Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reverse mode fileystems are always mounted read-only #23

Closed
Wihlelm opened this issue Mar 21, 2018 · 3 comments
Closed

Reverse mode fileystems are always mounted read-only #23

Wihlelm opened this issue Mar 21, 2018 · 3 comments

Comments

@Wihlelm
Copy link

Wihlelm commented Mar 21, 2018

Hi bailey27,

first of all, thank you for your port of gocryptfs in windows.

Can you explain why reverse mode fileystems are always mounted read-only ? For backup it is perfectly fine, but what about synchronization with a sync client ? For example two different computers where files are stored unencrypted which sync through a cloud where files are stored encrypted ? Any modification on one side should propagate to the other. Moreover, most of sync clients needs to have write access to store a local journal of the sync process inside the sync directory.

Is it inherent to the program ? Is it not possible to allow to bypass this default option of read-only to give write access ?

Best regards

@Nodens-
Copy link

Nodens- commented Mar 21, 2018

This is a gocryptfs limitation. Currently there is no support for RW reverse and with the current AES-SIV implementation even if there was support for writes, you would not be able to sync files with it since the encryption is non-deterministic.

See here: rfjakob/gocryptfs#108

@bailey27
Copy link
Owner

@Wihlelm , if gocryptfs implements RW in reverse mode, then I'll implement it in cppcryptfs.

@Wihlelm
Copy link
Author

Wihlelm commented Mar 23, 2018

Thanks bailey, it would really be great to have such an option. By now I will keep encfs which provide RW support for reverse mode, even if I know that it has some security holes.

@Wihlelm Wihlelm closed this as completed Mar 23, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants