You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 31 Next »

Motivation

Master key rotation required in case of it compromising or at the end of crypto period (key validity period). 

Design assumes that administrator will provide ability to get new master key by EncryptionSPI from underlying storage.

Definitions

  • MK – Master KeyEncrypts group keys. Master key is stored in some key storage. Master keys identified by name.

Prerequisites

New master key should be available to EncryptionSPI for each server node. The cluster should be active.

Process management

Users can control the master key rotation process key via  some kind of user interface(CLI, JMX, Java API). 

  • JAVA API:
    ignite.encryption().changeMasterKey(String masterKeyName)  - starts master key rotation process.
    String ignite.encryption().getMasterKeyName()  - gets current master key name.

  • JMX:
    changeMasterKey(String masterKeyName)  - starts master key rotation process.
    String getMasterKeyName()   - gets current master key name.

  • CLI:
    # Starts master key rotation.
    control.sh --encryption change_master_key newMasterKeyName

    # Displays cluster's current master key name.
    control.sh --encryption get_master_key_name

Process description

Master key change process consist of two phases:

  1. Prepare master key change.
  2. Perform master key change.

Each phase is a distributed process.

Prepare master key change

The goal is to verify that all server nodes have the same master key. A server node starts prepare phase with the MasterKeyChangeRequest that contains:

  1. New master key name.
  2. New master key digest.

Each server node executes following actions:

  1. It obtains a digest of a new master key. If the digest is unavailable then the process completes with the error.

  2. Compares it with the one in message.
  3. If it differs then the process completes with the master key digest consistency check error.
  4. Store locally master key name and digest.

The coordinator starts the perform phase when the prepare phase completed without errors.

Perform master key change

The coordinator node starts prepare phase with the MasterKeyChangeRequest that contains:

  1. New master key name.
  2. New master key digest.

Each server node executes following actions:

  1. It checks that the cluster is active (WAL should be available for a write to correctly log changes and survive cluster restarts). Otherwise, the process completes with the error.
  2. Checks that master key name and digest is the same as it was taken from the prepare phase. Otherwice, log it and cancel the process.
  3. Blocks creation of encrypted cache key.
  4. Reencrypt all cache group keys with new master key in a temporary datastructure. No changes in MetaStore.
  5. Create WAL logical record (ChangeMasterKeyRecord ) that consist of:
    1. New master key name.
    2. Reenctyped cache group keys.
  6. Write cache group keys to MetaStore .
  7. Unblock creation of encrypted cache key.

Distributed process

Distributed process is a cluster-wide process that accumulates single nodes results to finish itself.

The process consists of the following phases:

  1. The initial request starts the process. The InitMessage sent via discovery.
  2. Each server node processes an initial request and sends the single node result to the coordinator. The SingleNodeMessage sent via communication.
  3. The coordinator accumulate all single nodes results and finish process. The FullMessage sent via discovery.

Several processes of one type can be started at the same time.

Process completion

The process completes when the perform phase completed (all nodes was re-encrypts their keys).

Corner cases

Node was down during key rotation. MasterKeyChangeRecord was not found.

If some node was unavailable during master key rotation process it will unable to join to the cluster because it has old master key.

To update this node user should run ignite with system property (IGNITE_MASTER_KEY_NAME_TO_CHANGE_BEFORE_STARTUP=newMasterKeyName)

The node will re-encrypt cache keys with new MK and try to join to cluster.

Node was down during key rotation. MasterKeyChangeRecord found.

A node should not try to join to the cluster before the process of ChangeMasterKeyRecord. Regardless of whether the key rotation was finished successfully or not, the recovery will be from the record.

  1. If during node recovery with logical records we found ChangeMasterKeyRecord  it passed to EncryptionManager .
  2. When MetaStore becomes available for write, EncryptionManager  writes new cache group keys to it.

Node join during key rotation process

Reject node join. It may lead to inconsistent master keys in cluster.

Cache start during key rotation process

Cache keys must not be created during the master key rotation process. So, a node will throw an exception if a user will start cache during the key rotation process. Moreover, if group keys were generated before the master key change the cache start will be rejected (case of client node starts the cache).

A node was unable to do the perform phase.

The node will process the critical error failure. Failure handler must stop the node to prevent inconsistent keys in the cluster.

Public java API changes

EncryptionSpi

The concept of the masterKeyId will be added to the cache keys encryption process in EncryptionSpi :

New methods will be introduced:

  • setMasterKeyName(String masterKeyName)  // Sets "current" master key name
  • String getMasterKeyName()  // Gets "current" master key name

Follow methods will work with master key that setted by previous method:

  • byte[] masterKeyDigest() 
  • byte[] encryptKey(Serializable key) 
  • Serializable decryptKey(byte[] key) 

This is necessary so that ignite can decrypt cache keys with the old master key and encrypt with the new one.

Code changes

Meta Storage

Meta storage will store master key name. Key name from meta storage has a higher priority to key name from EncryptionSpi .

Node attribute

Currently joining node send hash MK for validation in attributes. Attributes can't be modified at runtime. So joining node will send hash MK in JoiningNodeDiscoveryData .

Tickets

Unable to render Jira issues macro, execution error.

  • No labels