Hello,

This is nice!
Solves the major issue.
But results on many daemons running if user adds keys in several
ecryptfs-manager instances.

I have another annoying question... :)

Except for the passphrase keys which are used directly by the kernel
module, why should the other keys modules use the key store anyway?

I think that any key not known to the kernel can be forward (as
default route) to the netlink socket for further processing. Also the
default encryption key if not exists on store (none passphrase), it
may be forwarded to the netlink socket.

So I understand the use of key store for keys used directly by kernel,
but I don't understand why it is enforced to keys used by the
userspace.

The issue of the passphrase keys can be easily be solved by setting
the key contents as unreadable, and all other keys may be loaded to
into the daemon user userspace interface such as pipe, right?

Best Regards,
Alon Bar-Lev.

On 10/20/07, Trevor Highland <[EMAIL PROTECTED]> wrote:
> Hi all,
>
> This patch changes eCryptfs to use the session keyring rather than the user
> keyring.  The path to the ecryptfsd is currently hardcoded.  The path should
> be determined based on where ecryptfsd will be installed, but I was sure how
> to do that.
>
> Trevor
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> eCryptfs-devel mailing list
> eCryptfs-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel
>
>
>

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
eCryptfs-devel mailing list
eCryptfs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel

Reply via email to