| Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1 | eCryptfs: A stacked cryptographic filesystem for Linux | 
|  | 2 |  | 
|  | 3 | eCryptfs is free software. Please see the file COPYING for details. | 
|  | 4 | For documentation, please see the files in the doc/ subdirectory.  For | 
|  | 5 | building and installation instructions please see the INSTALL file. | 
|  | 6 |  | 
|  | 7 | Maintainer: Phillip Hellewell | 
|  | 8 | Lead developer: Michael A. Halcrow <mhalcrow@us.ibm.com> | 
|  | 9 | Developers: Michael C. Thompson | 
|  | 10 | Kent Yoder | 
|  | 11 | Web Site: http://ecryptfs.sf.net | 
|  | 12 |  | 
|  | 13 | This software is currently undergoing development. Make sure to | 
|  | 14 | maintain a backup copy of any data you write into eCryptfs. | 
|  | 15 |  | 
|  | 16 | eCryptfs requires the userspace tools downloadable from the | 
|  | 17 | SourceForge site: | 
|  | 18 |  | 
|  | 19 | http://sourceforge.net/projects/ecryptfs/ | 
|  | 20 |  | 
|  | 21 | Userspace requirements include: | 
|  | 22 | - David Howells' userspace keyring headers and libraries (version | 
|  | 23 | 1.0 or higher), obtainable from | 
|  | 24 | http://people.redhat.com/~dhowells/keyutils/ | 
|  | 25 | - Libgcrypt | 
|  | 26 |  | 
|  | 27 |  | 
|  | 28 | NOTES | 
|  | 29 |  | 
|  | 30 | In the beta/experimental releases of eCryptfs, when you upgrade | 
|  | 31 | eCryptfs, you should copy the files to an unencrypted location and | 
|  | 32 | then copy the files back into the new eCryptfs mount to migrate the | 
|  | 33 | files. | 
|  | 34 |  | 
|  | 35 |  | 
|  | 36 | MOUNT-WIDE PASSPHRASE | 
|  | 37 |  | 
|  | 38 | Create a new directory into which eCryptfs will write its encrypted | 
|  | 39 | files (i.e., /root/crypt).  Then, create the mount point directory | 
|  | 40 | (i.e., /mnt/crypt).  Now it's time to mount eCryptfs: | 
|  | 41 |  | 
|  | 42 | mount -t ecryptfs /root/crypt /mnt/crypt | 
|  | 43 |  | 
|  | 44 | You should be prompted for a passphrase and a salt (the salt may be | 
|  | 45 | blank). | 
|  | 46 |  | 
|  | 47 | Try writing a new file: | 
|  | 48 |  | 
|  | 49 | echo "Hello, World" > /mnt/crypt/hello.txt | 
|  | 50 |  | 
|  | 51 | The operation will complete.  Notice that there is a new file in | 
|  | 52 | /root/crypt that is at least 12288 bytes in size (depending on your | 
|  | 53 | host page size).  This is the encrypted underlying file for what you | 
|  | 54 | just wrote.  To test reading, from start to finish, you need to clear | 
|  | 55 | the user session keyring: | 
|  | 56 |  | 
|  | 57 | keyctl clear @u | 
|  | 58 |  | 
|  | 59 | Then umount /mnt/crypt and mount again per the instructions given | 
|  | 60 | above. | 
|  | 61 |  | 
|  | 62 | cat /mnt/crypt/hello.txt | 
|  | 63 |  | 
|  | 64 |  | 
|  | 65 | NOTES | 
|  | 66 |  | 
|  | 67 | eCryptfs version 0.1 should only be mounted on (1) empty directories | 
|  | 68 | or (2) directories containing files only created by eCryptfs. If you | 
|  | 69 | mount a directory that has pre-existing files not created by eCryptfs, | 
|  | 70 | then behavior is undefined. Do not run eCryptfs in higher verbosity | 
|  | 71 | levels unless you are doing so for the sole purpose of debugging or | 
|  | 72 | development, since secret values will be written out to the system log | 
|  | 73 | in that case. | 
|  | 74 |  | 
|  | 75 |  | 
|  | 76 | Mike Halcrow | 
|  | 77 | mhalcrow@us.ibm.com |