----------------------------+ |
| | | |
| file | header | |
| | | |
| +---------------------+ +------------------+ |
| Child node |payload-format[qcow2]| |header-format[raw]| |
| +---------------------+ +------------------+ |
| | | |
| file | file | |
| | | |
| +----------------------+ +---------------------+ |
| Child node |payload-protocol[file]| |header-protocol[file]| |
| +----------------------+ +---------------------+ |
| | | |
| | | |
| | | |
| Host storage Host storage |
| |
| Usage |
| ===== |
| |
| Create a LUKS disk with a detached header using qemu-img |
| -------------------------------------------------------- |
| |
| Shell commandline:: |
| |
| # qemu-img create --object secret,id=sec0,data=abc123 -f luks \ |
| -o cipher-alg=aes-256,cipher-mode=xts -o key-secret=sec0 \ |
| -o detached-header=true test-header.img |
| # qemu-img create -f qcow2 test-payload.qcow2 200G |
| # qemu-img info 'json:{"driver":"luks","file":{"filename": \ |
| "test-payload.img"},"header":{"filename":"test-header.img"}}' |
| |
| Set up a VM's LUKS volume with a detached header |
| ------------------------------------------------ |
| |
| Qemu commandline:: |
| |
| # qemu-system-x86_64 ... \ |
| -object '{"qom-type":"secret","id":"libvirt-3-format-secret", \ |
| "data":"abc123"}' \ |
| -blockdev '{"driver":"file","filename":"/path/to/test-header.img", \ |
| "node-name":"libvirt-1-storage"}' \ |
| -blockdev '{"node-name":"libvirt-1-format","read-only":false, \ |
| "driver":"raw","file":"libvirt-1-storage"}' \ |
| -blockdev '{"driver":"file","filename":"/path/to/test-payload.qcow2", \ |
| "node-name":"libvirt-2-storage"}' \ |
| -blockdev '{"node-name":"libvirt-2-format","read-only":false, \ |
| "driver":"qcow2","file":"libvirt-2-storage"}' \ |
| -blockdev '{"node-name":"libvirt-3-format","driver":"luks", \ |
| "file":"libvirt-2-format","header":"libvirt-1-format","key-secret": \ |
| "libvirt-3-format-secret"}' \ |
| -device '{"driver":"virtio-blk-pci","bus":XXX,"addr":YYY,"drive": \ |
| "libvirt-3-format","id":"virtio-disk1"}' |
| |
| Add LUKS volume to a VM with a detached header |
| ---------------------------------------------- |
| |
| 1. object-add the secret for decrypting the cipher stored in |
| LUKS header above:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"object-add", \ |
| "arguments":{"qom-type":"secret", "id": \ |
| "libvirt-4-format-secret", "data":"abc123"}}' |
| |
| 2. block-add the protocol node for LUKS header:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \ |
| "arguments":{"node-name":"libvirt-1-storage", "driver":"file", \ |
| "filename": "/path/to/test-header.img" }}' |
| |
| 3. block-add the raw-drived node for LUKS header:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \ |
| "arguments":{"node-name":"libvirt-1-format", "driver":"raw", \ |
| "file":"libvirt-1-storage"}}' |
| |
| 4. block-add the protocol node for disk payload image:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \ |
| "arguments":{"node-name":"libvirt-2-storage", "driver":"file", \ |
| "filename":"/path/to/test-payload.qcow2"}}' |
| |
| 5. block-add the qcow2-drived format node for disk payload data:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \ |
| "arguments":{"node-name":"libvirt-2-format", "driver":"qcow2", \ |
| "file":"libvirt-2-storage"}}' |
| |
| 6. block-add the luks-drived format node to link the qcow2 disk |
| with the LUKS header by specifying the field "header":: |
| |
| # virsh qemu-monitor-command vm '{"execute":"blockdev-add", \ |
| "arguments":{"node-name":"libvirt-3-format", "driver":"luks", \ |
| "file":"libvirt-2-format", "header":"libvirt-1-format", \ |
| "key-secret":"libvirt-2-format-secret"}}' |
| |
| 7. hot-plug the virtio-blk device finally:: |
| |
| # virsh qemu-monitor-command vm '{"execute":"device_add", \ |
| "arguments": {"driver":"virtio-blk-pci", \ |
| "drive": "libvirt-3-format", "id":"virtio-disk2"}} |
| |
| TODO |
| ==== |
| |
| 1. Support the shared detached LUKS header within the VM. |