On Wed, 29 Feb 2012 15:40:27 +0100
Prefer Anon <my.m...@gmail.com> wrote:
| Thanks Greg that was the first idea I had but then it occurred to me that
| for Unison to compare my homedir with the local plaintext copy it actually
| has to read over the plaintext copy.  But the local plaintext is just a
| non-encrypted version of the remote mount which means its actually remote
| and so very slow to read.  Unison trying to scan over this file would
| basically lose all the advantages of unison which is to have a copy run on
| the server to avoid any the huge network overhead of rereading the files.
| It might be that unison can get away with just reading the timestamps and
| so only have to read the files that change which might not be too bad.  But
| this still seems like a somewhat unideal solution from that perspective.
| 
Unison will nto read or checksum a file if the file has nto changed size
of date stamp.  so the benifit is still their (though initialization can
take a long time).

however if unison is only applied to already synced data, or between two
machines which only store encrypted data  (as my second simplified case)
than their is no problem unison is dealing with actual data files
(encrypted though they are).

The only time you may have sever disadvantages is if the file system
unison is reading from is not real (IE a network mount of some kind)
and then typically only for the initial run while unison creates its
checksum cache.

That is best avoided.

encfs is a full filesystem and if the underlying system can handle disk
block reads (can sshfs do block reads?), encfs will work efficiently with
that file system.

Remote file sync systems (like dropbox) typically do keep a local copy
of the files being sync'ed, so those files can be used when the machine
is disconnected from the network.  Basically they do the job of unison.

And in that case it is probably best to keep the files encrypted (as it
is on the remote server) and mount an un-encrypted version via enc-fs
of the local sync, when you need to look at or working on those files.



NOTE: encfs does not even need to keep the .encfs6-config with the
encrypted data.  Of course any machine that you want to be able to
decrypt the data much have a copy of this config.

  ENCFS6_CONFIG="encfs_config_file"  encfs  /tmp/encfs_dir /tmp/decoded_dir

That is keep the encryption information separate to the encrypted data that
is stored on the remote server.



Also note that encfs only reads that file once!  as such you can make this
a fifo pipeline file, and feed the config file from some other locked source!

I myself do this using a system I call "key store" or "ks" where the
user password unlocks a encrypted file containing the real password of
the encfs partition and the config data file.   This allows me to
change the 'password' to lock the encfs data, any time I like, or even
have multiple passwords.




  Anthony Thyssen ( System Programmer )    <a.thys...@griffith.edu.au>
 --------------------------------------------------------------------------
    Can not say.   Saying, would know.    Do not know, so can not say!
                                -- Zatheris,  Bablyon 5, "War Without End"
 --------------------------------------------------------------------------
   Anthony's Castle     http://www.ict.griffith.edu.au/anthony/

------------------------------------------------------------------------------
Virtualization & Cloud Management Using Capacity Planning
Cloud computing makes use of virtualization - but cloud computing 
also focuses on allowing computing to be delivered as a service.
http://www.accelacomm.com/jaw/sfnl/114/51521223/
_______________________________________________
Encfs-users mailing list
Encfs-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/encfs-users

Reply via email to