Hi Agustin,

actually doj has created a PR some time ago, see
https://github.com/vgough/encfs/pull/664 . Maybe you can post your
concerns there and not just in our bug db?

TBH I am hopping to switch to the Rust reimplementation when it's
finished (@Valient: I hope that this rust branch is more than just a toy
project... could you confirm? Do you need help, assistance?). Maybe all
that all this security issues talk would become obsolete as well.
And the responsibility for fuse handling would be moved to the fuse_mt
crate.

Best regards,
Eduard.

* Agustin Martin [Mon, Dec 08 2025, 11:29:45PM]:
> On Sun, Nov 16, 2025 at 11:33:26PM +0100, Agustin Martin wrote:
> > On Mon, Oct 07, 2024 at 12:20:01PM +0200, [email protected] wrote:
> > > Package: encfs
> > > Version: 1.9.5-2
> > > Severity: normal
> > > 
> > > Dear Maintainer,
> > ...
> > > Please migrate your package to the fuse3 library, which is actively
> > > maintained. It would be great if we could remove fuse 2.x in the
> > > forky development cycle.
> ...
> > Hi, Chris and Eduard,
> > 
> > While the first part is trivial the second one is not that trivial.
> > 
> > I have noticed that this was reported upstream back in 2018, so I am tagging
> > this bug report as forwarded.
> > 
> > Unfortunately, upstream has declared encfs as unmaintained. Dirk Jagdmann
> > (doj) suggested fuse3 related commits and opened a pull request for this 
> > 
> > https://github.com/vgough/encfs/pull/664
> > 
> > He has a repo at
> > 
> > https://github.com/doj/encfs.git
> > 
> > which he maintains as an encfs fork, do not know if personal or for general
> > use. According to its README.md it is intended to support fuse3 library and
> > OpenSSL 3.
> 
> Hi,
> 
> I have been testing some of the commits there and, while at a first glance
> things seemed to work, further inspection shows some weird things that makes
> me discourage its use. Together with the reported encfs security issues seems
> more clear that unless something changes encfs will go away with fuse2.
> 
> I am showing some of the problems I noticed.
> 
> $ mkdir -p .crypto/ target/
> $ encfs `pwd`/.crypto `pwd`/target
> $ touch target/00-HI-ENCRYPTED
> 
> ## --- Using official Debian 1.9.5-3 encfs Debian package ---
> $ ls -la target/
> total 8
> drwxrwsr-x 2 myuser myuser 4096 dic  3 17:43 .
> drwxrwsr-x 4 myuser myuser 4096 dic  3 18:19 ..
> -rw-rw-r-- 1 myuser myuser    0 dic  3 17:42 00-HI-ENCRYPTED
> 
> ## --- Using new encfs 1.9.5-3~1 with fuse3 patches. Creation ---
> $ ls -al target/
> total 8
> drwxrwsr-x          2 myuser myuser 4096 dic  3 18:28 .
> drwxrwsr-x          4 myuser myuser 4096 dic  3 18:28 ..
> ---------- 3651136296 root   saned     0 dic  1  4458884 00-HI-ENCRYPTED
> 
> ## --- Using new encfs 1.9.5-3~1 with fuse3 patches. Further mount ---
> $ ls -al target/
> total 69999410541872
> drwxrwsr-x        2 myuser myuser           4096 dic  3 18:28 .
> drwxrwsr-x        4 myuser myuser           4096 dic  3 18:29 ..
> ---------- 67103528 root   root   93983110258336 oct 13  4438351 
> 00-HI-ENCRYPTED
> 
> This last changes slightly from mount to mount.
> 
> Using -f option with relative paths results in
> 
> $ encfs -f ./.crypto ./target
> 
> d?????????  ? ?      ?         ?            ? target
> 
> be shown by ls -la in top dir. Using it with absolute paths results in 
> something
> similar as above.
> 
> Regards,
> 
> -- 
> Agustin

-- 
<Ganneff> a
<azeem> b
<Sahneschnitter> c
<Sahneschnitter> :)
<Ganneff> d
<azeem> f
<azeem> ups
<Sahneschnitter> azeem sie sind raus :)

Reply via email to