Uploaded image for project: 'Cassandra'
  1. Cassandra
  2. CASSANDRA-14107

Dynamic key rotation support for transparent data encryption

    XMLWordPrintableJSON

Details

    • New Feature
    • Status: Patch Available
    • Low
    • Resolution: Unresolved
    • 5.x
    • Legacy/Core

    Description

      Handling of encryption keys as introduced in CASSANDRA-9945 takes place by referencing a key alias in either cassandra.yaml, or the header of the (commitlog/hints) file that has been encrypted. Using the alias as literal value will work, but requires some attention when rotating keys.

      Currently each time a key is rotated (i.e. adding a new key to the keystore while preserving the previous version), the alias in cassandra.yaml has to be update as well and the node needs to be restarted. It would be more convenient to use a symbolic reference instead. My suggestion here would be to use "<alias>:latest" for referring to the latest version. In this case Cassandra always picks the key with the highest version in "<alias>:<seq_number>".

      The non-trivial part of this suggestion is how the "latest" key is referenced in the file header. If we use "latest", e.g. for the commit log header, and the key gets rotated, we'd now try do decrypt the file with the new key, instead of the key it has been created with. Therefor we'd have to introduce an extra step that will resolve the canonical version for "latest" and refer to that one during any encrypt operation.

      Attachments

        1. patches-14107.tar
          110 kB
          Stefan Podkowinski

        Issue Links

          Activity

            People

              Unassigned Unassigned
              spod Stefan Podkowinski
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated: