Re: Luks Encrypting on 'mini' filesystems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I seem to remember that PGP/GPG also allows you to encrypt for 
multiple recipients. i.e. multiple keys.

Arno


On Fri, Oct 31, 2008 at 09:20:21PM +0000, Struan Bartlett wrote:
> 
> Hi,
> 
> I've been using cryptsetup/luks to manage encrypted LVM partitions for a 
> while now and must say it's very impressive.
> 
> The reason for my email is that I've been looking for an encryption 
> system for a slightly different purpose though: encrypting individual 
> files for storage to Amazon S3. I realise Amazon S3 naturally encrypts 
> all stored data but the keys are generated by Amazon, so that isn't 
> really satisfactory. Stored data is not hidden from Amazon staff or 
> whosoever obliges Amazon to release their keys.
> 
> Obviously there's lots of tools for encrypting individual files, but 
> what luks (uniquely?) offers is the ability to assign multiple passwords 
> and change passwords easily when the need arises. If - to use luks 
> terminology - one could split the luks header/key-slots from the bulk 
> data and store them separately, this facility would be especially 
> valuable for encrypting Amazon S3 files. This is because it would allow 
> passwords to be modified without having to retrieve and restore the bulk 
> data file, only the changed header/key-slots file. This is especially 
> important with S3 as Amazon only allows entire files to be uploaded or 
> downloaded, and bandwidth is charged for. If a file is large, or if 
> there are lots of files, downloading, re-encrypting and uploading each 
> can be very expensive.
> 
> I've been looking at using luks for this purpose, using the following 
> approach:
> 
> # dd if=/dev/zero of=file.luks bs=1 count=<filesize>
> # losetup /dev/loop0 file.luks
> # cryptsetup luksFormat /dev/loop0
> # cryptsetup luksOpen /dev/loop0 myfilemap
> # dd if=<file> of=/dev/mapper/myfilemap
> # cryptsetup luksClose myfilemap
> # losetup -d /dev/loop0
> # dd if=file.luks of=file.luks.header bs=512 count=1032
> # dd if=file.luks of=file.luks.data bs=512 skip=1032
> 
> Finally, file.luks.header and file.luks.data can be uploaded to Amazon. 
> I also have tested that it is possible to modify passwords in the 
> file.luks.header directly e.g.
> 
> # losetup /dev/loop0 file.luks.header
> # cryptsetup luksDump /dev/loop0
> # cryptsetup luksAddKey /dev/loop0
> # cryptsetup luksDelKey /dev/loop0 <n>
> # losetup -d /dev/loop0
> 
> And when the header and data files are subsequently concatenated, one 
> can regain access to the data.
> 
> # cat file.luks.header file.luks.data >file.luks.new
> 
> Does anyone have any opinions about the sanity of this approach? Is 
> there a better tool or approach I'm missing? I would be very grateful 
> for any feedback.
> 
> Kind regards,
> 
> Struan Bartlett
> Head of IT
> 
> -- 
> ____________________________________
> Struan Bartlett
> NewsNow Publishing Limited
> http://www.NewsNow.co.uk
> Tel: +44 (0)845 838 8890
> Fax: +44 (0)834 838 8898
> ____________________________________
> Internet Press Cuttings &
> Real-time News
> 
> >Corporate press alerts
> >Competitor awareness
> >Market awareness
> >Tailored news for web sites
> >Intranet newsfeeds
> ____________________________________
> 
> 
> 
> ---------------------------------------------------------------------
> dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
> To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
> For additional commands, e-mail: dm-crypt-help@xxxxxxxx
> 

-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux