<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Security_Summit_2014%2FAbstracts%2FHalcrow</id>
	<title>Linux Security Summit 2014/Abstracts/Halcrow - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://kernsec.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Linux_Security_Summit_2014%2FAbstracts%2FHalcrow"/>
	<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Halcrow&amp;action=history"/>
	<updated>2026-05-07T12:03:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Halcrow&amp;diff=3512&amp;oldid=prev</id>
		<title>JamesMorris at 16:42, 15 July 2014</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Halcrow&amp;diff=3512&amp;oldid=prev"/>
		<updated>2014-07-15T16:42:18Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 16:42, 15 July 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Title ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Title ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;EXT4 Encryption&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;EXT4 Encryption &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(discussion)&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Presenter ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Presenter ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>JamesMorris</name></author>
	</entry>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Halcrow&amp;diff=3511&amp;oldid=prev</id>
		<title>JamesMorris: New page: == Title ==  EXT4 Encryption  == Presenter ==  Michael Halcrow &amp; Ted Ts'o, Google  == Abstract ==  eCryptfs has served its purpose reasonably well in the years since it was merged upstream...</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Security_Summit_2014/Abstracts/Halcrow&amp;diff=3511&amp;oldid=prev"/>
		<updated>2014-07-15T16:41:57Z</updated>

		<summary type="html">&lt;p&gt;New page: == Title ==  EXT4 Encryption  == Presenter ==  Michael Halcrow &amp;amp; Ted Ts&amp;#039;o, Google  == Abstract ==  eCryptfs has served its purpose reasonably well in the years since it was merged upstream...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Title ==&lt;br /&gt;
&lt;br /&gt;
EXT4 Encryption&lt;br /&gt;
&lt;br /&gt;
== Presenter ==&lt;br /&gt;
&lt;br /&gt;
Michael Halcrow &amp;amp; Ted Ts'o, Google&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
eCryptfs has served its purpose reasonably well in the years since it&lt;br /&gt;
was merged upstream, but its extensive use in ChromeOS and Ubuntu has&lt;br /&gt;
revealed several shortcomings, many related to inherent problems with&lt;br /&gt;
stacked filesystems in Linux. Perhaps the most pertinent issue is that&lt;br /&gt;
cryptanalysis has advanced since eCryptfs was designed almost a decade&lt;br /&gt;
ago, and its susceptibility to Adaptive Chosen Ciphertext (CCA2)&lt;br /&gt;
attacks is an increasing cause for concern. Furthermore, dm-crypt,&lt;br /&gt;
loop-AES, TrueCrypt, etc. all lack cryptographically strong&lt;br /&gt;
integrity. Linux users are left without any really great options.&lt;br /&gt;
&lt;br /&gt;
Changing the encryption mode to support both strong confidentiality&lt;br /&gt;
and integrity carries with it additional complexity and performance&lt;br /&gt;
challenges. We endeavor to leverage filesystem-layer intelligence in&lt;br /&gt;
EXT4 to manage integrity data. Lukas Czerner at Red Hat plans to&lt;br /&gt;
implement per-block metadata in 2014, a feature which we expect we can&lt;br /&gt;
use to intelligently and efficiently store additional cryptographic&lt;br /&gt;
data necessary to implement IND-CCA2-secure encryption modes like&lt;br /&gt;
AES-GCM. We also have options available to us in the event per-block&lt;br /&gt;
metadata isn't realized in the near future, which we would like to&lt;br /&gt;
discuss at LSS 2014.&lt;br /&gt;
&lt;br /&gt;
eCryptfs suffers from a major correctness issue, in that a page dirty&lt;br /&gt;
in the lower filesystem page cache cannot propagate to a page dirty in&lt;br /&gt;
the eCryptfs page cache. Current deployments paper over this bug by&lt;br /&gt;
attempting to mask lower filesystem dentry's with things like eCryptfs&lt;br /&gt;
overlay mounts. We can eliminate this problem by implementing the&lt;br /&gt;
encryption directly in the data path of EXT4.&lt;br /&gt;
&lt;br /&gt;
We will also incorporate customer feedback from years of eCryptfs use&lt;br /&gt;
in the field to avoid many of the key management and usability&lt;br /&gt;
pitfalls that users have reported. We will also address performance&lt;br /&gt;
issues that eCryptfs suffers from due to its inherent disadvantage of&lt;br /&gt;
being constrained to an entirely separate layer above another&lt;br /&gt;
filesystem. eCryptfs has also notoriously had a sort of &amp;quot;stack once,&lt;br /&gt;
debug everywhere&amp;quot; phenomenon, in that unintended interactions with&lt;br /&gt;
nuances in behavior of various lower filesystems have prevented&lt;br /&gt;
eCryptfs from either working at all or working reliably. eCryptfs is&lt;br /&gt;
commonly stacked on EXT4, and so native EXT4 encryption will&lt;br /&gt;
immediately resolve the performance, correctness, and security issues&lt;br /&gt;
that the majority of eCryptfs users deal with today.&lt;/div&gt;</summary>
		<author><name>JamesMorris</name></author>
	</entry>
</feed>