Open nbittmann opened 7 years ago
To the OP - Please think about using a different encryption tool. A recent audit found encfs to be insecure. More info on this is at https://defuse.ca/audits/encfs.htm .
That audit is 3 years old, so who knows how relevant it is these days, and it didn't have any actual exploit in it.
But let's take a look at the issues it raises:
Same key used for encryption and authentication. It lists both the security impact and exploitability as low. Authentication isn't something EncFS should really be in charge of - logging in to the system itself takes care of that. Irrelevant.
Stream cipher used to encrypt last file block. It lists exploitability as unknown and impact as high. Why? It gives a link to a reference that is no longer available, so I have no idea what that's about. It also complains that something it does with regards to this is "non-standard" and suggests to remove it completely and do something "more standard" instead. Being non-standard isn't a security issue in and of itself.
Generating block IV by XORing block number. It lists exploitability as low and impact as medium. This one seems fair enough, but still, exploitability is low. The solution it proposes was also quickly shot down, so there seems like there's not much to do.
File holes are not authenticated. Exploitability and impact are both listed as medium. I would consider them both low personally, but it depends on how you're using EncFS in the first place. Using it from an amazon cloud drive makes this virtually impossible to exploit.
64-bit MACs. Exploitability listed as low, and impact as medium. This one I would say is valid and relevant, and exploitability should probably be higher than "low". I hope this has changed in the 3 years since this audit was done.
Editing configuration file disables MACs. Exploitability listed as high, impact as medium. As long as you don't store your encfs configfile on the Amazon Drive, I wouldn't consider this something to worry about.
In the end, there was one thing that worries me in using encfs on Amazon Drive, but which I expect has been fixed in the last 3 years, and one thing I didn't fully understand, because the link supposed to explain it wasn't working.
Hi,
Apologies for the wall of text, I hope this is readable enough. I just wanted to reply some of the points you have raised in your previous message.
TL;DR: The most concerning issue this audit raised seems to be 2.
IMO, and I don't know if that's been fixed yet. Basically, 2.
is all about the use of DIY crypto algorithms, which definitely should not be used - unless you are a crypto expert on par with authors of stuff like AES or Twofish (see long version for more). In any case, I believe that encfs should fix all of the issues pointed out in that audit and re-check their approach to cryptography throughout the codebase to ensure they are up to standard with modern crypto practices.
Long version:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break. It's not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis. And the only way to prove that is to subject the algorithm to years of analysis by the best cryptographers around.
Basically unless you are a crypto expert, you should be picking something pre-designed by crypto experts.
Personally I'm using either FDE (although I'm a bit more nervous now that I've read the You Don't Want XTS article linked in the audit), or the default rclone
encryption settings (for cloud backups), or the archive-based default AES encryption of 7zip
's 7z
format.
I was bitten in the back once by file-based encryption of my home directory, but if I ever needed to use something like that, I would probably test out eCryptFS
as it seems to be a decent alternative to encfs
.
Thanks, your explanation was very enlightening :)
Hi there,
I've got a slight issue with the setup on my Mac and I'm unsure what's causing this:
I've mounted my amazon drive with encfs for encryption but after the first upload via cp or rsync the connection breaks and df -h reports 0bytes because the drive connection is lost
This is my current environment
I run the following commands to mount the drives:
And once the connection drops I get the following output I removed most of the first lines to make the output shorter since there is no actual useful info:
EDIT:
Copying without encfs gives me the same issue so it seems to be something odd with acd_cli
My goal is not to have a local copy of the file and rather upload directly
Any suggestions appreciated