Bug#505008: Patch Bug#505008: ecryptfs-utils

2008-11-17 Thread Dustin Kirkland
On Thu, 2008-11-13 at 23:23 +0900, Osamu Aoki wrote: > Encryption key has 128 bit strength since it is generated from > /dev/urandom and there is no established script to go over them to check > if one possible key is the one used for encryption. This makes it > practically impossible to try to ru

Bug#505008: Patch Bug#505008: ecryptfs-utils

2008-11-13 Thread Osamu Aoki
Hi, Thanks for providing interesting package and accepting good part of my proposal. For the record... I agree that if you chose good password, your eCrypted folder is safe. But how often do we have such good one :) Encryption key has 128 bit strength since it is generated from /dev/urandom and

Bug#505008: Patch Bug#505008: ecryptfs-utils

2008-11-12 Thread Dustin Kirkland
On Tue, 2008-11-11 at 01:15 +0900, Osamu Aoki wrote: > Unless you wish to use PAM, I see no advantage to use login passphrase > to wrap encryption keys. I think that really beat the purpose of this > kernel module in terms of security of data after PC is stolen. I disagree that it defeats the pur

Bug#505008: Patch Bug#505008: ecryptfs-utils

2008-11-10 Thread Osamu Aoki
Package: ecryptfs-utils Version: 64-3 tags 505008 patch Followup-For: Bug #505008 Unless you wish to use PAM, I see no advantage to use login passphrase to wrap encryption keys. I think that really beat the purpose of this kernel module in terms of security of data after PC is stolen. This can b

Bug#505008: Patch Bug#505008: ecryptfs-utils: ecryptfs-mount-private may not be as secure as it may look

2008-11-10 Thread Osamu Aoki
Hi, As for -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]