Re: Ext4 Encryption design document

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12 Mar 14:42 2015, Theodore Ts'o <tytso@xxxxxxx> wrote:
> Per our discussions this morning, here is the ext4 encryption design
>document
> 
> 
>https://docs.google.com/document/d/1ft26lUQyuSpiu6VleP70_npaWdRfXFoNnB8JYn
>ykNTg/edit?usp=sharing


A few comments on this design:

Protector Format
> Format			Currently 0
> Contents Encryption mode	0 = AES-256-XTS
> Name encryption mode		0 = AES-256-CBC

It would be better to keep "0" for "unused" or "invalid", and make the
first assigned
value be 1 for all of these fields.  That avoids the problem if this
structure is used
uninitialized for some reason (software bug, bad read from disk, memory
clobbered, etc)
and it picks the wrong encryption algorithm.

Is there enough room to add another 4 bytes of padding before the master
key descriptor,
so that it and the following nonce are aligned on an 8-byte boundary and
the struct size
is a nice power-of-two value, and there is a bit more room for future
expansion (e.g.
number of key descriptors)?

In the future, if there are multiple keys attached to a file, how will
they be stored?
Will there be an array of key descriptors in this xattr?  Using multiple
xattrs seems
wasteful.  Even if this is not being implemented in the first version, it
makes sense
to understand what needs to be done to avoid the need for on-disk format
change later.

Encryption Policy
> struct ext4_encryption_policy {
>       char version;
>       char contents_encryption_mode;
>       char filenames_encryption_mode;
>       char master_key_descriptor[8];
> } __attribute__((__packed__));

One byte of padding in there?  The xattr itself will be stored 4-byte
aligned on disk,
so leaving out the one byte in the middle of the struct is not saving any
space.

Background on EXT4 Directories
> A filename consists of a string of one or more ASCII characters.

That isn't really true.  A filename is a string of one or more characters
in some
user-defined encoding, with the only restriction that the characters '/'
and '\0' are
not permissible.  Many users use ext4 with non-ASCII character sets w/o
problems.

It is great if the output is only ASCII printable characters, but that may
be difficult
to do if the filename length is required to be the same as the input name
length
(e.g. there are ~253 possible single-character non-ASCII filenames, but
only about 96
printable ASCII characters, so these would always result in collisions if
the filename
length needs to stay the same).  Is my assumption about the output name
length wrong?

In further reading, it seems like the encoded output filename would be
expanded,
and could be as long as 255 * 4/3 = 340 characters, which will exceed
f_namelen.
I'd imagine that the dcache can handle that, but are there problems if
f_namelen
is shorter than the returned name, or conversely if f_namelen is increased
but it
isn't possible to create a filename that long?

Cheers, Andreas
-- 
Andreas Dilger

Lustre Software Architect
Intel High Performance Data Division


--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Reiser Filesystem Development]     [Ceph FS]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite National Park]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]     [Linux Media]

  Powered by Linux