From: Jason Burrell <jburrell@crl.com>
To: “Douglas R. Floyd” <dfloyd@io.com>
Message Hash: 7f227bcf005e5fb3f9a76c573bf543b517c52645aff3fd0dff3b6da17f69aa1b
Message ID: <Pine.SUN.3.91.960828042422.29651A-100000@crl.crl.com>
Reply To: <199608280536.AAA01510@xanadu.io.com>
UTC Datetime: 1996-08-28 14:29:41 UTC
Raw Date: Wed, 28 Aug 1996 22:29:41 +0800
From: Jason Burrell <jburrell@crl.com>
Date: Wed, 28 Aug 1996 22:29:41 +0800
To: "Douglas R. Floyd" <dfloyd@io.com>
Subject: Re: File System Encryption
In-Reply-To: <199608280536.AAA01510@xanadu.io.com>
Message-ID: <Pine.SUN.3.91.960828042422.29651A-100000@crl.crl.com>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, 28 Aug 1996, Douglas R. Floyd wrote:
> > I may have to consider this approach. I'll have to look into Ian's system.
> > Does it pass muster with the crypto gods? (that's meant as a compliment
> > guys :)
>
> It uses IDEA in a decently secure manner, as well as TDES. You can also
> mount .au files as filesystems, and the data will be hidden in the sound
> file.
>
> (Last place I remember Ian's loop.c and des patches for Linux was on
> ftp.csua.berkeley.edu, /pub/cypherpunks/<somewhere>)
>
ftp.csua.berkeley.edu:/pub/cypherpunks/filesystems/linux.
I haven't looked through the code very hard yet, but I do wonder how the
passphrase and such is stored. If I run losetup and setup
/root/stego_file.au as a filesystem on /dev/loop0, does that get stored
anywhere that isn't secure from non-root processes, or that is kept after
the filesystem is unmounted? I figure the passphrase definately is removed
as soon as the filesystem is unmounted, and that this is stored in
protected kernel memory.
Return to August 1996
Return to “The Drifter <drifter@c2.net>”