[MDEV-16133] User manageable encryption keys Created: 2018-05-10 Updated: 2018-11-15 |
|
| Status: | Open |
| Project: | MariaDB Server |
| Component/s: | Encryption |
| Fix Version/s: | None |
| Type: | Task | Priority: | Minor |
| Reporter: | Nick Bolton | Assignee: | Unassigned |
| Resolution: | Unresolved | Votes: | 0 |
| Labels: | innodb | ||
| Issue Links: |
|
||||||||
| Description |
|
The aspiration here is to hand off the management of encryption keys to the owners of a database schema; rather than the admins of the instance. It would be useful to set the default key_id for encryption as a property of the database; rather than the instance.
Currently the instance needs restarting to add new keys, which are only read at startup. The keystore password also needs a mechanism where it is not stored in clear. mysql supports encrypted exports which do not seem to be a feature of mariadb. It would be good to see that approach implemented so end to end data integrity is possible. Finally, the file_key_management plugin really should start supporting key rotation at some point. We have the option of writing our own plugins for better key storage (e.g. using HSM storage of keys like Oracle 11 offers) and to support full key rotation - but the learning curve before we could achieve that is quite high. |
| Comments |
| Comment by Sergei Golubchik [ 2018-05-11 ] |
|
encryption_key_id is an option defined by InnoDB. To support it on the database level, MariaDB would need to support all engine-defined options on the database level. I've created MDEV-16141 for this task. |