January OpenZFS Leadership Meeting

Matthew Ahrens mahrens at delphix.com
Fri Jan 17 17:15:30 UTC 2020


Thanks to everyone who participated at this month's meeting.  We discussed:

   - ZoL 0.8.3 contents and schedule
   - checksum algorithm feature flags refcount bug
   - zfs change-key security implications
   - changing default encryption algorithm to GCM


The recording is now available: https://www.youtube.com/watch?v=x9-wua_mzt0

Thanks Serapheim for taking notes:

   -

   When will 0.8.3 ship and will it include the large-dnode “zfs diff” fix
   (FireSnake)
   -

      Currently there is an outstanding patch PR for 0.8.3 (#9776)
      -

      it should be landing when we wrap up our testing so very soon
      (probably within this month!)
      -

      The goal is to have it pulled in for Ubuntu and Debian LTS
      -

      Let us know if there is a patch that you really want to see there


   -

   Changing the checksum algorithm at an existing dataset - even if no new
   blocks have been written - exporting and then importing that pool from a
   different version of ZFS hits an assertion error. [Allan Jude]
   -

      That was an oversight on the design of feature flags.
      -

      We should be able to handle this more gracefully.
      -

      A few ideas were thrown including:
      -

         Bump feature refcount for every dataset that has the property set
         -

         Being able to open the pool but not that dataset (property would
         show as “unsupported”)
         -

   Any further comments on this Ubuntu developer's proposal to enable
   encryption by default with a fixed passphrase:
   https://bugs.launchpad.net/bugs/1857398 (rlaager)


   -

      Is there any additional feedback that we haven’t already provided
      them? Feel free to add in the thread.
      -

      Tangent on secure-erase and changing encryption keys:
      -

         Secure erase and not having dataset’s being partially secure were
         two of the main motivators on the current encryption design.
         -

         The latter is ensured by setting encryption on at creation but not
         guaranteed as the encryption key may later be changed and
will affect only
         new blocks.
         -

         Even if encryption key (user/wrapping key) is changed, new blocks
         can be read/manipulated if the old (compromised/public) key
is known, and
         the old-key-wrapped master key is found (e.g. by forensic
analysis of the
         disk).
         -

         The trade-off being usability and practicality varies wildly
         between cases.
         -

      Given the above tangent, we should really understand what the
      Canonical folks want to do and try to come up with the best practises and
      design. This includes communicating best practices, and potentially
      implementing something different than what we currently have.
      -

      We need to be more clear about the security implications of “zfs
      change-key”
      -

         PR filed <https://github.com/zfsonlinux/zfs/pull/9819>
         -

   Change encryption=on from aes-256-ccm to aes-256-gcm? See especially the
   comments starting here:
   https://github.com/zfsonlinux/zfs/pull/9749#issuecomment-568633557
   (rlaager)
   -

      The two main motivators of this proposal are security and performance.
      -

         From a security standpoint, Mozilla and TLS default to gcm.
         -

         According to Richard’s estimates, performance could get a ~3x
         improvement with gcm.
         -

      There seems to be an overall consensus on this but we should really
      check with Tom Caputi.
      -

   encryption: from_ivset_guid check missing on resumed recv?
   <https://github.com/zfsonlinux/zfs/issues/9818>(Christian Schwarz)
   -

      turned into issue post-meeting, do not include in upcoming agenda
      -

   bookmark cloning & zcp bookmark support PR
   <https://github.com/zfsonlinux/zfs/pull/9571> (Christian Schwarz)
   -

      open design question: what about redaction bookmarks?
      <https://github.com/zfsonlinux/zfs/pull/9571/files#diff-4d2e1215100af304404ae6328e0bbc97R589>
      -

      reviewers needed once above question is resolved
      -

      outcome:
      -

         redaction object might be too large to copy it in syncing context,
         would have to be done in the background
         -

         => don’t implement redaction bookmark cloning at this point
         -

         => create thin bookmark:  zfs bookmark #redactionbook #newbook
         -

            will not contain the redaction object itself


On Mon, Jan 6, 2020 at 9:56 AM Matthew Ahrens <mahrens at delphix.com> wrote:

> The next OpenZFS Leadership meeting will be held tomorrow, January 7,
> 9am-10am Pacific time.  The agenda is pretty light this month, so if you
> have any topics you'd like to discuss with the group, tomorrow will be a
> good opportunity :-)
>
> Everyone is welcome to attend and participate, and we will try to keep the
> meeting on agenda and on time.  The meetings will be held online via Zoom,
> and recorded and posted to the website and YouTube after the meeting.
>
> The agenda for the meeting will be a discussion of the projects listed in
> the agenda doc.
>
> For more information and details on how to attend, as well as notes and
> video from the previous meeting, please see the agenda document:
>
>
> https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit
>
> --matt
>


More information about the zfs-devel mailing list