On Wed, Oct 29, 2008 at 11:57 AM, Michael Halcrow <[EMAIL PROTECTED]> wrote:
> This patch makes the minimal changes necessary to enable passphrase
> key escrow and key recovery via a SOAP client/server mechanism. This
> is currently at the proof-of-concept level of implementation; there is
> ample opportunity to add features. You need Python and SWIG installed
> to build the libecryptfs SWIG component. Run key-escrow-server, and
> then run escrow-passphrase.py [passphrase] to escrow the key and
> retrieve-passphrase.py [sig] to fetch the key from the server and put
> it in your keyring, all via localhost. There are all kinds of
> opportunities to make this useful and secure, such as stunnel for
> client-server communications, some kind of authentication mechanism,
> and the ability to specify the remote server and storage
> location. This patch just gives a convenient base from which to flesh
> out a real key escrow capability.

>From a packaging standpoint, I think it might make sense separate the
key escrow bits to a another binary package, as introducing python as
a dependency is mostly unrelated to the existing ecryptfs-utils tools.
 I'll see what I can come up with, and run it by the Debian packager.

:-Dustin

-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
eCryptfs-devel mailing list
eCryptfs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel

Reply via email to