From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E8AC4C43461 for ; Wed, 16 Sep 2020 18:43:06 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id AF32F20732 for ; Wed, 16 Sep 2020 18:43:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600281786; bh=Rz5ekuNb4oTK1S7X6w2z3+l/mwYPFvZDhTuorHEm6P8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=giUsYuOBX9RwsTTnJVEIsg1u7Wpbn2JV/5EkjU5j6TpKW+Ts8jJsy6SEESo0/ARpl dswOhLWQKGuLIOgPS0AhqpfdTVTPHykykxQmH5cKIqYGBaL/at9PLAmkeajZ5r7IWP GOIT48WhVJNhM/sYFpax3UYSLXuo82i1vwKX3rJI= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728197AbgIPSmm (ORCPT ); Wed, 16 Sep 2020 14:42:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:39262 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728194AbgIPSmi (ORCPT ); Wed, 16 Sep 2020 14:42:38 -0400 Received: from sol.localdomain (172-10-235-113.lightspeed.sntcca.sbcglobal.net [172.10.235.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E2E6520732; Wed, 16 Sep 2020 18:42:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600281757; bh=Rz5ekuNb4oTK1S7X6w2z3+l/mwYPFvZDhTuorHEm6P8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=DCT/Q+7M9WUl3cRiX0BJoiAQunYf3Y91dqDuvGXRRj0AcZFQSxpwmRahCTOthsA50 3n4bo3vq/o6lnkTUBs+EOpVhjW+krWEXbzQ02lz1EtgTRtR3URAlN9AD7eMcjr6sBn bwUdUPnPy7fo7MWejZuecVS9Rno5Qd6uOsScLGLI= Date: Wed, 16 Sep 2020 11:42:35 -0700 From: Eric Biggers To: Jeff Layton Cc: ceph-devel@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-fsdevel@vger.kernel.org, Xiubo Li Subject: Re: [RFC PATCH v3 12/16] ceph: add encrypted fname handling to ceph_mdsc_build_path Message-ID: <20200916184235.GC4373@sol.localdomain> References: <20200914191707.380444-1-jlayton@kernel.org> <20200914191707.380444-13-jlayton@kernel.org> <20200915014159.GK899@sol.localdomain> <20200916173603.GA4373@sol.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-fscrypt-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-fscrypt@vger.kernel.org On Wed, Sep 16, 2020 at 02:04:23PM -0400, Jeff Layton wrote: > On Wed, 2020-09-16 at 10:36 -0700, Eric Biggers wrote: > > On Wed, Sep 16, 2020 at 08:30:01AM -0400, Jeff Layton wrote: > > > It sounds like we'll probably need to stabilize some version of the > > > nokey name so that we can allow the MDS to look them up. Would it be a > > > problem for us to use the current version of the nokey name format for > > > this, or would it be better to come up with some other distinct format > > > for this? > > > > > > > You could use the current version, with the dirhash field changed from u32 to > > __le32 so that it doesn't depend on CPU endianness. But you should also > > consider using just base64(SHA256(filename)). The SHA256(filename) approach > > wouldn't include a dirhash, and it would handle short filenames less > > efficiently. However, it would be simpler. Would it be any easier for you? > > > > I'm not sure which would be better from a fs/crypto/ perspective. For *now*, it > > would be easier if you just used the current 'struct fscrypt_nokey_name'. > > However, anything you use would be set in stone, whereas as-is the format can be > > changed at any time. In fact, we changed it recently; see commit edc440e3d27f. > > > > If we happen to change the nokey name in the future for local filesystems (say, > > to use BLAKE2 instead of SHA256, or to support longer dirhashes), then it would > > be easier if the stable format were just SHA256(filename). > > > > It's not a huge deal though. So if e.g. you like that the current format avoids > > the cryptographic hash for the vast majority of filenames, and if you're fine > > with the slightly increased complexity, you can just use it. > > > > The problem with using a different scheme from the presentation format > is this: > > Suppose I don't have the key for a directory and do a readdir() in > there, and get back a nokey name with the hash at the end. A little > while later, the dentry gets evicted from the cache. > > Userland then comes back and wants to do something with that dentry > (maybe an unlink or stat). Now I have to look it up. At that point, I > don't really have a way to resolve that on the client [1]. I have to ask > the server to do it. What do I ask it to look up? > > Storing the stable format as a full SHA256 hash of the name is > problematic as I don't think we can convert the nokey name to it > directly (can we?). > > If we store the current nokey format (or some variant of it that doesn't > include the dirhash fields) then we should be able to look up the > dentry, even when we don't have complete dir contents. > -- > Jeff Layton > > [1]: ok, technically we could do a readdir in the directory and try to > match the nokey name by deriving them from the full crypttext, but > that's potentially _very_ expensive if the dir is large. You'd need to use the same format for storage and presentation. My point is that other filesystems don't have that constraint, and it could happen that we decide to change the presentation format for those *other* filesystems in the future. Say, if SHA-256 falls out of favor and people want it replaced with a different cryptographic hash algorithm; or if a filesystem with 128-bit dirhashes adds support for fscrypt; or if it turns out that a different variant of base64 would be better. The ceph format would then be a "legacy" format that we'd need to support. That would be somewhat easier if it was simply base64(SHA-256(filename)), vs. something more complicated. Again, not a huge deal though, and maybe you want to avoid doing the hash for short filenames anyway. - Eric