Hacker News new | past | comments | ask | show | jobs | submit login
GoCryptFS: encrypting FUSE filesystem in Go (github.com/rfjakob)
19 points by api on Jan 5, 2016 | hide | past | favorite | 1 comment



I wrote a competing implementation (I wasn't aware of gocryptfs before) at https://github.com/netheril96/securefs. Many points are similar: for example, a random file ID, 4KiB blocks encrypted with AES-GCM mixed with the ID and block number, sparse file support. The major difference is

* The directory structure. GoCryptFS goes the easy route of encrypting filenames, while mine has its own directory implementation independent of the underlying filesystem. Mine is theoretically safer as it never reuses the IV, but the safety margin is probably so slim that it doesn't matter in practice.

* In addition to authenticating each blocks individually, mine has a HMAC that authenticates the concatenation of all block level IVs and GHASHs. It prevents the attack where replacing a block with its past revision does not show up as invalid.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: