From: "Austin S. Hemmelgarn" <ahferroin7@gmail.com>
To: linux-btrfs <linux-btrfs@vger.kernel.org>
Subject: Re: snapshots of encrypted directories?
Date: Mon, 18 Sep 2017 07:45:18 -0400 [thread overview]
Message-ID: <6100b72b-db9c-43c5-cb3f-a2b9d4a00b57@gmail.com> (raw)
In-Reply-To: <20170915194126.GF32347@rus.uni-stuttgart.de>
On 2017-09-15 15:41, Ulli Horlacher wrote:
> On Fri 2017-09-15 (13:16), Austin S. Hemmelgarn wrote:
>
>>>> And then mount enryptfs:
>>>>
>>>> mount.ecryptfs /<MOUNTPOINT_ENCRYPTED> /<MOUNTPOINT_DECRYPTED>
>>>
>>> This only possible by root.
>>> For a user it is not possible to have access for his own snapshots.
>>> Bad.
>>
>> Which is why you use EncFS (which is a FUSE module that runs in
>> userspace and requires no root privileges) instead of eCryptFS (which is
>> a kernel assisted filesystem that doesn't use FUSE, has more complicated
>> setup constraints, and requires CAP_SYS_ADMIN or root access).
>
> I use both, encfs and ecryptfs, for different use cases.
> I use ecryptfs on my notebooks for $HOME, which has some kind of
> automounter on login (via pam).
> This setup is not possible with encfs, which is also much slower and has
> a lower security level.
Actually it is, it's just not trivially easy like with eCryptFS. the
pam_script module can be used to perform auto-mounting on login as well.
>
> But even for encfs it is very circumstantial for a user to have access to
> snapshots.
> It's still a case where it's a problem of the combined usage of the two,
and it's not likely to get fixed by either. In theory, it should be
possible to have some hook added that handles mounting the snapshots
when one is taken and when the user logs in, but that isn't the job of
BTRFS at all (filesystems are supposed to not care about what's using
them), and I don't see it as likely that EncFS or eCryptFS will add
support either (they can't reliably watch for snapshot creation, so they
would have to add snapshot support and force you to go through them).
Overall, you're likely to be better off arguing for BTRFS native support
for the VFS encryption API (that is, F2FS and ext4 style native per-file
encryption).
next prev parent reply other threads:[~2017-09-18 11:45 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-09-14 14:57 snapshots of encrypted directories? Ulli Horlacher
2017-09-14 15:32 ` Hugo Mills
2017-09-15 3:45 ` Andrei Borzenkov
2017-09-15 10:01 ` Ulli Horlacher
2017-09-15 10:15 ` Peter Becker
2017-09-15 16:28 ` Ulli Horlacher
2017-09-15 17:16 ` Austin S. Hemmelgarn
2017-09-15 19:41 ` Ulli Horlacher
2017-09-18 11:45 ` Austin S. Hemmelgarn [this message]
2017-09-19 18:22 ` Dave
2017-09-15 12:35 ` Austin S. Hemmelgarn
2017-09-15 17:25 ` Andrei Borzenkov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=6100b72b-db9c-43c5-cb3f-a2b9d4a00b57@gmail.com \
--to=ahferroin7@gmail.com \
--cc=linux-btrfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).