Hi Darren, Thank you for your kind comments.
On 11/04/08 22:14, Darren J Moffat wrote: > Mark Carlson wrote: > >> I am sponsoring this case for David Zhang. I have marked it closed >> approved automatic based on the checklist in the case directory. > > I don't believe this qualifies as closed approved automatic please set > a timer. > >> It is released under the General Public License Version2 (GPLv2). >> >> Backup Engine Features : >> * Archives compression (Zip & Zip64 format) >> * Archives encryption (Triple DES & AES encryption algorithm) > > What modes of the encryption algorithms are used ? > It is using CBC. > The mode of a crypto algorithm is important, some include an integrity > check but most require the use of a separate keyed message digest > (such as HMAC-SHA256) to protect against cipher text modification. For > example AES_CBC mode is not sufficient to protect against cipher text > modification for large amounts of data. A mode like AES_CCM or > AES_GCM is better since they include a MAC but they expand the size of > each output ciphertext block (between 4 and 16 bytes). The are other > modes like XTS that are non expanding. > > > > This quote from the FAQ concerns me deeply: "As this encryption key is > stored in the backup target, you will never be prompted for it again : > Areca will transparently use it to encrypt / decrypt these archives" > > So how is key management done ? > Where are they keys stored and generated ? > By searching the code... look like ... I need to check the source code deeply to answer this specific question. The document of Areca has not give us a clear answer. public static final String KEYCONV_RAW = "RAW"; public static final String KEYCONV_HASH = "HASH"; public static final String KEYCONV_OLD = "OLD"; // Triple DES 192 registerTripleDesConfiguration(24, "DESede", KEYCONV_OLD); registerTripleDesConfiguration(24, "DESede_HASH", KEYCONV_HASH); registerTripleDesConfiguration(24, "DESede_RAW", KEYCONV_RAW); // AES 128 registerAESConfiguration(16, "AES", KEYCONV_OLD); registerAESConfiguration(16, "AES_HASH", KEYCONV_HASH); registerAESConfiguration(16, "AES_RAW", KEYCONV_RAW); // AES 256 registerAESConfiguration(32, "AES256_HASH", KEYCONV_HASH); registerAESConfiguration(32, "AES256_RAW", KEYCONV_RAW); The author is using 'final String' as the key. > There is information in the answer to "[Q] What is the difference in > the XML configuration file between AES and AES_HASH (or DESEde and > DESEde_HASH) ?" that makes me very concerned. > > The method described there for generating a key from a passphrase is > NOT secure and is subject to rainbow table attacks since the hash > (MD5) of the password does not appear to be salted - this hasn't > actually fixed the problem they appear to think it has. I think so. It is not so secure. > > > What crypto library is used ? I assume since Areca is written in Java > it is just using the JCE but I'd like this confirmed. > By looking at the source code of areca. It is using javax.crypto.* which means JCE (Java Cryptographic Extension) framework. In com.application.areca.impl.EncryptionConfiguration.java import javax.crypto.Cipher; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; And the code follows standard coding standard of javadoc http://java.sun.com/javase/6/docs/api/javax/crypto/Cipher.html > > > * Files permissions and symbolic links backup. (Linux only) > > Why is this Linux only ? I think the author means (unix only), since Solaris is not as popular as Linux today. He is just willing to support Windows and Linux, but as he mentioned in "http://sourceforge.net/projects/areca/" project page, it is developed with OS independent language (Java). I have also searched code of this project, the author is using Java common API to get file permission, user and group message for Unix system. > To me this is not acceptable, this makes it totally useless for > Solaris backup if it can't do a simple thing like this. It is not a system wide backup tool, it could be suitable for a file or a folder from which user want to backup his movie/file/data. It is widely used and quite active, I usually get over 20 emails per week from it's discussion group. Linux people can use it to backup and restore their files and people keep asking questions for this project. > > What about ACLs on UFS and ZFS ? > What about extended attribute files (ZFS and UFS) ? > What about system attribute files (ZFS only) ? It's not supported, except file permission, user and group on Unix. I think the reason is Linux platform does not have ZFS. It works well on personal backup but may not suitable for system backup. > > For this to be included in Solaris it needs to be actually useful as a > Backup program that means it needs to be able to actually backup the > content we can create on Solaris without loss. Without support for > file permissions, links, ACLs and extended attributes I can not > approve of this case being integrated into Solaris - particularly > since the bundled tar & cpio archivers already support that. > > Does this work with NDMP ? It does not support NDMP. Regards, David -------------- next part -------------- A non-text attachment was scrubbed... Name: David_Zhang.vcf Type: text/x-vcard Size: 114 bytes Desc: not available URL: <http://mail.opensolaris.org/pipermail/opensolaris-arc/attachments/20081105/b1bf42be/attachment.vcf>