lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1428012659-12709-1-git-send-email-tytso@mit.edu>
Date:	Thu,  2 Apr 2015 18:10:37 -0400
From:	Theodore Ts'o <tytso@....edu>
To:	Ext4 Developers List <linux-ext4@...r.kernel.org>
Cc:	jaegeuk@...nel.org, mhalcrow@...gle.com,
	Theodore Ts'o <tytso@....edu>
Subject: [PATCH 00/22] ext4 encryption patches

Android userspace code to use ext4 encryption have been checked into
the public AOSP branch.  If all goes well, this feature will hopefully
(my fingers are crossed, but obviously nothing is guaranteed at this
point) be included in the 'M' release of Android.

Currently all of the changes are in fs/ext4 but I've been talking to
Jaegeuk about adopting the same same interfaces (which is essentially
just two ioctl's to set the encryption policy and to get the
per-file-system 'salt' for passwords) for f2fs.

As a result, it may be that some of the functions in
fs/ext4/crypto_*.c will end up getting refactored and moved into some
fs/*.c so that f2fs can use it as well.  But I'd like to get the basic
feature into the kernel tree (marked as experimental initially) and
then do more polishing from there.

There is a design document here.  It should hopefully be mostly up to
date, but there are a few things that we might end up changing (for
example, just using CTS all the time for protecting directory file
names).

https://docs.google.com/document/d/1IsyQ9DU1gA6NUqS0jF4ni_NTvv-b0HfCkRk47Zkd7W0

						- Ted

Michael Halcrow (13):
  ext4 crypto: export ext4_empty_dir()
  ext4 crypto: add encryption xattr support
  ext4 crypto: add encryption policy checking
  ext4 crypto: add ext4 encryption facilities
  ext4 crypto: add encryption key management facilities
  ext4 crypto: inherit encryption policies on inode and directory create
  ext4 crypto: implement the ext4 encryption write path
  ext4 crypto: implement the ext4 decryption read path
  ext4 crypto: filename encryption facilities
  ext4 crypto: insert encrypted filenames into a leaf directory block
  ext4 crypto: partial update to namei.c for fname crypto
  ext4 crypto: filename encryption modifications
  ext4 crypto: enable filename encryption

Theodore Ts'o (9):
  ext4: add ext4_mpage_readpages()
  ext4: reserve codepoints used by the ext4 encryption feature
  ext4 crypto: add ext4 encryption Kconfig
  ext4 crypto: add ioctl to set encryption policy
  ext4 crypto: validate context consistency on lookup
  ext4: teach ext4_htree_store_dirent() to store decrypted filenames
  ext4 crypto: Add symlink encryption
  ext4 crypto: enable encryption feature flag
  ext4 crypto: add password salt support

 fs/ext4/Kconfig         |  20 ++
 fs/ext4/Makefile        |   4 +-
 fs/ext4/crypto.c        | 601 ++++++++++++++++++++++++++++++++++
 fs/ext4/crypto_fname.c  | 831 ++++++++++++++++++++++++++++++++++++++++++++++++
 fs/ext4/crypto_key.c    | 170 ++++++++++
 fs/ext4/crypto_policy.c | 186 +++++++++++
 fs/ext4/dir.c           |  98 +++++-
 fs/ext4/ext4.h          | 153 ++++++++-
 fs/ext4/ext4_crypto.h   | 140 ++++++++
 fs/ext4/extents.c       |   6 +
 fs/ext4/file.c          |  22 +-
 fs/ext4/ialloc.c        |  28 +-
 fs/ext4/inline.c        |  17 +-
 fs/ext4/inode.c         | 127 +++++++-
 fs/ext4/ioctl.c         |  69 ++++
 fs/ext4/namei.c         | 567 +++++++++++++++++++++++++++++----
 fs/ext4/page-io.c       |  46 ++-
 fs/ext4/readpage.c      | 321 +++++++++++++++++++
 fs/ext4/super.c         |  31 +-
 fs/ext4/symlink.c       | 104 +++++-
 fs/ext4/xattr.h         |   3 +
 21 files changed, 3431 insertions(+), 113 deletions(-)
 create mode 100644 fs/ext4/crypto.c
 create mode 100644 fs/ext4/crypto_fname.c
 create mode 100644 fs/ext4/crypto_key.c
 create mode 100644 fs/ext4/crypto_policy.c
 create mode 100644 fs/ext4/ext4_crypto.h
 create mode 100644 fs/ext4/readpage.c

-- 
2.3.0

--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ