By default, when you encrypt, rekey, or decrypt a Linux block device, the filesystem on that block device must be unmounted during the entire procedure and the data is inaccessible until the procedure is finished. With Online Encryption, the filesystem only needs to be unmounted briefly during the initial encryption phase when the HyTrust DataControl Policy Agent changes the device to attach the clear text version it creates during the encryption process. After the device has been reattached on the clear text version, the encryption process continues while the disk remains online and the data remains accessible. The device can now be dynamically rekeyed without losing access to the data during the process. During the decryption process, the data is decrypted dynamically before the device is detached.
Note: | The only exception to this is if a VM reboots while a Linux system device (such as /root , /swap , or /home ) is being decrypted. In this case, when the VM finishes rebooting, the decryption process resumes in offline mode and the system device and its data will be inaccessible until decryption is complete. If the VM remains online during the entire decryption process, the data will be available the entire time. |
Prerequisites
In order to enable Online Encryption, you need to install the HTCrypt Driver on each Linux VM whose disks you want to encrypt.
The HTCrypt Driver is a Dynamic Kernel Module Support (DKMS)-based package that requires the following:
The following Linux packages must be installed:
dkms
version 1.95 or later.gcc
kernel-headers
kernel-devel
For CentOS, the kernel-headers
and kernel-devel
packages can be installed through yum
or from the CentOS Vault Repository at http://vault.centos.org.
Important: | The version of the Linux kernel must be the same as the version of the kernel-headers and kernel-devel packages. If you update the Linux kernel, you must also update the version of these packages. For details, see Updating the HTCrypt Kernel Dependencies. |
The HyTrust DataControl Policy Agent includes a script that makes sure the required packages are installed and that they are all using the same version. You can run this script manually if you want to enable online encryption through the CLI, or you can let the Policy Agent take care of installing the required packages by enabling online encryption through the KeyControl webGUI. For details, see Enabling Linux Online Encryption with the CLI or Enabling Linux Online Encryption with the webGUI.
Considerations
hcl encrypt
, hcl rekey
, or hcl decrypt
commands, the commands will return immediately and the encryption or decryption process will start running in the background. You can use the hcl status
command to monitor the progress of these commands.Online Encryption does not support encrypting, rekeying, or decrypting only the allocated blocks on the VM. Therefore you cannot use the -s
option with the hcl encrypt
, hcl rekey
, or hcl decrypt
commands when Online Encryption is enabled.
If you are using Online Encryption on a VM and you want to encrypt a Linux system device (such as /root
, /swap
, or /home
), keep in mind that: