Re: [zfs-discuss] Feature Request for zfs pool/filesystem protection?

2013-02-21 Thread Fabian Keil
Richard Elling richard.ell...@gmail.com wrote:

 On Feb 20, 2013, at 3:27 PM, Tim Cook t...@cook.ms wrote:
  On Wed, Feb 20, 2013 at 5:09 PM, Richard Elling richard.ell...@gmail.com 
  wrote:
  On Feb 20, 2013, at 2:49 PM, Markus Grundmann mar...@freebsduser.eu wrote:

  My name is Markus and I living in germany. I'm new to this list and I have 
  a simple question
  related to zfs. My favorite operating system is FreeBSD and I'm very happy 
  to use zfs on them.
  
  It's possible to enhance the properties in the current source tree with an 
  entry like protected?
  I find it seems not to be difficult but I'm not an professional C 
  programmer. For more information
  please take a little bit of time and read my short post at
  
  http://forums.freebsd.org/showthread.php?t=37895

Inaccessible for me without extra steps to circumvent the
aggressive IP blacklisting ...
 
  I have reviewed some pieces of the source code in FreeBSD 9.1 to find out 
  how difficult it was to
  add an pool / filesystem property as an additional security layer for 
  administrators.
  
  
  Whenever I modify zfs pools or filesystems it's possible to destroy [on a 
  bad day :-)] my data. A new
  property protected=on|off in the pool and/or filesystem can help the 
  administrator for datalost
  (e.g. zpool destroy tank or zfs destroy tank/filesystem command will 
  be rejected
  when protected=on property is set).

  Look at the delegable properties (zfs allow). For example, you can delegate 
  a user to have
  specific privileges and then not allow them to destroy. 
  
  Note: I'm only 99% sure this is implemented in FreeBSD, hopefully someone 
  can verify.

It's implemented and works for me.

  With the version of allow I'm looking at, unless I'm missing a setting, it 
  looks like it'd be a complete nightmare.  I see no concept of deny, so 
  that means you either have to give *everyone* all permissions besides 
  delete, or you have to go through every user/group on the box and give 
  specific permissions and on top of not allowing destroy.  And then if you 
  change your mind later you have to go back through and give everyone you 
  want to have that feature access to it.  That seems like a complete PITA to 
  me.  

On most systems I use most users don't need any delegations.

I agree that manually changing already existing delegations currently
is a bit inconvenient, but you usually don't have to do it every day
and you can use a script to increase the convenience.

As far as protected=on or Jim's #3568 are concerned I think a
more powerful mechanism would be negative delegations that override
the standard delegations and can also restrict root, or an option
that turns the standard delegation into a white-list that applies
to everyone including root. For extra protection/inconvenience it
could be immutable if the securelevel is above 1.

I don't remember ever accidentally destroying a pool or file system,
but occasionally failed at automatically destroying all but the
last X snapshots using a ad-hoc shell command and don't think a
protect option would have helped there.

I now use a script for this:
http://www.fabiankeil.de/sourcecode/zfs-snapshot-destroyer/zsd.pl
On datasets where I rarely destroy snapshots I don't grant me
destroy privileges which means I have to use sudo which should
further reduce the risk of accidents.

Fabian


signature.asc
Description: PGP signature
___
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss


Re: [zfs-discuss] dm-crypt + ZFS on Linux

2012-11-23 Thread Fabian Keil
John Baxter johnleebax...@gmail.com wrote:

 After searching for dm-crypt and ZFS on Linux and finding too little
 information, I shall ask here. Please keep in mind this in the context of
 running this in a production environment.
 
 We have the need to encypt our data, approximately 30TB on three ZFS
 volumes under Solaris 10. The volumes currently reside on iscsi sans
 connected via 10Gb/s ethernet. We have tested Solaris 11 with ZFS encrypted
 volumes and found the performance to be very poor and have an open bug
 report with Oracle.

Was the performance acceptable without encryption?

 We are a Linux shop and since performance is so poor and still no
 resolution, we are considering ZFS on Linux with dm-crypt.
 I have read once or twice that if we implemented ZFS + dm-crypt we would
 loose features, however which features are not specified.
 We currently mirror the volumes across identical iscsi sans with ZFS and we
 use hourly ZFS snapshots to update our DR site.

 Which features of ZFS are lost if we use dm-crypt? My guess would be they
 are related to raidz but unsure.

It depends on where you put the encryption layer. If you put it below ZFS,
no ZFS feature has to be lost although bugs in the encryption layer may
make the whole setup less reliable. Of course that's true for Oracle's
ZFS encryption as well.

If you put the encryption layer on top of ZFS, features like compression
and deduplication should be ineffective. It will not encrypt the ZFS
metadata, but it allows you to keep parts of the data on the pool intentionally
(or unintentionally) unencrypted. If your application doesn't work with
raw devices, you need a file system on top of the encryption layer again.

I'm not aware of anything raidz-related that is lost in either setup.

I haven't used ZFS with dm-crypt on GNU/Linux, but if I had to, I'd put
dm-crypt below ZFS and would rather split the pool than put dm-crypt on
top of ZFS.

My impression is that ext4 on dm-crypt on ZFS is a popular setup
(among bloggers), but I have no idea why and certainly wouldn't
want to use it in a production environment.

Just in case your GNU/Linux experiments don't work out, you could
also try ZFS on Geli on FreeBSD which works reasonably well.

Fabian


signature.asc
Description: PGP signature
___
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss


Re: [zfs-discuss] Solaris derivate with the best long-term future

2012-07-11 Thread Fabian Keil
Bob Friesenhahn bfrie...@simple.dallas.tx.us wrote:

 On Wed, 11 Jul 2012, Eugen Leitl wrote:
 
  It would be interesting to see when zpool versions 28 will
  be available in the open forks. Particularly encryption is
  a very useful functionality.
 
 Illumos advanced to zpool version 5000 and this is available in the 
 latest OpenIndiana development release.  Does that make you happy?
 
 As far as which Solaris derivate has the best future, it is clear that 
 Illumos has a lot of development energy right now and there is little 
 reason to believe that this energy will cease.  Illumos-derived 
 distributions may come and go but it looks like Illumos has a future, 
 particularly once it frees itself from all Sun-derived binary 
 components.

FreeBSD 10.0-CURRENT is at zpool version 5000 as well.
It supports ZFS-independent full disk encryption through
geli and gbde.

I've been using ZFS on geli since the ZFS import in 2007 and
while there are still a couple of unresolved bugs, overall I'm
quite satisfied.

Of course FDE is less flexible than the per-dataset encryption
offered by Oracle ZFS, but personally I prefer to encrypt all the
data in the pool anyway and Oracle ZFS is not designed to do that:
https://blogs.oracle.com/darren/entry/zfs_encryption_what_is_on

I certainly wouldn't mind additionally being able to use
encryption inside ZFS, though.

Fabian


signature.asc
Description: PGP signature
___
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss