Hi Seth

Some feedback on your review

1) Barbican without an HSM

We'd come to the same conclusion that you did - Barbican without an HSM
is really not secure, and the built-in crypto or softhsm options are
really POC/dev use only.

>From a deployment perspective, we have charms for barbican + barbican-
softhsm, but that's just to allow us to perform CI on the charms without
reliance on an actual HSM.

Any production use *requires* use of an HSM (for which we will write
barbican-<inserthsm> charms).

2) Use Cases

Barbican could be used by tenants of a cloud directly, but I think its
much more likely that it will be consumed by other OpenStack services
for secrets management - specific examples would include SSL termination
in Neutron LBAAS, encryption of block devices in Cinder, encryption of
data-at-rest in Swift; barbican is used for the key management aspects
of these integrations.

3) Compatibility

Barbican is part of the integrated release with milestones part of
OpenStack, so even if changes do happen, they are happening in the
greater openstack context, so inter-service compatibility should be
maintained.  Barbican is relatively new (only approaching its 3rd
release now), so I would expect some changes - but that's been typical
of OpenStack projects.  We also have another 4 releases before we have
to worry about LTS support cycles - we can review again at 18.04 if
we're still good with the decision to have Barbican in main.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1543754

Title:
  [MIR] barbican, python-pykmip

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/barbican/+bug/1543754/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to