Full Disk Encryption
Warning
Full disk encryption requires a clean cluster; otherwise, storage nodes will need to be decommissioned and reingested to enable encryption.
This procedure will be during the configuration of the first static node, which after enabling the encryption, the node should be rebooted if the automount_suspend
flag was set.
Requirements
Minimum of three of the following:
- Any PIV-compatible token (Only traditional cryptography is supported. Management of token is not supported.)
Or, recommended:
- YubiKey 5-series token (Management of token and post-quantum cryptography is supported.)
PIN to secure token
Configuring Full Disk Encryption
Warning
The VM Squared cluster’s disks can be fully encrypted; however, full disk encryption requires at least one static node to have a PIV-compatible token attached. For full control and function of the PQC / Hybrid FDE, a YubiKey 5 token is required to be attached to at least one static node. A minimum of three tokens is recommended for redundancy. If all tokens are lost or damaged, the cluster’s data is irrecoverable even by SoftIron.
With these tokens attached, the manage-disk-encryption
command can be ran from the chosen static nodes. The encryption will detect any tokens and verify the requirements and functionality.
Preview
From the dashboard console, run the manage-disk-encryption
command.
The above tool will be used for both traditional and post-quantum methodologies of disk encryption. Once initialized, the tool will scan the hardware attached and determine the functionality supported.
This procedure will be during the configuration of the first static node, which after enabling the encryption, the node will be rebooted.
PIV token
If the PIV token is preloaded with a certficate, the PIN can be set and propogated to the cluster via Option 1
. This is the only option available if the tokens are not the YubiKey 5-series.
YubiKey 5-series token
The configuration of PQC full disk encryption is completely managed by the built-in tool. The procedure is designed to be followed via the set menu order starting at Option 2
. The steps below will preview the requirements from each option selection.
If a new, unused YubiKey 5-series token is being utilized to encrypt the cluster, the procedure for configuring full disk encryption will start by setting the PIN for the token via
Option 2
.The management (MGMT) key can be provided via
Option 3
. This key also allows the management of the RSA and ML-KEM keys.Next, a PIN Unlock Key (PUK) will be input. This PUK is used in the event that the PIN is incorrectly entered and access is locked. It can be set or changed via
Option 4
.In the event the PIN is locked from incorrectly entering, the PUK can be used to regain access with a new PIN via
Option 5
.With the PIN and MGMT keys set, the RSA key can now be generated on the YubiKey token, initialized by the encryption tool
Option 6
.The ML-KEM key is the penultimate step before the PIN is propogated to the cluster via
Option 1
. It will be generated on the static node and auto-populated onto the token via the tool’sOption 7
.Finally, with all keys created and stored on the token,
Option 1
can be selected to populate the cluster fact for the PIN that was set viaOption 2
.
Info
This will only need to be redone if the PIN is changed from its initial value. Locking and unlocking via the PUK will not erase the file.
After all nodes are configured with identical keys, the disks can be decrypted by any and only one of the tokens configured to the nodes; therefore, loss of all tokens will result in the lost ability to decrypt the disks.
Key features of Post-Quantum Cryptography
- Quantum-resistant algorithms: Post-quantum cryptography involves designing algorithms based on mathematical problems that quantum computers cannot efficiently solve. Current topical research includes areas such as lattice theory, multivariate systems, hash-based signatures, and error-correcting codes.:
- Long-term security: Post-quantum cryptography algorithms aim to protect data not only today but also in the future. Even if quantum computers are not fully operational yet, sensitive data intercepted today (for example, government secrets and financial transactions) could be stored and decrypted years later when quantum computers become viable. Therefore, moving to quantum-resistant cryptography now is critical for protecting long-term data.
- Hybrid systems: Some organizations are adopting hybrid cryptographic systems that combine classical and quantum-resistant algorithms. This provides an additional layer of protection while the world makes its transition to purely post-quantum cryptography.
PQC FDE on VM Squared is completely self-contained, internal to the cluster itself on its static nodes. Still making use of a USB interfacing token, the disks’ header labels are further obfuscated behind a hybrid RSA and ML-KEM key pairing.