All of lore.kernel.org
 help / color / mirror / Atom feed
From: Hans Reiser <reiser@namesys.com>
To: John Gilmore <jgilmore@glycou.com>
Cc: reiserfs-list@namesys.com
Subject: Re: Encryption/Compression and meta data (like file names)
Date: Mon, 13 Mar 2006 22:29:59 -0800	[thread overview]
Message-ID: <441662E7.3010003@namesys.com> (raw)
In-Reply-To: <200603131341.11327.jgilmore@glycou.com>

Instead of answering your questions as asked, let me explain what it does.

It encrypts the file data.  It makes some effort at avoiding
watermarking attacks by use of an initialization vector, but this effort
is not robust in that file size is not encryptable without an
unacceptable cost in space utilization (to encrypt file size you must
store each of the files with a random amount of padding proportional to
the size of the largest file stored), and for that reason we do not
encrypt file size.  Edward, do you do some minor (and not crypto-secure)
amount of padding?  (I think he does.)

It does not encrypt the filenames.

I believe that if you want to encrypt file size you really want a deeply
different approach.

The problem with not encrypting file size is that you can figure out
whether someone is storing, say, the linux kernel, in their home
directory, by looking at file sizes, and if for every file in the tree
you have a match in file size, you can be pretty sure the linux kernel
is what it is.

So, our encryption is useful for protecting data whose contents are
unique, like your personal accounting, and not useful for data that are
widely known and stored in a tree of many files, like the linux kernel.

Now that I have answered the questions you did not ask, could you repeat
your email to me with the questions that you still want me to answer?

Future work for future reiser4's: multi-file compression and encryption
based on encrypting and compressing (enlarged) nodes not files. 
Alternately, compressing and encrypting whole directories rather than
files.  Note how if files are 100 bytes, you are motivated to make
compression be implemented using multiple files if you want good
compression.

Hans

John Gilmore wrote:

>I seem to recall several people saying that the compression/encryption plugins 
>will only encrypt items, and not the filesystems metadata. And then saying 
>that this might be useless for their purposes, because being able to see the 
>filename might be enough for the attacker.
>
>However, I don't think that is correct. The only thing visible to an attacker 
>would be the tree structure, not the item, which contains the directory 
>information including the filenames.
>
>So at most an attacker would be able to browse the tree structure, and see the 
>keys used and the size of the item pointed to. If this is true, selection of 
>a good hash should entirely prevent the giving information away problem, 
>leaving only useless key->size->location data for an attacker.
>
>Is my understanding correct?
>
>
>  
>


  reply	other threads:[~2006-03-14  6:29 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-03-13 20:41 Encryption/Compression and meta data (like file names) John Gilmore
2006-03-14  6:29 ` Hans Reiser [this message]
2006-03-14 13:56   ` Edward Shishkin
2006-03-15  7:22     ` Hans Reiser
2006-03-16 12:21       ` Edward Shishkin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=441662E7.3010003@namesys.com \
    --to=reiser@namesys.com \
    --cc=jgilmore@glycou.com \
    --cc=reiserfs-list@namesys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.