Announcement

Collapse
No announcement yet.

Encryption Support For EXT4

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • jaxxed
    replied
    It's a great step, and ext4 is probably a good place to start.

    It seems to me that encryption in a file system is easy to do. We have plenty of libs to handle encryption, and any filesystem that has built in configurable compression already has a pipeline to handle encryption libraries.

    But there are plenty of difficulties:

    1. We're talking about an important attack vector, so it has to be done correctly, which requires the right experience and knowledge;
    2. How to provide correct credentials to a low-level system, that works securely in both server and desktops environments (think both boot time and runtime, cross platform)
    3. There are many ways to configure encryption, and many ways to configure a fs, so any approach has to be able to handle varied approaches.

    I think that there are many people who have wanted to get into integrating encryption into their fs development, but beside it being relatively easy to do, it's easy to get wrong, that it's a really big task.

    These first steps are great to see, but we should probably think of this as one of those "write one to throw away" things that we can use to start the whole process.

    The questions I have are:
    - do file systems work in similar enough manners that encryption approaches can be shared?

    Leave a comment:


  • bitman
    replied
    Originally posted by not.sure View Post
    Perhaps there are scenarios where you just want to encrypt a couple of directories? And not deal with the hassles of FDE? And keep a system bootable and working with basic functionality even if the user forgets the password? Like.. dunno.. a phone?
    And how do you imagine that? Maybe encrypted user data partition/directory? And how would that be accessed if running apps need it immediately? Maybe entering pin/password on boot? Oh wait, if we have to do that then might as well encrypt everything. The only scenario where user might want to have only some folders encrypted on phone is to stash some stuff that is not used often. But then again encrypted file container is just fine and this ext4 encryption would be over-engineering. So its still useless.

    Leave a comment:


  • reub2000
    replied
    Originally posted by not.sure View Post
    Perhaps there are scenarios where you just want to encrypt a couple of directories?
    Will this do that? It could be useful to only decrypt folders with sensitive information when the information is accessed to protect them in the case a laptop is stolen while it's turned on.

    Leave a comment:


  • DeepDayze
    replied
    Encryption should be available and easy to get set up in order for honest folks to keep their sensitive information protected from prying eyes of hackers and even NSA. Why should the government regulate encryption? There's enough bogus reasons out there and easy to ram a truck through!

    Leave a comment:


  • DeepDayze
    replied
    Originally posted by darkbasic View Post
    I'm tired having to use hundreds of layers on top of layers: native encryption is welcome
    True native filesystem encryption would be a real godsend, and I can picture just having a flag in fstab something like "encrypt" to indicate a filesystem entry is an encrypted filesystem. Also to make an encrypted filesystem would be to merely type something like:

    Code:
    # mkfs.ext4 -j -encrypt /dev/sda3
    and the command ask for a passphrase to use as the "key" for the encryption. Filesystem encryption would then be dead simple.

    Leave a comment:


  • Luke
    replied
    We need default encryption in the wild ahead of any key escrow law

    The front page of the Washington Post today had cops and FBI whining about not being able to get into locked iPhones and proposing key escrow. The Post speculated that the Snowden case would make key escrow legislation impossible to pass. They also suggested key disclosure laws (rubber hose decryption), though those have run into constitutional issued in US courts. It looks like the FBI's strategy is to have a key escrow proposal waiting to go and then wait for any serious crime or terrorism incident they can plausably blame on encryption, then press for the bill. We need to beat them to the punch.

    The best insurance against key esroiw in the futue is to have installable Android images with default high security encryption circulating over the Internet as soon as possible and reaching servers out of the reach of governments that might want to regulate encryption. I speak as someone who has sucessfully used disk encryption on a desktop to defeat a police search warrant aimed at protesters. I do not at this time use any smartphone as I do not trust the carriers not to do things like deploy keyloggers against encryption. This could be prevented by having an image that cuts power to the baseband radio until after the encrypted disks are unlocked and blocking all carrier-pushed updates to anything.

    Needless to say, I would refuse to comply with a key disclosure law, following the example of British anti-vivisection protesters who defied a key disclosure (UK law allows these) and got away with it. One of the most important reasons for encryption is to lock out police seeking to muzzle political dissent and "plumbers" sent by politicians to punish whisteblowers.

    Leave a comment:


  • liam
    replied
    Originally posted by bitman View Post
    Doesnt sound like partition would not be fully encrypted, but more like parts of metadata + data. Given that makes me wonder why would anyone want to use it when there is LUKS with everything encrypted. Google can keep it..
    I don't care if the NSA reads my gaming scores, but I want my brilliant plan to topple zipper monopoly yk encrypted.

    Leave a comment:


  • jacob
    replied
    Originally posted by Redi44 View Post
    Would be more useful if it was developed for BTRFS...
    I wonder how specific it really is to EXT4. Couldn't it be made generic at the VFS and/or block layers?
    As for BTRFS what I would really love to see would be encryption for specific subvolumes or even directories.

    Leave a comment:


  • reavertm
    replied
    Originally posted by Modu View Post
    Btrfs does support encryption but native one.
    https://btrfs.wiki.kernel.org/index...._encryption.3F

    You shouldn't say IIRC about the info that can be easily reached IMO
    So BTRFS doesn't support encryption.
    (no, disk/file-level encryption doesn't count - he was asking about filesystem-level encryption)

    Leave a comment:


  • caligula
    replied
    Originally posted by not.sure View Post
    Perhaps there are scenarios where you just want to encrypt a couple of directories? And not deal with the hassles of FDE? And keep a system bootable and working with basic functionality even if the user forgets the password? Like.. dunno.. a phone?
    It could work like openwrt. Read only root for restore and read-write user partition.

    Leave a comment:

Working...
X