Replies: 3 comments
-
I do not think there is a tool or script that can do this for you. If you write something for it, consider contributing it back to this project. If you have the keys stored in the metadata of the RBD-image, you can find the encrypted key in the You can decrypt that the key with the passphrase and nounce (volume id) that were used to encrypt the key. This is the function that does it: ceph-csi/internal/kms/secretskms.go Lines 237 to 264 in d376271 |
Beta Was this translation helpful? Give feedback.
-
I'm looking for valid test data.
EDIT: I could validate my function to decrypt at least with the test in secretkms_test.go, but with the live system it doesn't work! I used secretskms_test.go / TestWorkflowSecretsMetadataKMS() to generate an example DEK.
Why does it not work for live data?
Is the global passphrase from the secret store somehow modified?
|
Beta Was this translation helpful? Give feedback.
-
The problem was the volume id. E.g.
With production data you get a base64 string (which originates from 20 random bytes). |
Beta Was this translation helpful? Give feedback.
-
What new functionality do you want?
I am looking for a tool/script that derives the encryption password from
METADATA
(that's what I use as KMS) andencryptionPassphrase
What is the value to the end user? (why is it a priority?)
so i will be able to (manually)
luksOpen
my encrypted volumes e.g. in case of disaster recovery.How will we know we have a good solution? (acceptance criteria)
any kind of help would be appicated (script, comand line tool or just a HowTo docuemntation)
Beta Was this translation helpful? Give feedback.
All reactions