2018-09-16 12:21:41 +02:00
# CryFS [![Build Status](https://travis-ci.org/cryfs/cryfs.svg?branch=master)](https://travis-ci.org/cryfs/cryfs) [![CircleCI](https://circleci.com/gh/cryfs/cryfs/tree/master.svg?style=svg)](https://circleci.com/gh/cryfs/cryfs/tree/master) [![Build status](https://ci.appveyor.com/api/projects/status/84ouutflsnap9dlv/branch/develop?svg=true)](https://ci.appveyor.com/project/smessmer/cryfs/branch/develop)
2017-09-11 23:59:21 +02:00
2015-12-17 20:36:15 +01:00
CryFS encrypts your files, so you can safely store them anywhere. It works well together with cloud services like Dropbox, iCloud, OneDrive and others.
2016-01-31 21:44:32 +01:00
See [https://www.cryfs.org ](https://www.cryfs.org ).
2015-09-12 20:49:42 +02:00
2015-12-17 19:53:57 +01:00
Install latest release
2015-12-17 19:49:06 +01:00
======================
2018-01-13 00:22:24 +01:00
This only works for Ubuntu 17.04 and later, and Debian Stretch and later.
You can also use CryFS on older versions of these distributions by following the **Building from source** instructions below.
2015-12-17 19:49:06 +01:00
2017-09-30 07:17:34 +02:00
sudo apt install cryfs
2015-12-17 19:49:06 +01:00
2016-02-12 23:29:44 +01:00
GUI
===
2017-11-23 02:56:01 +01:00
Theres some GUI applications with CryFS support. You usually have to install the GUI **and** also CryFS itself for it to work.
- [SiriKali ](https://mhogomchungu.github.io/sirikali/ )
- [Plasma Vault ](https://www.kde.org/announcements/plasma-5.11.0.php ) in KDE Plasma >= 5.11
2015-09-29 15:47:05 +02:00
Building from source
====================
Requirements
------------
2016-02-15 02:40:56 +01:00
- Git (for getting the source code)
2018-05-28 23:54:17 +02:00
- GCC version >= 5.0 or Clang >= 4.0
2018-05-17 18:55:15 +02:00
- CMake version >= 3.0
2016-03-15 14:31:52 +01:00
- libcurl4 (including development headers)
2016-02-11 17:34:08 +01:00
- Boost libraries version >= 1.56 (including development headers)
- filesystem
- system
- chrono
- program_options
- thread
2016-02-12 13:27:06 +01:00
- SSL development libraries (including development headers, e.g. libssl-dev)
2016-02-15 18:07:24 +01:00
- libFUSE version >= 2.8.6 (including development headers), on Mac OS X instead install osxfuse from https://osxfuse.github.io/
2016-02-11 20:20:57 +01:00
- Python >= 2.7
2018-05-21 00:00:25 +02:00
- OpenMP
2016-02-11 17:34:08 +01:00
You can use the following commands to install these requirements
2015-09-29 15:47:05 +02:00
2015-09-29 15:51:09 +02:00
# Ubuntu
2018-05-19 21:42:35 +02:00
$ sudo apt-get install git g++ cmake make libcurl4-openssl-dev libboost-filesystem-dev libboost-system-dev libboost-chrono-dev libboost-program-options-dev libboost-thread-dev libssl-dev libfuse-dev python
2016-03-15 14:31:52 +01:00
2015-09-29 15:51:09 +02:00
# Fedora
2018-05-19 21:42:35 +02:00
sudo dnf install git gcc-c++ cmake make libcurl-devel boost-devel boost-static openssl-devel fuse-devel python
2016-03-15 14:31:52 +01:00
2015-09-29 15:51:09 +02:00
# Macintosh
2018-05-21 00:00:25 +02:00
brew install cmake boost openssl libomp
2015-09-29 15:51:09 +02:00
2016-02-12 10:16:38 +01:00
Build & Install
---------------
2016-03-15 14:31:52 +01:00
2015-09-29 15:47:05 +02:00
1. Clone repository
2016-02-11 19:58:55 +01:00
$ git clone https://github.com/cryfs/cryfs.git cryfs
2015-09-29 15:47:05 +02:00
$ cd cryfs
2. Build
2016-02-11 15:28:34 +01:00
$ mkdir cmake & & cd cmake
2016-02-14 17:06:06 +01:00
$ cmake ..
2016-02-11 15:28:34 +01:00
$ make
2016-03-15 14:31:52 +01:00
2016-02-11 15:28:34 +01:00
3. Install
2015-10-26 20:44:00 +01:00
$ sudo make install
2016-03-15 14:31:52 +01:00
2016-02-15 20:01:13 +01:00
You can pass the following variables to the *cmake* command (using *-Dvariablename=value* ):
2016-10-20 10:08:08 +02:00
- **-DCMAKE_BUILD_TYPE**=[Release|Debug]: Whether to run code optimization or add debug symbols. Default: Release
- **-DBUILD_TESTING**=[on|off]: Whether to build the test cases (can take a long time). Default: off
- **-DCRYFS_UPDATE_CHECKS**=off: Build a CryFS that doesn't check online for updates and security vulnerabilities.
2016-03-15 14:31:52 +01:00
2018-09-16 02:42:32 +02:00
Building on Windows (experimental)
---------------
Build with Visual Studio 2017 and pass in the following flags to CMake:
2018-09-18 13:35:50 +02:00
-DDOKAN_PATH=[dokan library location, e.g. "C:\Program Files\Dokan\DokanLibrary-1.1.0"]
2018-09-16 02:42:32 +02:00
-DBOOST_ROOT=[path to root of boost installation]
2016-02-15 20:01:13 +01:00
Troubleshooting
---------------
2016-02-12 10:16:38 +01:00
2016-02-17 01:18:38 +01:00
On most systems, CMake should find the libraries automatically. However, that doesn't always work.
1. **Boost headers not found**
Pass in the boost include path with
cmake .. -DBoost_INCLUDE_DIRS=/path/to/boost/headers
If you want to link boost dynamically (e.g. you don't have the static libraries), use the following:
2016-02-17 01:19:20 +01:00
cmake .. -DBoost_USE_STATIC_LIBS=off
2016-02-17 01:18:38 +01:00
2. **Fuse/Osxfuse library not found**
Pass in the library path with
cmake .. -DFUSE_LIB_PATH=/path/to/fuse/or/osxfuse
3. **Fuse/Osxfuse headers not found**
Pass in the include path with
cmake .. -DCMAKE_CXX_FLAGS="-I/path/to/fuse/or/osxfuse/headers"
2018-05-19 21:42:35 +02:00
4. **Openssl headers not found**
2016-02-17 01:18:38 +01:00
Pass in the include path with
2016-02-15 18:12:23 +01:00
2016-02-17 01:18:38 +01:00
cmake .. -DCMAKE_C_FLAGS="-I/path/to/openssl/include"
2016-02-15 18:07:24 +01:00
2016-02-12 10:16:38 +01:00
2017-09-02 11:04:20 +02:00
Creating .deb and .rpm packages
-------------------------------
2016-02-12 10:16:38 +01:00
2017-09-02 11:04:20 +02:00
There are additional requirements if you want to create packages. They are:
2016-02-12 10:16:38 +01:00
- CMake version >= 3.3
2017-09-02 11:04:20 +02:00
- rpmbuild for creating .rpm package
2016-02-12 10:16:38 +01:00
1. Clone repository
$ git clone https://github.com/cryfs/cryfs.git cryfs
$ cd cryfs
2. Build
$ mkdir cmake & & cd cmake
$ cmake .. -DCMAKE_BUILD_TYPE=Release -DBUILD_TESTING=off
$ make package
2016-09-19 23:48:05 +02:00
Disclaimer
----------------------
2016-09-22 20:17:05 +02:00
On the event of a password leak, you are strongly advised to create a new filesystem and copy all the data over from the previous one. Done this, all copies of the compromised filesystem and config file must be removed (e.g, from the "previous versions" feature of your cloud system) to prevent access to the key (and, as a result, your data) using the leaked password.