-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change default encryption behaviour #26847
Comments
There is also a middle ground where we keep the current encryption but force the admin to create recovery keys. Also recovery keys are enabled for every user by default. Basically make it opt-out instead of opt-in. That said, I'd personally also prefer to have the master key variant enabled by default instead. |
Yes, let's do opt-out for recovery-key and master key by default. |
This will modify the whole flow of enabling encryption on the GUI and CLI side.
Also need to clear out when and how to do this, UX-wise, in a way that integrates both in the web UI approach when enabling encryption and the CLI approach when enabling encryption. Maybe we can split this in two separate tasks:
Note that we don't have any automated tests neither for master key nor recovery key: owncloud/QA#340 owncloud/QA#341 I have included design discussions but not QA in the estimates. |
We can also just randomly generate a master key, if it is not given, and print it for the admin. |
@felixboehm you probably mean generate a recovery key password ? The master key is already automatically generated. |
and before recommending master key, need to make sure it actually works correctly in all scenarios: owncloud/QA#340 |
|
This is an interesting one, but one we need to solve for 10.0.0, latest 10.0.1 one way or another.
|
Neither does 9.1 or 9.0. Remember that in the past we added encryption modularity to allow for community to develop their own encryption schemes. This modularity comes with two parts:
Unfortunately the default module is also the one that provides master key even though its implementation is different. If there was enough time my suggestion for a clean approach would be to split the default module into two:
|
But since we don't have enough time and will likely keep the both master and non-master key in the "default encryption module" app, then we might need to change the app's GUI (not the generic core encryption GUI) to allow enabling master key as suggested by @hodyroff. Currently the problem is that as soon as this app is enabled, then it already starts using the default mode if people access/create files. Ideally we should then add another step "no encryption mode selected yet" in which no files can be accessed and created, until the admin has picked either "master key" or "non-master key". |
Raised #27438 for separating master-key into a separate app. |
TODOs:
|
Actually I would be very much in favor of getting this done in a clean way as @PVince81 suggested and then have encryption modularized:
Can this still be done at a later point without generating additional efforts or do we have to decide now? |
If we go with the quick route (adding an extra state as I described above) the extra effort would be to remove that state again from the app. But I think removing should be easier than adding it. |
Ok then we should probably walk the quick route and get stuff sorted afterwards. |
I have query regarding the comment. So lets say I made 3 options as drop down as http://imgur.com/a/ysF9b. The options listed as "Master Key", "Custom Key" and "None". So when user selects "Master Key" or "Custom Key" and clicks the button "Confirm Selection" a warning label is raised. Now inside the warning do we need to have a confirmation asking: "Do you still want to proceed" or so? By default I have made "None" as default and the option underneath like "Enable recovery key" is hidden for that option. |
|
PR was merged #27512, will be in 10.0.1 release |
Now the "Master key" choice is the first one in the dropdown. Should we add But before recommending explicitly I suggest we first address the remaining issues with master key: #27427 |
Thanks! Candidate for 10.0.2 then. IMHO. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Current default behaviour: The encryption is per user
Often enough admins do not read the documentation or estimate the risk of this action.
RTFM is imho not an valid excuse here, because the action to restore data is beyond reconfiguring or applying easy changes.
I suggest we use a default encryption with master-key. And make it harder to break your stuff by only allowing the current behaviour with an occ command.
encryption:enable --no-master-key
False understanding of encryption creates hazardous and painful restore sessions, and imho i think setting the default behaviour to master-key encryption would improve ux tremendously.
@felixboehm as discussed
@pmaier1
The text was updated successfully, but these errors were encountered: