Re: Hi

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2003-02-19 at 14:54, Juan Quintela wrote (re encryption):
> If you do it at the filesystem layer you:
> a- leave the filesystem structure (i.e. names) unencrypted

Why would you want to do that? It's not really an invariant property of
encryption-capable file systems, surely? You can crypt the names if you
want to.

> b- you just don't care if you are not able to recover things at fsck
>    time :(

Likewise. It might be decreed that file sizes and directory tree
structure are an acceptable leak of information and hence you can have a
fsck which just doesn't grok either filenames, permissions or data -- or
you might decide that's not an acceptable leak, and require the key in
order to fsck it. You need the key in order to fsck a file system on an
encrypted block device _anyway_, right?

> c- you are really clever and finds a way to encrypt all the filesystem
>    and recovering from a crash

Parse error.

> Apart from that, doing it at the block layer should be much, much
> easier :)

Filesystems are hard. Let's go shopping :)

Doing redundancy at the block layer is much much easier too. That
doesn't necessarily make it not suck when a raid rebuild is pointlessly
copying blocks which aren't actually _referenced_ by the file system,
because it doesn't have the knowledge about the layout that the file
system does.

-- 
dwmw2
--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
FAQ:           http://kernelnewbies.org/faq/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux