Richard L. Hamilton wrote:
> What standards are out there for self-encrypting drives?  Are these all SCSI 
> command
> set based drives (SCSI, SAS, FC, hypothetically iSCSI) or are there standards 
> applicable
> to SATA drives as well?
> 
> Would a standards-compliant self-encrypting drive work with any controller 
> (supporting
> the appropriate interface and command set, and supported by the OS), or is 
> matching
> controller support also required?
> 
> What support does Solaris/OpenSolaris have (or might reasonably be 
> anticipated if
> it's not there yet)?  How about boot vs non-boot drives?

At this time there is no explicit support for
hardware/firmware/controller based drive encryption.  We currently
assume that the system bios or drive layer deals with all of this if
required.

> I've got to add space to my home storage farm; the drives I want (Seagate 
> Constellation ES,
> 2TB SAS) may be generally available early next year, and there's a 
> Self-Encrypting Drive
> option available.  So I guess I'm really asking if I should bother (assuming 
> for the moment
> that whatever cost difference is minor).  There are also other reasons I can 
> imagine that
> encrypted "storage at rest" migh

Have you considered using ZFS Crypto when it is available (we are hoping
it will be available in the /dev repository very soon after the
restricted builds for the next OpenSolaris release are lifted - final
codereview starts 19th Jan).

ZFS crypto and drive based encryption provide the functionality at a
different layer in the storage stack. They have a large overlapping area
where both should in my opinion be considered.  Especially if you are
going to be serving the data out over iSCSI/FCoE/CIFS/NFS anyway.  At
the present time neither ZFS crypto or drive/controller crypto will
integrate with the key management used for protecting the data in
transit to the remote client;  I do have some early high level designs
for how to integrate ZFS Crypto with Kerberos though.

It depends what your key management and data encryption needs are.
Consider that with drive encryption you very likely have all of the data
in a 2TB drive encrypted under a single key.  With ZFS crypto you can
choose when to switch to using a new wrapping key (the key the
user/admin looks after and provides) and a new data encrypton keys.
Most drive or volume based systems I'm currently aware of don't give you
the key management flexibility that ZFS crypto will do.

>  be of interest, although I make a point of not speaking
> on anyone else's behalf here.  Right now, I'm not mainly thinking about 
> laptops and such,
> although I wouldn't exclude that (although I gather they'd probably need a 
> TPM module
> and support for same to complement the self-encrypting storage).

One of the nice things about doing the encryption at the ZFS layer is
that the same solution works for single disk laptop/workstations as
works for a system comprised of hundreds of disks.  It also doesn't tie
you to a single hardware vendor.


-- 
Darren J Moffat

Reply via email to