On Fri, May 05, 2006 at 12:05:37PM +0300, Alon Bar-Lev wrote: > I think that current security and encryption solutions that come out > these days without a proper smart card support create a false sense > of security for users. So solutions should first be designed so that > a smart card can be used, and only then provide a passphrase > alternative. As detailed in my OLS papers, the whole purpose of eCryptfs, in the long run, is to provide a means for users to get away from having to use passphrases alone to protect their data. > This is the first time I've looked on the user mode keyutils, and it > looks quite good. I think that the eCryptfs should use it more > ?correctly? so that keys stored on smart card may be used. The 0.1 release of eCryptfs provides passphrase-only support in order to minimize the code complexity for the initial adoption into the Linux kernel. As you have noticed, the framework is easily extensible to provide more advanced key management features. We are nearly finished with the 0.2 release design document, and we have a team scheduled to work on the more advanced key management features this summer. > For PKCS#11 the providers listed in the conf file, key may > be stored as a data object, and data may be: > cipher:slot-type:slot:application:label:PIN > Where: > slot-type > slot - slot id > name - slot name > label - token label > > ?Calling without a PIN may allow prompt for dialog > via a named pipe to a running daemon by uid? I have been the maintainer of the openCryptoki package (an Open Source PKCS#11 implementation) for the last year; utilization of openCryptoki is one of the things we have in mind for eCryptfs. Our design for the 0.2 release includes an interface for allowing keys to be managed via various services, implemented by plugins. For instance, a one plugin could link against libopencryptoki.so and use PKCS#11 tokens to manage the keys. Another plugin could link against libgpgme.so and use GnuPG to manage the keys. Another plugin could link against libssl.so and use direct OpenSSL crypto calls to manage the keys. Another plugin could link against libtspi.so and use a TPM module to manage the keys. Packets in the header of each file will be processed with specific modules (identifiers for these modules and the keys in the modules will be in the header). We have plans to implement userspace components to accomplish all of this at file open: - Kernel eCryptfs module reads the encrypted file encryption key and the module/key identifier from the header. - Kernel module sends a message to a userspace daemon (question: is netlink, relayfs, or some other mechanism best for this task?). - The daemon links against libecryptfs, which did a dlopen on the plugins in a place like /usr/lib/ecryptfs/ when it launched. - Then we defer the request to decrypt the file encryption key to the module specified in the message that was originally sent to the daemon. - The daemon relays the decrypted file encryption key back to eCryptfs in the kernel, and eCryptfs associates that key with the crypt_stat for the inode, continuing with the page read/write operations that follow. > Another issue is a multi user access without a shared secret. This > may be done by encrypting the symmetric key in several asymmetric > ones. This is exactly the sort of functionality that eCryptfs is designed to support. > Again this can be done in user mode... But there is a need to > support reencrypting the whole filesystem with a new symmetric key > so that a user may be removed from the list. Yes, key revocation will necessarily require the re-encryption of all of the data, which is of limited use if the user whose key is revoked had access to all of the encrypted data in the first place before the revocation (he could have simply made a copy of it all). Given the stated goal of eCryptfs to protect data-at-rest from compromise in the event of the loss or theft of the storage device, I cannot think of many use case scenarios where key revocation will be a requirement. I would expect that a key revocation event would entail revocation of access to the encrypted data too. > If you like, I will be happy to help you with the user mode stuff, > and implement the smart card access. Thanks for your suggestions; it seems that we are not thinking too differently in terms of what needs to happen to provide more advanced key management features. In the meantime, we would like to get the simple passphrase-only version of eCryptfs upstream, and then we will be working on implementing these more advanced features this summer. I will let you know when we have completed the 0.2 design document. In the meantime, if you have a desire to implement some of the features (in userspace) you describe, please join the ecryptfs-devel list and discuss the plans with our team, so that there is no wasted or duplicated effort: https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel Thanks, Mike Halcrow
Attachment:
signature.asc
Description: Digital signature
- References:
- [PATCH 0/12: eCryptfs] eCryptfs version 0.1.6
- From: Phillip Hellewell <[email protected]>
- Re: [PATCH 0/12: eCryptfs] eCryptfs version 0.1.6
- From: Alon Bar-Lev <[email protected]>
- [PATCH 0/12: eCryptfs] eCryptfs version 0.1.6
- Prev by Date: Re: Remove silly messages from input layer.
- Next by Date: [PATCH] docs: update sparse.txt with CHECK_ENDIAN
- Previous by thread: Re: [PATCH 0/12: eCryptfs] eCryptfs version 0.1.6
- Next by thread: USB 2.0 ehci failure with large amount of RAM (4GB) on x86_64
- Index(es):