>>I meant that since file size does change with encryption padding, MAC, >> and IV - if (a) one picks large block size, and (b) filesize are >> comparable to block size, it would be hard to tell one (small) file >> from another. Think copies of text emails (not those JavaScript >> monsters :). :-) >Yes, for very small files, this would work.
Exactly what I said. :-) >>>There is the issue in the current implementation that you can get >>> conflicts when multiple users are modifying the same directory at the >>> same time. This is, however, an implementation issue and not a design >>> issue. If you're interested in some possible solutions, you can take a >>> look at section 4.6 in https://www.cryfs.org/cryfs_mathesis.pdf . >> Let me take a look and get back to you. >Thanks. I'm happy about any feedback you can give me. OK, I got the code and took a brief look. First impression: it looks like an exercise in “how many different and complex packages I can tie together without crashing the whole thing”. Fragility of such approach are too numerous to list. Not to mention that it downloads a ****load of stuff, most of which (some) people have installed - and care about the version they have running. For example, WTF do I need your code to pull megabytes of boost-1.57, when I’m happily running boost-1.59??? Build is still running, so no more comments *at this time*. But I’m almost sorry I started. >>> I'm not sure whether >>> VeraCrypt can handle multiple instances accessing the same container >>> file at the same time though. >> I don’t know (yet). >As long as they didn't take special attention to this when implementing >VeraCrypt (which I don't see why they would), I think it is improbable >that VeraCrypt can handle this scenario. It is much easier to implement >it assuming there is only one process accessing the container file at a >time. :-) That is true. >>>As a side note, the way CryFS stores its blocks is a quite small module >>> in the application that could easily be changed to directly storing it >>> on EBS or S3 (or any other cloud provider). I'm thinking about offering >>> a version that runs directly off the cloud without a local copy of the >>> ciphertexts. This is only an idea and nothing concrete yet though. >> I think it would be *very* nice to have this option/capability. >> >Yes, I think so as well. It has also disadvantages (e.g. longer access >times, slower read/write speeds, ...), but it is something worth trying. Considering that it would free many gigabytes of user disk space - I’m certain many (most?) of the users would gladly pay with some speed for this. > >I have other things on my agenda currently, but will definitely try it >out in future. It would only be a small code change however, so if >you're interested in implementing it, I'm happy to give you an >introduction to the code base. I wonder if your build process can be modified/simplified, with more things made explicit/manual. As it is - I almost can’t stand it. :-( CMake Error at /Users/ur20980/src/cryfs/bii/deps/toeb/cmakepp/cmake/core/message.cmake:94 (_message): Osxfuse not found. Please install osxfuse. Call Stack (most recent call first): /Users/ur20980/src/cryfs/bii/deps/messmer/fspp/CMakeLists.txt:20 (MESSAGE) -- Configuring incomplete, errors occurred! See also "/Users/ur20980/src/cryfs/bii/build/CMakeFiles/CMakeOutput.log". See also "/Users/ur20980/src/cryfs/bii/build/CMakeFiles/CMakeError.log". ERROR: CMake failed $ ll /opt/local/lib/*fuse* lrwxr-xr-x 1 macports admin 22 Oct 28 02:35 /opt/local/lib/libosxfuse.2.dylib@ -> libosxfuse_i64.2.dylib lrwxr-xr-x 1 macports admin 20 Oct 28 02:35 /opt/local/lib/libosxfuse.dylib@ -> libosxfuse_i64.dylib lrwxr-xr-x 1 macports admin 17 Oct 28 02:35 /opt/local/lib/libosxfuse.la@ -> libosxfuse_i64.la -rwxr-xr-x 1 macports admin 195672 Oct 28 02:35 /opt/local/lib/libosxfuse_i32.2.dylib* lrwxr-xr-x 1 macports admin 22 Oct 28 02:35 /opt/local/lib/libosxfuse_i32.dylib@ -> libosxfuse_i32.2.dylib -rwxr-xr-x 1 macports admin 195704 Oct 28 02:35 /opt/local/lib/libosxfuse_i64.2.dylib* lrwxr-xr-x 1 macports admin 22 Oct 28 02:35 /opt/local/lib/libosxfuse_i64.dylib@ -> libosxfuse_i64.2.dylib $ And this configuration did not negatively affect EncFS: $ otool -L /opt/local/bin/encfs /opt/local/bin/encfs: /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundat ion (compatibility version 150.0.0, current version 1153.18.0) /opt/local/lib/libencfs.6.dylib (compatibility version 7.0.0, current version 7.2.0) /opt/local/lib/librlog.5.dylib (compatibility version 6.0.0, current version 6.0.0) /opt/local/lib/libssl.1.0.0.dylib (compatibility version 1.0.0, current version 1.0.0) /opt/local/lib/libcrypto.1.0.0.dylib (compatibility version 1.0.0, current version 1.0.0) /opt/local/lib/libboost_serialization-mt.dylib (compatibility version 0.0.0, current version 0.0.0) /opt/local/lib/libintl.8.dylib (compatibility version 10.0.0, current version 10.3.0) /opt/local/lib/libosxfuse_i64.2.dylib (compatibility version 10.0.0, current version 10.3.0) /usr/lib/libc++.1.dylib (compatibility version 1.0.0, current version 120.0.0) /usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current version 1213.0.0) ------------------------------------------------------------------------------ Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 _______________________________________________ Encfs-users mailing list Encfs-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/encfs-users