-
Notifications
You must be signed in to change notification settings - Fork 262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gocryptfs.diriv in cloud #37
Comments
Yes it is, the diriv files are not secret!
|
thx for the quick response |
I would prefer to remove the "gocryptfs" part of the "gocryptfs.diriv" files to hide the used tool. Or is it plain simple to determine the used tool from the data in the encrypted folder? I know, this is security by obscurity. But the less information one can get directly from the encrypted data, the better I feel ;-) |
I'm sure it's possible to identify it from the file content (for example, there is a two-byte version header in every file, currently 0x0002). But it does take more work and skill to do it. I don't think I will want to add a command-line option for that, but if you don't mind compiling yourself, it's just the |
Thanks a lot for the reply. Yes, I could change the constant and compile it my self. But I do that mostly for test cases and normally try to go with the standard packages from the distributions (my Gentoo time is about 15 years ago). Using only ".diriv" would have another neat effect to have this special file better separated from the encrypted content. Especially with raw64, there won't be other files or folders starting with a dot. |
Yes, the dot in the file name makes sure there are no collisions with encrypted files (this is also true for I though about calling the file just |
It's true regarding hidden dot files could be a problem for inexperienced users. But they are widely used in Unix for other files which needs to be backed up. Therefore, an explicit options to use .diriv could be a viable solution. |
If the file name for the diriv is specified at the init phase, it could be stored in the conf file. Defaulting to gocryptfs.diriv would keep backward compatibility. |
OK, compiled by myself. Had to change some occurrences in |
Sorry for bumping old topic, but... |
Makes it easier to change the name (as some people want to): #37
So the goal is to somewhat hide that gocryptfs is used, right? Wouldn't it be best to use a "random crap" filename like |
I would say not to completely hide, but at least it wouldn't be obviously from the first look. |
Just two thoughts, both valid only when using encoded filenames.
|
Hi, thanks for your work.
is it safe if i upload my encrypted directory with the gocryptfs.diriv file to my cloud (Dropbox, ACD ect.)?
The text was updated successfully, but these errors were encountered: