lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 7 Aug 2017 22:50:13 -0700
From:   Eric Biggers <ebiggers3@...il.com>
To:     Dai Xiang <xiangx.dai@...el.com>
Cc:     Theodore Ts'o <tytso@....edu>, linux-ext4@...r.kernel.org
Subject: Re: How to enable CONFIG_EXT4_ENCRYPTION

On Tue, Aug 08, 2017 at 09:27:38AM +0800, Dai Xiang wrote:
> > 
> > Actually, this is one of the tests in the "encrypt" group, which format the
> > scratch device with "-O encrypt".  So I believe the printed message is correct.
> > Are you 100% sure that CONFIG_EXT4_ENCRYPTION is enabled in your kernel config
> > and that you are running the correct kernel?
> 
> I use v4.13-rc3 kernerl, and i find this info refer to https://wiki.archlinux.org/index.php/ext4#Using_file-based_encryption:
> 
> Ext4 forbids encrypting the root (/) directory and will produce an error on kernel 4.13 and later
> 
> Does it impact?
> 

No, the tests do not try to encrypt the root directory.  Can you please double
check that the kernel you're testing actually has CONFIG_EXT4_ENCRYPTION
enabled?

Eric

Powered by blists - more mailing lists