linux-raid.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Molle Bestefich <molle.bestefich@gmail.com>
To: vinnakota chaitanya <chaitanyaa_v@yahoo.com>
Cc: linux-raid@vger.kernel.org
Subject: Re: Implementing Encryption and Decryption in Raid Device Driver.
Date: Thu, 15 Sep 2005 11:44:32 +0000	[thread overview]
Message-ID: <62b0912f0509150444122d95c6@mail.gmail.com> (raw)
In-Reply-To: <20050915073118.61198.qmail@web54703.mail.yahoo.com>

vinnakota chaitanya wrote:
> Molle Bestefich wrote:
> > Use loop-aes, it's absolutely fabulous.
> > 
> > It works great with 2.4 as well as 2.6.
> > 
> > Instructions here.
> > http://loop-aes.sourceforge.net/loop-AES.README
> 
> Thanks for the suggestion. 
> Now I've the following two issues:
> 
> 1. The target device is fat filesystem formatted. The
> target kernel image do not contain the fat filesystem
> module. The target device [ i.e. /dev/md0 ]   is
> mounted by the host through USB interface. Hence, in
> this case the host's fat filesystem code is used.
> 	Will loop-aes work in this situation.

Loop-aes functions as a loop device.  It reads and writes encrypted
data to/from either a file or a block device such as /dev/md0 in your
case.  In the other end it gives you a block device, we'll call it
/dev/loop0, from which you can read/write your unencrypted data.

Loop-aes does not care which filesystems you stick on /dev/loop0, and
it does not care whether your kernel happens to be able to understand
and mount those filesystems.

I'm curious.  How does your "target device" export the /dev/loop0 to
the "host device" through USB?


> 2. We were asked to use blow_fish algorithm instead.
> So, how to go about it, are there any modules like
> loop-aes or should I  consider the hooks
>  raid5_make_request and raid5_end_read_request 
> for encryption and decryption

I would without a doubt spare myself the trouble and just use
loop-aes.  As I've said, it's great.

But feel free to implement your own solution.  I can't give any
recommendations on how.  You might want to check out twofish, in which
Mr. Schneier et al has fixed "a security problem" of some sort.  Not
sure which.  Presumably Wikipedia or Google knows.

  reply	other threads:[~2005-09-15 11:44 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-09-14  5:14 Implementing Encryption and Decryption in Raid Device Driver vinnakota chaitanya
2005-09-14  8:04 ` Luca Berra
2005-09-14 10:16   ` vinnakota chaitanya
2005-09-14 19:37     ` Molle Bestefich
2005-09-15  7:31       ` vinnakota chaitanya
2005-09-15 11:44         ` Molle Bestefich [this message]
2005-09-20 23:52         ` Molle Bestefich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=62b0912f0509150444122d95c6@mail.gmail.com \
    --to=molle.bestefich@gmail.com \
    --cc=chaitanyaa_v@yahoo.com \
    --cc=linux-raid@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).