Hi,

Thanks for providing interesting package and accepting good part of my
proposal.

For the record...

I agree that if you chose good password, your eCrypted folder is safe.
But how often do we have such good one :)

Encryption key has 128 bit strength since it is generated from
/dev/urandom and there is no established script to go over them to check
if one possible key is the one used for encryption.  This makes it
practically impossible to try to run cracking scripts by scanning all
possible cases. (Besides there is no easy existing script to do it.)

On the other hand  typical simple login password with 8 characters has
only about 18 bit strength according to wikipedia article and thieves
can check password with the hash value in /etc/shadow contents easily
using established scripts (crack, john).
http://en.wikipedia.org/wiki/Password_strength

Please note such password is good enough for normal protection for
logging into account. (Usually with system with shadow password and some
time delay for login, this gives enough protection since each process of
password verification takes time and shadow can not be read.  About
order of 1000 hours if we try each 4 seconds.)

I agree that independent password does not give you extra bits of
security as password bits unless you pay extra attention to the choice.
But independent password is only used for encryption and there is no
easy verification process.  So use of it surely improves situation.

> > diff -Nru ecryptfs-utils-64-base/src/utils/ecryptfs-mount-private 
> > ecryptfs-utils-64/src/utils/ecryptfs-mount-private
> I don't think the new command line option is necessary.  Just check for
> the existence of the ~/.ecryptfs/wrapped-independent file.

Agreed.  It is historical :-)
 
> >                 read -p "$MESSAGE" -r LOGINPASS
> I reworked this a bit.

Yes, it is nicer now.

As for
if echo "$LOGINPASS" |tr -d "\n"| 
ecryptfs-insert-wrapped-passphrase-into-keyring "$WRAPPED_PASSPHRASE_FILE" - ; 
then

Then you can do with fancy "stty -echo".  This is prelude to use zenity.
Then we can have desktop file without terminal :-)  (I have uncleaned
version here )

> The 3 PW_ATTEMPTS is actually useful, ...

Agreed.  It is historical junk I had.

> > diff -Nru ecryptfs-utils-64-base/src/utils/ecryptfs-setup-private 
> > ecryptfs-utils-64/src/utils/ecryptfs-setup-private
> 
> I appreciate that you're adding support for single character short
> options, but that really doesn't belong in this patch.  A second patch
> to do this would be much preferred, to keep the changes self-contained
> and incremental.  I'm dropping that change for now.  I'll handle that in
> a separate commit.

Understood and thanks.
 
> I'm going to handle the MESSAGE bits a little differently.

Sure.
> > +                       if [ "$LOGINPASS2" = "$LOGINPASS2" ]; then
> 
> This will always be true.  I fixed it.

Call me stupid.

> This "recommended" bit also doesn't belong in this patch.  I'm dropping this 
> too.

OK.
 
> We only print passphrases to screen if they're randomly generated.  If
> the user has chosen their passphrase, and enters it twice, identically,
> we're going to make the relatively safe assumption that they know their
> passphrase.

I was debating with myself ... OK.
 
> Okay, I've tested this a bit, and committed it to upstream git.

Thanks.
 
> See the git commits:
>  * 
> http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git;a=commit;h=43da1692581c5c575550aab0ca54e9d85fe0a8b0
>  * 
> http://git.kernel.org/?p=linux/kernel/git/mhalcrow/ecryptfs-utils.git;a=commit;h=43da1692581c5c575550aab0ca54e9d85fe0a8b0

Hmmm... why two lines?  Contents looks good to me though.

> Also, I released version 65:
>  * https://launchpad.net/ecryptfs/trunk/65

Great!

Osamu





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to