Re: Proposal for keying encrypted filesystem

2003-04-06 Thread Valdis . Kletnieks
On Sun, 06 Apr 2003 21:14:36 EDT, Pierre Abbat [EMAIL PROTECTED] said: The tape monkey might could overwrite an encrypted file on disk with random gibberish. The problem we started discussing was that a backup system needs *read* access to something isomorphic(*) to your data in order to

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Pierre Abbat
On Friday 04 April 2003 09:01, [EMAIL PROTECTED] wrote: On Thu, 03 Apr 2003 18:22:11 EST, Pierre Abbat [EMAIL PROTECTED] said: What's LSM? This sounds like it can do what I want with rsync. Is it possible to add a new key token to init and have it propagate to all processes? If that's

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Valdis . Kletnieks
On Fri, 04 Apr 2003 09:30:29 EST, Pierre Abbat [EMAIL PROTECTED] said: But I'd also like to be able to have several encrypted directories on one partition, with different keys, such that when I give the key any process with the right UID can access them. I might have a cron job that needs

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Pierre Abbat
On Friday 04 April 2003 09:47, [EMAIL PROTECTED] wrote: Properly applied, you can even leverage it further - for instance, if your backup process doesn't have the key tokens, you can safely let it have access to all the files - it can read the 127 meg of data to back it up in a bitwise manner,

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Edward Shushkin
[EMAIL PROTECTED] wrote: On Fri, 04 Apr 2003 09:30:29 EST, Pierre Abbat [EMAIL PROTECTED] said: But I'd also like to be able to have several encrypted directories on one partition, with different keys, such that when I give the key any process with the right UID can access them. I

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Edward Shushkin
Pierre Abbat wrote: On Friday 04 April 2003 09:47, [EMAIL PROTECTED] wrote: Properly applied, you can even leverage it further - for instance, if your backup process doesn't have the key tokens, you can safely let it have access to all the files - it can read the 127 meg of data to back

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Valdis . Kletnieks
On Fri, 04 Apr 2003 20:36:49 +0400, Edward Shushkin said: Pierre Abbat wrote: On Friday 04 April 2003 09:47, [EMAIL PROTECTED] wrote: If a process that has no key tokens attempts to read an encrypted file with the ordinary syscalls, does it get an error or the ciphertext? Error.

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Hans Reiser
Edward Shushkin wrote: [EMAIL PROTECTED] wrote: On Fri, 04 Apr 2003 09:30:29 EST, Pierre Abbat [EMAIL PROTECTED] said: But I'd also like to be able to have several encrypted directories on one partition, with different keys, such that when I give the key any process with the right UID

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Edward Shushkin
Hans Reiser wrote: Edward Shushkin wrote: [EMAIL PROTECTED] wrote: On Fri, 04 Apr 2003 09:30:29 EST, Pierre Abbat [EMAIL PROTECTED] said: But I'd also like to be able to have several encrypted directories on one partition, with different keys, such that when I give the key any

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Hans Reiser
Edward Shushkin wrote: Hans Reiser wrote: Edward Shushkin wrote: [EMAIL PROTECTED] wrote: On Fri, 04 Apr 2003 09:30:29 EST, Pierre Abbat [EMAIL PROTECTED] said: But I'd also like to be able to have several encrypted directories on one partition, with different keys,

Re: Proposal for keying encrypted filesystem

2003-04-04 Thread Pierre Abbat
On Friday 04 April 2003 13:45, Hans Reiser wrote: Edward Shushkin wrote: On the other hand, on the last seminar we made a conclusion to check key validness in oredr to avoid a possible security hole when read() first looks for uptodate (decrypted!) pages in memory before reading encrypted

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Edward Shushkin
Hendrik Visage wrote: On Mon, Mar 31, 2003 at 05:58:04PM +0400, Edward Shushkin wrote: I didn't invent something new.. I don't understand what should withstand scrutiny from crypto gurus.. md5? SHA? The keying implementation as proposed. I agree, but keying implementation is not ready,

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Hans Reiser
Edward Shushkin wrote: Hendrik Visage wrote: On Mon, Mar 31, 2003 at 05:58:04PM +0400, Edward Shushkin wrote: I didn't invent something new.. I don't understand what should withstand scrutiny from crypto gurus.. md5? SHA? The keying implementation as proposed. I agree, but

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Anders Widman
My policy is that user hassle should be minimal, and we should try to select at least one default key management set of utilities to integrate well with and test with. Are you sure we should not get keys from the environment? Is there too much performance cost? It would be best if people

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Hans Reiser
Anders Widman wrote: My policy is that user hassle should be minimal, and we should try to select at least one default key management set of utilities to integrate well with and test with. Are you sure we should not get keys from the environment? Is there too much performance cost?

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Pierre Abbat
On Tuesday 01 April 2003 11:21, Hans Reiser wrote: I think it is essential to the task that apps not be aware of keys. Indeed. The reiser4-specific syscall should insert or delete a key into the database; to open a file you use the generic open() syscall, which passes the filename to reiser4,

Re: Proposal for keying encrypted filesystem

2003-04-01 Thread Hans Reiser
Pierre Abbat wrote: On Tuesday 01 April 2003 11:21, Hans Reiser wrote: I think it is essential to the task that apps not be aware of keys. Indeed. The reiser4-specific syscall should insert or delete a key into the database; why? to open a file you use the generic open() syscall, which

Re: Proposal for keying encrypted filesystem

2003-03-30 Thread Pierre Abbat
On Sunday 30 March 2003 05:12, Hendrik Visage wrote: In this whole discussion I'm still missing some references to research papers on this technique, as it still sounds to me like security by obscurity. I didn't find this in research papers. I thought of it in the bathtub. The credential