linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Idea behind EXT4_IOC_GET_ENCRYPTION_PWSALT?
@ 2016-11-29 21:30 Richard Weinberger
  2016-11-30  0:44 ` Joe Richey
  0 siblings, 1 reply; 3+ messages in thread
From: Richard Weinberger @ 2016-11-29 21:30 UTC (permalink / raw)
  To: linux-fsdevel
  Cc: linux-kernel@vger.kernel.org, Ext4 Developers List, mhalcrow,
	tytso, muslukhovi, David Gstir

Hi!

As the subject states, I'm a bit confused wrt. EXT4_IOC_GET_ENCRYPTION_PWSALT.
Will common fscrypt userspace depend on it?

IIUC you want to store some salt to seed the user password.
But what if /home/rw and /home/dags have different keys? Is it okay
to use the same salt for both keys?
Or is it an ad-hoc solution to allow an encrypted filesystem root
because you need a way to store the seed on the same filesystem but not as
file since all files are encrypted?
Wouldn't a xattr stored in the filesystem root directory also do it?

Long story short, I'm not sure whether we really need this ioctl command
in UBIFS and what the designated semantics are. :-)

Thanks,
//richard

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Idea behind EXT4_IOC_GET_ENCRYPTION_PWSALT?
  2016-11-29 21:30 Idea behind EXT4_IOC_GET_ENCRYPTION_PWSALT? Richard Weinberger
@ 2016-11-30  0:44 ` Joe Richey
  2016-11-30  8:29   ` Richard Weinberger
  0 siblings, 1 reply; 3+ messages in thread
From: Joe Richey @ 2016-11-30  0:44 UTC (permalink / raw)
  To: Richard Weinberger
  Cc: linux-fsdevel, linux-kernel@vger.kernel.org, Ext4 Developers List,
	Michael Halcrow, Theodore Ts'o, muslukhovi, David Gstir

[-- Attachment #1: Type: text/plain, Size: 1484 bytes --]

Richard,

Our current design for fscrypt (tentative name for the userspace
filesystem encryption manager) does not use the global filesystem salt
(EXT4_IOC_GET_ENCRYPTION_PWSALT), we are planning on having a
different salt for each password used in the system. We are using
planning on using Argon2id as the password stretching algorithm, so
we'll have costs for memory, time, and parallelism stored for each
password as well as a salt.

I can't speak to other uses of the ioctl.

Joe


On Tue, Nov 29, 2016 at 1:30 PM, Richard Weinberger <richard@nod.at> wrote:
> Hi!
>
> As the subject states, I'm a bit confused wrt. EXT4_IOC_GET_ENCRYPTION_PWSALT.
> Will common fscrypt userspace depend on it?
>
> IIUC you want to store some salt to seed the user password.
> But what if /home/rw and /home/dags have different keys? Is it okay
> to use the same salt for both keys?
> Or is it an ad-hoc solution to allow an encrypted filesystem root
> because you need a way to store the seed on the same filesystem but not as
> file since all files are encrypted?
> Wouldn't a xattr stored in the filesystem root directory also do it?
>
> Long story short, I'm not sure whether we really need this ioctl command
> in UBIFS and what the designated semantics are. :-)
>
> Thanks,
> //richard
> --
> To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 4849 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Idea behind EXT4_IOC_GET_ENCRYPTION_PWSALT?
  2016-11-30  0:44 ` Joe Richey
@ 2016-11-30  8:29   ` Richard Weinberger
  0 siblings, 0 replies; 3+ messages in thread
From: Richard Weinberger @ 2016-11-30  8:29 UTC (permalink / raw)
  To: Joe Richey
  Cc: linux-fsdevel, linux-kernel@vger.kernel.org, Ext4 Developers List,
	Michael Halcrow, Theodore Ts'o, muslukhovi, David Gstir

Joe,

On 30.11.2016 01:44, Joe Richey wrote:
> Richard,
> 
> Our current design for fscrypt (tentative name for the userspace
> filesystem encryption manager) does not use the global filesystem salt
> (EXT4_IOC_GET_ENCRYPTION_PWSALT), we are planning on having a
> different salt for each password used in the system. We are using
> planning on using Argon2id as the password stretching algorithm, so
> we'll have costs for memory, time, and parallelism stored for each
> password as well as a salt.


Makes sense.
So, for now I'll not implement this ioctl command in UBIFS.

Thanks,
//richard


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2016-11-30  8:29 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-29 21:30 Idea behind EXT4_IOC_GET_ENCRYPTION_PWSALT? Richard Weinberger
2016-11-30  0:44 ` Joe Richey
2016-11-30  8:29   ` Richard Weinberger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).