Bug 1979244
Summary: | [KMS] Keys are still listed in vault after deleting encrypted PVCs while using kv-v2 secret engine | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Rachael <rgeorge> |
Component: | csi-driver | Assignee: | Niels de Vos <ndevos> |
Status: | CLOSED ERRATA | QA Contact: | Rachael <rgeorge> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.8 | CC: | edonnell, etamir, kbg, kramdoss, madam, muagarwa, nberry, ndevos, ocs-bugs, odf-bz-bot, ratamir |
Target Milestone: | --- | ||
Target Release: | ODF 4.9.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
.Keys are completely destroyed in Vault after deleting encrypted persistent volume claims (PVCs) while using the `kv-v2` secret engine
HashiCorp Vault added a feature for the key-value store v2 where deletion of the stored keys makes it possible to recover the contents in case the metadata of the deleted key is not removed in a separate step. When using key-value v2 storage for secrets in HashiCorp Vault, deletion of volumes did not remove the metadata of the encryption passphrase from the KMS.
With this update, the keys in HashiCorp Vault is completely destroyed by default when a PVC is deleted. You can set the new configuration option `VAULT_DESTROY_KEYS` to `false` to enable the previous behavior. In that case, the metadata of the keys will be kept in HashiCorp Vault so that recovery of the encryption passphrase of the removed PVC is possible.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-12-13 17:44:31 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1966894, 2011326 |
Description
Rachael
2021-07-05 11:37:09 UTC
The metadata with v2 behaviour and same RCA here too https://bugzilla.redhat.com/show_bug.cgi?id=1975323#c7 We could get the doc text ready for the same. @Niels, adding you here so please feel free to add if you have any extra details Niels, Pls fill the doc text I wonder if this is a duplicate of bug 1941836? Being able to undelete/recover data from Hashicorp Vault is a feature from the service. We may need to check with Hashicorp if there is an option to automatically purge metadata of deleted keys after a period of time. I was not able to find something like that in the documentation at https://www.vaultproject.io/docs/secrets/kv/kv-v2#deleting-and-destroying-data As Hashicorp Vault added this feature, their customers may want to use it, or even rely on it. Working around the feature to prevent recovering of deleted data might not be acceptable for all customers. We would need to know what customers of Hashicorp Vault expect, and what configuration options we need to add to meet those expectations. Niels, please fill the doc text FWIW, in Ceph-CSI upstream we'll make this behaviour configurable, and the current proposal is to destroy the contents and metadata of the keys when they are deleted. Is this something you would like to see included in an upcoming release of OCS/ODF? We will need Eran's input on this Doc text needs to be changed, earlier it was a known issue and now a Bug Fix. Olive, the doc-text has been updated to match the current bug fix state. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:5086 |