Ext4 encryption
Ext4 encryption
Posted Apr 9, 2015 7:07 UTC (Thu) by bunch (subscriber, #18522)Parent article: Ext4 encryption
Since blocks are deciphered before hitting the FS layer, it could use the same mechanism (temporary disk buffers) as Ext4 encryption.
Posted Apr 9, 2015 12:44 UTC (Thu)
by felixfix (subscriber, #242)
[Link]
I am just brainstorming, no idea of what I am talking about. Please be gentle :-)
Posted Apr 9, 2015 13:41 UTC (Thu)
by msnitzer (subscriber, #57232)
[Link] (12 responses)
Posted Apr 9, 2015 15:49 UTC (Thu)
by pr1268 (guest, #24648)
[Link] (6 responses)
Are you suggesting that the Android folks ignored your (presumably serviceable and efficient) DM-Crypt code and decided to write their own? I'm not trying to ruffle feathers here; I'm sincerely curious why a community of developers would go out and re-invent the wheel. Kinda like how we're up to 1500 programming languages—because whoever wrote the Nth programming language did so because the other N-1 were "broken". Sigh. Or... <CONSPIRACY THEORY>Your DM code lacks a back door.</CONSPIRACY THEORY> (hint, hint!) Perhaps I'm comparing apples and oranges with the programming languages analogy, but my jaded attitude towards the plethora of languages is real.
Posted Apr 9, 2015 16:08 UTC (Thu)
by msnitzer (subscriber, #57232)
[Link] (1 responses)
I'm not convinced there isn't a way to make dm-crypt work perfectly well for andoid's needs -- but that is purely my naive position considering I'm uninformed about their motivations/requirements. Posted May 27, 2015 5:37 UTC (Wed)
by geofft (subscriber, #59789)
[Link] (3 responses)
dm-crypt is very good at what it does, but what it does is necessarily incomplete by the nature of the problem. There are (limited) use cases for unauthenticated disk encryption, and dm-crypt is great for those, but if you can do authenticated encryption, you should. It's sorta like unsalted, unstretched passwords: SHA-512 is a fantastic hash function, but using it as a password storage scheme makes for a bad password storage scheme.
I see your conspiracy theory and raise you "The NSA is sending shills into comment sections to complain about people writing good cryptosystems instead of reusing the bad cryptosystems they already know how to break."
Posted May 27, 2015 16:10 UTC (Wed)
by flussence (guest, #85566)
[Link] (1 responses)
Posted Jun 22, 2015 17:09 UTC (Mon)
by luto (guest, #39314)
[Link]
Posted May 27, 2015 18:26 UTC (Wed)
by kmeyer (subscriber, #50720)
[Link]
Ext4's new encryption mode, as described, is equally unauthenticated -- it is not designed to be resilient against covert modifications to the ciphertext.
Posted Apr 10, 2015 21:57 UTC (Fri)
by mhalcrow (guest, #17371)
[Link]
Down the road, I do think we'll be able to implement authenticated encryption more easily than a dm layer mechanism will, because we've got existing transactional facilities to give us consistency between the crypto metadata and the ciphertext, and we expect to get per-block metadata support from Mingming when it's ready. I've got a roadmap for that, but we're taking this one step at a time and doing unauthenticated crypto first.
Once we start talking about managing additional per-block metadata with transactional semantics, we're pretty far into "file system" territory. With that extra data, we'll need to make some decisions around I/O patterns, memory usage, and so forth. The file system is the best place to manage that sort of complexity.
If you've got a single-user laptop that's subject to being left in a taxi, FDE like dm-crypt makes a lot of sense.
If it's more complicated than the single-user laptop story, you often need to jump through hoops to make it work with FDE. Pushing a key into the keyring and setting a policy on a directory for an existing file system vastly simplifies many scenarios. Multi-user environments such as Android, Chrome OS, and Cloud servers are targets for encryption that can be selectively enabled and managed on shared live mounted file systems with multiple users.
Posted Apr 12, 2015 5:46 UTC (Sun)
by hobarrera (guest, #101888)
[Link] (2 responses)
Posted Apr 14, 2015 17:38 UTC (Tue)
by chloe_zen (guest, #8258)
[Link] (1 responses)
Posted Jun 26, 2015 12:44 UTC (Fri)
by yoshi314 (guest, #36190)
[Link]
Posted Jun 22, 2015 16:18 UTC (Mon)
by mirabilos (subscriber, #84359)
[Link]
Now that’s… puzzling.
They have different use cases of course: a per-file nonce instead of a per-block nonce, and differing keys, which is kinda neat, but I’d actually expect dmcrypt to perform *better*.
Posted Apr 9, 2015 18:25 UTC (Thu)
by job (guest, #670)
[Link] (1 responses)
Corbet's articles are usually much more enlightening. How about a follow up article, with a little more details?
Posted Apr 10, 2015 22:00 UTC (Fri)
by mhalcrow (guest, #17371)
[Link]
Posted Apr 12, 2015 5:45 UTC (Sun)
by tytso (subscriber, #9993)
[Link]
There are two major advantages of doing encryption in at the file system level.
1) We don't have to worry about encrypted and unencrypted pages hanging around in the page cache. We do need to use bounce pages on the writepage path, but they get released right after the I/O is complete. This is a bit harder to handle with ecryptfs because it uses a stacking file system paradigm.
2) We can use multiple keys so that each user and/or work profile can be encrypted with a single key. This is something you can't do with dm-crypt, and it's important if you want to be able to flexibly share space between multiple users who are mutually suspicious with each other. In the chrome OS case, the user who is logged in can send a request to a root daemon for more disk space (if free disk space is running low), and the root daemon can delete files from that cache directory of some other user who is currently not logged in.
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption
Ext4 encryption