Re: Changing salt value

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2015-02-11 13:50:08, Sylvain Pelissier wrote:
> Thank you for you answer. It makes sense to have the salt value in the
> same file as the wrraped key because has soon has the salt value is
> lost then the key can not be unwrapped any more. Did you plan to keep
> the same syntax:
> 
> satl=<salt value>
> 
> At the end or begining of the wrapped-passphrase file ? This could
> help to detect the version of the wrapping tool used.

I thought about doing that but it doesn't match the current syntax of
the wrapped-passphrase file.

I think we'll have to do something a little different and introduce
versioning into the file. Stay tuned.

Tyler

> 
> On 10 February 2015 at 23:44, Tyler Hicks <tyhicks@xxxxxxxxxxxxx> wrote:
> > On 2015-02-10 10:04:07, Sylvain Pelissier wrote:
> >>  Hi,
> >>
> >> I am trying to change the default salt value used by ecryptfs-utils to
> >> wrapped the encryption key stored in
> >> "/home/.ecryptfs/user/.ecryptfs/wrapped-passphrase". I'm using Ubuntu
> >> 14.04 with the complete home folder encryption. I created a file
> >> .ecryptfsrc in the unencrypted home folder of the user which contains:
> >>
> >> salt=04ae48987b177f01
> >>
> >> Then I wrap the passphrase key with the tool
> >> ecryptfs-unwrap-passphrase, I noticed that the result has changed and
> >> thus I think it uses the new salt value. However, when I replace the
> >> file /home/.ecryptfs/user/.ecryptfs/wrapped-passphrase with the new
> >> one, then when I log with the user credential I have the error telling
> >> that the key is not in the kernel keyring.
> >> Did I miss something ?
> >
> > Hi Slyvain - Using the .ecryptfsrc file with the encrypted home tools
> > (ecryptfs-setup-private, ecryptfs-wrap-passphrase,
> > ecryptfs-unwrap-passphrase, mount.ecryptfs_private, etc.,) is not
> > recommended.
> >
> > I recognize that ecryptfs_read_salt_hex_from_rc() is called from most of
> > those tools. However, I think that those call sites are incorrect in
> > doing so and I'd like to eventually remove those calls.
> >
> > There is an unfortunate difference of usage and configuration in the
> > mount.ecryptfs helper and the mount.ecryptfs_private helper. The
> > .ecryptfsrc file is something that *should* be specific to the
> > mount.ecryptfs mount helper so attempting to specify a salt in that file
> > would be incorrect for the mount.ecryptfs_private helper.
> >
> > That means that there is currently not a way to specify a non-default
> > salt value for use with the encrypted home tools.
> >
> > Dustin and I have been discussing this today. The current plan is that
> > we will implement a "version 2" of the wrapped-passphrase file. It will
> > contain a randomly generated salt value. Storing the salt outside of the
> > wrapped-passphrase file, such as in the .ecryptfsrc, would greatly
> > increase the chance that a user may migrate their wrapped-passphrase
> > file to another machine (for example, while upgrading to a new laptop)
> > but forget to migrate their .ecryptfsrc file. We want to include the
> > salt value in the wrapped-passphrase file to reduce the chances of data
> > loss those types of situations.
> >
> > Additionally, the ecryptfs_unwrap_passphrase() function will be modified
> > to automatically migrate salt-less, "version 1" wrapped-passphrase files
> > to the new "version 2" format and the file will be rewrapped with the
> > new key. By doing this migration in ecryptfs_unwrap_passphrase(), it
> > means that users will only need to log in through PAM and the
> > pam_ecryptfs module will be able to trigger the migration.
> >
> > We're working on this now. Thanks for bring this issue to our attention.
> >
> > Tyler
> --
> To unsubscribe from this list: send the line "unsubscribe ecryptfs" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

Attachment: signature.asc
Description: Digital signature


[Index of Archives]     [Linux Crypto]     [Device Mapper Crypto]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux