lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 24 Aug 2006 13:17:22 -0500
From:	Michael Halcrow <mhalcrow@...ibm.com>
To:	akpm@...l.org
Cc:	mhalcrow@...ibm.com, linux-kernel@...r.kernel.org
Subject: [PATCH 0/4] eCryptfs: Public key support

This first two patches in this patch set introduce public key support
into the eCryptfs kernel module shipping in 2.6.18-rc4-mm2. The last
two patches clean up the flag manipulation code and resolve a compiler
warning.

The userspace code that supports the public key mode of operation is
available in the file labeled
``ecryptfs-util-2.6.18-rc4-mm2++.tar.bz2'':

http://sourceforge.net/project/showfiles.php?group_id=133988&package_id=149785

Notice that the version numbers are incremented; the userspace tools
must be upgraded when running with this patch set. Follow the file
migration instructions in the NOTES section of
Documentation/ecryptfs.txt.

On open of an existing encrypted file, eCryptfs reads the public key
packet from the file header and sends a decrypt request packet via
netlink to the user's daemon. If the file is being created, eCryptfs
sends an encrypt request. The daemon processes the request through the
pluggable PKI module associated with the public key involved in the
request.

For those who wish to try out eCryptfs on older kernels, we are also
keeping backports of eCryptfs in packages under the ``ecryptfs-full''
release section:

http://sourceforge.net/project/showfiles.php?group_id=133988&package_id=198555

Mike
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ