I have been experimenting with this, testing different cipher
algorithms and kernel versions.

The problem appears to be AES.

When I use blowfish as the cipher algorithm, then there is no problem.

Did openssl get updated recently?

I had already tried the newest version of encfs from source.

The only thing that springs to mind is that this system is running on
a VIA EPIA SN board, which has AES in h/w. However, I don't have the
padlock_aes module loaded for these tests...

I will try a different version of openssl to see whether that makes
any difference.

Thanks for your help,

Best wishes,

Mark
2008/11/27 Eduard Bloch <[EMAIL PROTECTED]>:
> #include <hallo.h>
>
> To be honest, I have no idea of what's going wrong on your system.
> Please test 1.5.2 packages from
> http://people.debian.org/~blade/experimental/ though I see no relevant
> fixes between 1.4.2 and 1.5.2. If that does not help then I hope that
> upstream author might help you (BCc'ed).
>
> @Valient: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506966 for
> previous information.
>
> Regards,
> Eduard.
>
> * Mark Wardle [Wed, Nov 26 2008, 07:33:05PM]:
>> I wrote that it seemed to be a problem with short, long, or --extpass
>> passwords, implying that this was a problem with newly created (and
>> indeed old) filesystems. Maybe I wasn't clear.
>>
>> Here is a simple transcript creating a filesystem, unmounting it, and
>> then trying to re-mount it.
>> Note: one can use a short, long or --extpass provided password. In
>> this example, I used a single character password.
>>
>> NB: This used to work a week or two ago after an undefined update
>> (that didn't flag anything to me as nothing seemed related - did
>> libssl get updated - or could it be the kernel update).
>>
>> #
>> # uname -a
>> Linux 2.6.26-1-686 #1 SMP Sat Nov 8 19:00:26 UTC 2008 i686 GNU/Linux
>> # cd /tmp
>> # mkdir one
>> # mkdir two
>> # encfs -v /tmp/one /tmp/two
>> 19:19:48 (main.cpp:515) Root directory: /tmp/one/
>> 19:19:48 (main.cpp:516) Fuse arguments: (daemon) (threaded) (keyCheck)
>> encfs /tmp/two -s -o use_ino -o default_permissions
>> Creating new encrypted volume.
>> Please choose from one of the following options:
>>  enter "x" for expert configuration mode,
>>  enter "p" for pre-configured paranoia mode,
>>  anything else, or an empty line will select standard mode.
>> ?>
>>
>> Standard configuration selected.
>> 19:19:54 (SSL_Cipher.cpp:325) allocated cipher ssl/aes, keySize 24, ivlength 
>> 16
>> 19:19:54 (FileUtils.cpp:1009) Using cipher AES, key size 192, block size 1024
>>
>> Configuration finished.  The filesystem to be created has
>> the following properties:
>> 19:19:54 (Interface.cpp:165) checking if ssl/aes(2:1:1) implements
>> ssl/aes(2:1:1)
>> 19:19:54 (SSL_Cipher.cpp:325) allocated cipher ssl/aes, keySize 24, ivlength 
>> 16
>> Filesystem cipher: "ssl/aes", version 2:1:1
>> 19:19:54 (Interface.cpp:165) checking if nameio/block(3:0:1)
>> implements nameio/block(3:0:1)
>> Filename encoding: "nameio/block", version 3:0:1
>> 19:19:54 (Interface.cpp:165) checking if ssl/aes(2:1:1) implements
>> ssl/aes(2:1:1)
>> 19:19:54 (SSL_Cipher.cpp:325) allocated cipher ssl/aes, keySize 24, ivlength 
>> 16
>> Key Size: 192 bits
>> Block Size: 1024 bytes
>> Each file contains 8 byte header with unique IV data.
>> Filenames encoded using IV chaining mode.
>>
>> Now you will need to enter a password for your filesystem.
>> You will need to remember this password, as there is absolutely
>> no recovery mechanism.  However, the password can be changed
>> later using encfsctl.
>>
>> 19:19:54 (openssl.cpp:48) Allocating 39 locks for OpenSSL
>> 19:19:54 (FileUtils.cpp:1061) useStdin: 0
>> New Encfs Password:
>> Verify Encfs Password:
>> 19:19:59 (Interface.cpp:165) checking if nameio/block(3:0:1)
>> implements nameio/block(3:0:1)
>> #
>> # mount
>> [--extraneous stuff removed--]
>> fusectl on /sys/fs/fuse/connections type fusectl (rw)
>> encfs on /tmp/two type fuse.encfs
>> (rw,nosuid,nodev,default_permissions,user=mark)
>> # fusermount -u two
>> # encfs -v /tmp/one /tmp/two
>> 19:20:23 (main.cpp:515) Root directory: /tmp/one/
>> 19:20:23 (main.cpp:516) Fuse arguments: (daemon) (threaded) (keyCheck)
>> encfs /tmp/two -s -o use_ino -o default_permissions
>> 19:20:23 (Interface.cpp:165) checking if ssl/aes(2:1:1) implements
>> ssl/aes(2:1:0)
>> 19:20:23 (SSL_Cipher.cpp:325) allocated cipher ssl/aes, keySize 24, ivlength 
>> 16
>> 19:20:23 (FileUtils.cpp:1431) useStdin: 0
>> EncFS Password:
>> 19:20:24 (openssl.cpp:48) Allocating 39 locks for OpenSSL
>> 19:20:24 (FileUtils.cpp:1442) configuration key size = 44
>> 19:20:24 (FileUtils.cpp:1443) cipher key size = 44
>> 19:20:24 (SSL_Cipher.cpp:520) checksum mismatch: expected 3113033503,
>> got 4078413378
>> 19:20:24 (SSL_Cipher.cpp:521) on decode of 40 bytes
>> Error decoding volume key, password incorrect
>> #
>>
>> Am I doing something stupid? This used to work.
>>
>> Best wishes,
>>
>> Mark
>> --
>> Dr. Mark Wardle
>> Specialist registrar, Neurology
>> Cardiff, UK
>>
>
> --
> Der Glaube kann uns niemals von etwas überzeugen, was unserer
> Erkenntnis zuwiderläuft.
>                -- John Locke
>
>
> ______________________________________________________________________
> This email has been scanned by the MessageLabs Email Security System.
> For more information please visit http://www.messagelabs.com/email
> ______________________________________________________________________
>



-- 
Dr. Mark Wardle
Specialist registrar, Neurology
Cardiff, UK



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to