<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fscrypt.git, branch sshd-bug-workaround</title>
<subtitle>Go tool for managing Linux filesystem encryption
</subtitle>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/'/>
<entry>
<title>debug</title>
<updated>2021-12-21T19:01:00+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-21T16:29:35+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=56ef606f664f11ea2fc1788f726265e5db5fa791'/>
<id>56ef606f664f11ea2fc1788f726265e5db5fa791</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>[BROKEN] pam_fscrypt: save unlocked protector keys in root user keyring</title>
<updated>2021-12-21T19:00:58+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T17:14:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=dce50d2a55525ec1309fd60a3c240d243d5f7145'/>
<id>dce50d2a55525ec1309fd60a3c240d243d5f7145</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #332 from ebiggers/skip-irrelevant-filesystems</title>
<updated>2021-12-20T17:28:26+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T17:28:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=9a8ce15408edae0c92128fd36f50dafa81013266'/>
<id>9a8ce15408edae0c92128fd36f50dafa81013266</id>
<content type='text'>
filesystem: avoid accessing irrelevant filesystems</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
filesystem: avoid accessing irrelevant filesystems</pre>
</div>
</content>
</entry>
<entry>
<title>filesystem: avoid accessing irrelevant filesystems</title>
<updated>2021-12-20T16:24:15+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T04:17:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=d0b9e2c995beb13c70a1549923df482ff773f09b'/>
<id>d0b9e2c995beb13c70a1549923df482ff773f09b</id>
<content type='text'>
Forbid 'fscrypt setup' on filesystems that aren't expected to support
encryption (other than the root filesystem), and skip looking for
fscrypt metadata directories on such filesystems.  This has two
benefits.  First, it avoids the printing of annoying warnings like:

	pam_fscrypt[75038]: stat /run/user/0/.fscrypt: permission denied
	pam_fscrypt[75038]: stat /run/user/0/.fscrypt/policies: permission denied
	pam_fscrypt[75038]: stat /run/user/0/.fscrypt/protectors: permission denied
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt: invalid argument
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt/policies: invalid argument
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt/protectors: invalid argument
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt: permission denied
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt/policies: permission denied
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt/protectors: permission denied

Second, it avoids long delays or side effects on some filesystems.

To do this, introduce an allowlist of filesystem types that fscrypt will
recognize.  I wanted to avoid doing this, since this list will need to
be updated in the future, but I don't see a better solution.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Forbid 'fscrypt setup' on filesystems that aren't expected to support
encryption (other than the root filesystem), and skip looking for
fscrypt metadata directories on such filesystems.  This has two
benefits.  First, it avoids the printing of annoying warnings like:

	pam_fscrypt[75038]: stat /run/user/0/.fscrypt: permission denied
	pam_fscrypt[75038]: stat /run/user/0/.fscrypt/policies: permission denied
	pam_fscrypt[75038]: stat /run/user/0/.fscrypt/protectors: permission denied
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt: invalid argument
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt/policies: invalid argument
	pam_fscrypt[75038]: stat /sys/firmware/efi/efivars/.fscrypt/protectors: invalid argument
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt: permission denied
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt/policies: permission denied
	pam_fscrypt[75038]: stat /sys/fs/pstore/.fscrypt/protectors: permission denied

Second, it avoids long delays or side effects on some filesystems.

To do this, introduce an allowlist of filesystem types that fscrypt will
recognize.  I wanted to avoid doing this, since this list will need to
be updated in the future, but I don't see a better solution.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #331 from ebiggers/login-protector-perms</title>
<updated>2021-12-20T15:54:40+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T15:54:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=1014b61a6a054b5c82b2be82e13d8ce28befba45'/>
<id>1014b61a6a054b5c82b2be82e13d8ce28befba45</id>
<content type='text'>
Set owner of login protectors to correct user</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Set owner of login protectors to correct user</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #329 from ebiggers/doc-ssh-issue</title>
<updated>2021-12-20T15:41:55+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T15:41:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=8d89ece7371d95a91cf66de5f30120dde3aed385'/>
<id>8d89ece7371d95a91cf66de5f30120dde3aed385</id>
<content type='text'>
README: document issue with ssh ChallengeResponseAuthentication</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
README: document issue with ssh ChallengeResponseAuthentication</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #330 from google/avoid-warning</title>
<updated>2021-12-20T15:40:35+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T15:40:35+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=dd4a9738c6d66a7e4d9ab31527f8eb54ba621b19'/>
<id>dd4a9738c6d66a7e4d9ab31527f8eb54ba621b19</id>
<content type='text'>
pam: avoid compiler warning in copyIntoSecret()</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
pam: avoid compiler warning in copyIntoSecret()</pre>
</div>
</content>
</entry>
<entry>
<title>Set owner of login protectors to correct user</title>
<updated>2021-12-20T03:44:59+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T03:19:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=4c7c6631cc5a27cc6b4431f5ad3805a2d624c5f5'/>
<id>4c7c6631cc5a27cc6b4431f5ad3805a2d624c5f5</id>
<content type='text'>
When the root user creates a login protector for a non-root user, make
sure to chown() the protector file to make it owned by the user.
Without this, the protector cannot be updated by the user, which causes
it to get out of sync if the user changes their login passphrase.

Fixes https://github.com/google/fscrypt/issues/319
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When the root user creates a login protector for a non-root user, make
sure to chown() the protector file to make it owned by the user.
Without this, the protector cannot be updated by the user, which causes
it to get out of sync if the user changes their login passphrase.

Fixes https://github.com/google/fscrypt/issues/319
</pre>
</div>
</content>
</entry>
<entry>
<title>pam: avoid compiler warning in copyIntoSecret()</title>
<updated>2021-12-20T03:43:34+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T03:20:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=546dd336d15251981bb8bcb30c159d0a39bb387e'/>
<id>546dd336d15251981bb8bcb30c159d0a39bb387e</id>
<content type='text'>
gcc 11 enabled -Wmaybe-uninitialized by default.  It causes a
false-positive warning in copyIntoSecret() because gcc doesn't
understand that mlock() is special and doesn't read from the memory.

Just initialize the memory to avoid this warning.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
gcc 11 enabled -Wmaybe-uninitialized by default.  It causes a
false-positive warning in copyIntoSecret() because gcc doesn't
understand that mlock() is special and doesn't read from the memory.

Just initialize the memory to avoid this warning.
</pre>
</div>
</content>
</entry>
<entry>
<title>README: document issue with ssh ChallengeResponseAuthentication</title>
<updated>2021-12-20T02:41:39+00:00</updated>
<author>
<name>Eric Biggers</name>
<email>ebiggers@google.com</email>
</author>
<published>2021-12-20T02:39:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.hodgden.net/cgit.cgi/fscrypt.git/commit/?id=c7e3ce28b23017cfcc11a38fee888163d4e8d715'/>
<id>c7e3ce28b23017cfcc11a38fee888163d4e8d715</id>
<content type='text'>
Update https://github.com/google/fscrypt/issues/321
Update https://github.com/google/fscrypt/issues/324
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Update https://github.com/google/fscrypt/issues/321
Update https://github.com/google/fscrypt/issues/324
</pre>
</div>
</content>
</entry>
</feed>
