Bug 1812301 - Generate keyfile instead of passphrase for additional disks
Summary: Generate keyfile instead of passphrase for additional disks
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat Storage
Component: gluster-ansible
Version: rhgs-3.5
Hardware: x86_64
OS: Linux
unspecified
high
Target Milestone: ---
: RHGS 3.5.z Batch Update 2
Assignee: Gobinda Das
QA Contact: SATHEESARAN
URL:
Whiteboard:
Depends On:
Blocks: 1812300
TreeView+ depends on / blocked
 
Reported: 2020-03-11 00:57 UTC by SATHEESARAN
Modified: 2020-06-16 05:57 UTC (History)
5 users (show)

Fixed In Version: gluster-ansible-infra-1.0.4-6.el8rhgs
Doc Type: No Doc Update
Doc Text:
Clone Of: 1812300
Environment:
rhhiv, rhel8
Last Closed: 2020-06-16 05:57:29 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github gluster gluster-ansible-infra pull 82 0 None closed NBDE and blacklist issue fixes 2020-07-09 11:17:58 UTC
Github gluster gluster-ansible pull 97 0 None closed Validate if root device is encrypted prior to actual configuration 2020-07-09 11:17:53 UTC
Red Hat Product Errata RHEA-2020:2575 0 None None None 2020-06-16 05:57:52 UTC

Description SATHEESARAN 2020-03-11 00:57:34 UTC
Description of problem:
-----------------------
User input passphrase may be weak and may not fit in to password quality check.
Instead of asking for passphrase from users, it should be good to generate the random content key-file and use it to encrypt the additional disks.

Max supported key size in cryptsetup is 8192K, so generate the key file of that size and use it for encryption

Following command generates the key for disk for example sdb:
dd bs=1024 count=8192 if=/dev/urandom of=/root/sdb_key iflag=fullblock

Also set proper perms on this file:
# chmod 0400 /root/sdb_key

Version-Release number of selected component (if applicable):
-------------------------------------------------------------
gluster-ansible-infra-1.0.4-5.el8rhgs.noarch.rpm 

How reproducible:
-----------------
Always

Steps to Reproduce:
-------------------
1. Run the playbook to set up NBDE
2. Input weak password for additional disks as 'test'

Actual results:
---------------
No keyfile is used but the weak password is used

Expected results:
-----------------
User may expected to key-in weak password.
Preferable to generate new keyfile of size 8192K and set proper permission on that key file

Comment 3 SATHEESARAN 2020-03-21 09:59:03 UTC
Verified with gluster-ansible-infra-1.0.4-6.el8rhgs

1. Initially passphrase keyfile is generated under /root/sdx_key
2. Later /etc/sdx_keyfile is generated random
3. Passphrase based keyfile is removed
4. /etc/sdx_keyfile is used for unlocking the additional disks

Comment 7 errata-xmlrpc 2020-06-16 05:57:29 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2020:2575


Note You need to log in before you can comment on or make changes to this bug.