Re: Isn't it time for the encrypted file system???

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 2006-03-25 at 10:38 -0500, Christopher Blizzard wrote:
> David Zeuthen wrote:
> > (btw, for FC6 and GNOME 2.16 I hope to have a very simple formatting /
> > partitioning tool for drives which will include setting up LUKS
> > partitions - and it won't do silly things like requiring the root
> > password (in the default install; will be configurable) for at least
> > removable and hotpluggable media. Of course I can't promise to have this
> > done for FC6 as I presently do most of this in my spare time...)
> 
> Is there any chance that we can come up with something that doesn't 
> require something that's block-level and requires repartitioning?  The 
> migration path pretty much sucks if we don't try for something else.

I think Jeremy's point about using block level encryption on real disks
for anything but removable / hotplugable devices makes sense. I also
don't think we want to encrypt the entire home directory, that would
suck for e.g. compiles of software

Filevault on Mac OS X is also interesting

 http://www.apple.com/macosx/features/filevault/

So.. I've been toying with the idea of just using a loopback mount on
$HOME/Documents;

 - The crypto bits are just store in $HOME/.encrypted-documents-image

 - Loopback mount said file on /dev/loop5 (or whatever)

 - when logging in, setup crypto using cryptsetup so the clear image
   is /dev/mapper/foo

 - if there is no fs on /dev/mapper/foo (/sbin/volume_id can tell us)
   format /dev/mapper/foo to be an ext3 file system

 - Mount /dev/mapper/foo at $HOME/Documents on login

 - Teach the file chooser / Nautilus about it
   - emblems
   - patch file chooser to warn if saving outside $HOME/Documents,
     maybe apps can set a property on the FileChooser object to
     disable this warning

 - Might want to move and symlink .gconf, .gnome2, .gnome2_private,
   whatever into $HOME/Documents

Issues

 - Will probably require a system-level D-BUS service to do the heavy
   lifting; that's fine; D-BUS is the way to allow privileged operations
   to desktop processes in a secure way. And with the glib bindings it's
   not too difficult to do...

 - Not sure how to make the image grow when running out of space; maybe
   that requires some kernel bits; kernel guys?

 - Issues on NFS / shared homedir - but this is true on any attempt to
   do encrypted homedir

 - Issues with data migration if user already has something in 
   $HOME/Documents - maybe just move it to the new encrypted target

 - Clearly this (and any attempt to do encrypted home directories) needs
   Single Sign On so we can recover the encryption key easily when the
   user authorizes as part of the login process - it's equivalent to our
   desire of unlocking the GNOME keyring, see

    https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125682

   for details.

It's all about trade-off's I think ; I'm not sure we can please everyone
but I think this is a good compromise. 

So.. if you are crazy you may even use the same technique of of loopback
mounting the image on $HOME but I don't think it's acceptable to encrypt
the entire home directory. Or maybe it is... It really depends on what
we want to do... Maybe some user interaction guys like clarkbw or seth
should sit down and work out what user experience we want before we
discuss technical implementation details... 

Anyho.. before we can do anything we also need to solve bug #125682.. I
think many people will agree with me that it's annoying enough as is
with having to manually unlock the keyring everytime one wants to use
VPN or mount encrypted removable storage :-)

    David



[Index of Archives]     [Fedora Users]     [Fedora Development]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]

  Powered by Linux