This is an automated email from the ASF dual-hosted git repository.

adoroszlai pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ozone.git


The following commit(s) were added to refs/heads/master by this push:
     new 17ecc58e3c HDDS-8132. [Design] Secure S3 keys management (#4372)
17ecc58e3c is described below

commit 17ecc58e3c17ff132a31029dc53b4a361362418a
Author: Maxim Myskov <[email protected]>
AuthorDate: Sat May 20 10:11:53 2023 +0300

    HDDS-8132. [Design] Secure S3 keys management (#4372)
    
    Co-authored-by: Mikhail <[email protected]>
---
 hadoop-hdds/docs/content/design/secure-s3.md | 37 ++++++++++++++++++++++++++++
 1 file changed, 37 insertions(+)

diff --git a/hadoop-hdds/docs/content/design/secure-s3.md 
b/hadoop-hdds/docs/content/design/secure-s3.md
new file mode 100644
index 0000000000..901ef6a352
--- /dev/null
+++ b/hadoop-hdds/docs/content/design/secure-s3.md
@@ -0,0 +1,37 @@
+---
+title: Secure S3 keys management
+summary: Improving security regarding s3 keys management
+date: 2023-03-10
+jira: HDDS-8132
+status: implementing
+author: Maksim Myskov, Mikhail Pochatkin
+---
+<!--
+  Licensed under the Apache License, Version 2.0 (the "License");
+  you may not use this file except in compliance with the License.
+  You may obtain a copy of the License at
+   http://www.apache.org/licenses/LICENSE-2.0
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License. See accompanying LICENSE file.
+-->
+
+# Abstract
+
+There are problems related to the current S3 keys management:
+* Storing keys as plain text in Ozone Manager rocksdb is insecure. An ozone 
administrator can easily impersonate any user by recovering his keys from 
rocksdb.
+* The only way for a user to generate keys is to have SSH access to the Ozone 
cluster. Security policies can also prohibit this.
+* Keys revocation process is manual which leads to security issues.
+
+We intend to extend Ozone S3 secret key management:
+* Support centralized remote S3 secret storage.
+* Implement S3 gateway endpoint for getting, renewing and revoking secrets.
+* Add TTL to secrets.
+
+This document proposes solutions to the above issues.
+
+# Link
+
+https://issues.apache.org/jira/secure/attachment/13057463/Secure%20S3%20keys%20management.pdf
\ No newline at end of file


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to