2017-03-25 14:16:55 +01:00
|
|
|
[![gocryptfs](Documentation/gocryptfs-logo.png)](https://nuetzlich.net/gocryptfs/)
|
2016-10-24 19:30:39 +02:00
|
|
|
[![Build Status](https://travis-ci.org/rfjakob/gocryptfs.svg?branch=master)](https://travis-ci.org/rfjakob/gocryptfs)
|
|
|
|
[![MIT License](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE)
|
|
|
|
[![Go Report Card](https://goreportcard.com/badge/github.com/rfjakob/gocryptfs)](https://goreportcard.com/report/github.com/rfjakob/gocryptfs)
|
|
|
|
|
2015-11-01 12:14:59 +01:00
|
|
|
An encrypted overlay filesystem written in Go.
|
2018-07-04 09:10:36 +02:00
|
|
|
Official website: https://nuetzlich.net/gocryptfs ([markdown source](https://github.com/rfjakob/gocryptfs-website/blob/master/docs/index.md)).
|
2015-09-06 12:12:14 +02:00
|
|
|
|
2018-07-01 15:26:56 +02:00
|
|
|
![Folders side-by-side animation](Documentation/folders-side-by-side.gif)
|
2015-09-06 12:12:14 +02:00
|
|
|
|
2018-07-01 15:26:56 +02:00
|
|
|
gocryptfs is built on top the excellent
|
|
|
|
[go-fuse](https://github.com/hanwen/go-fuse) FUSE library.
|
2015-12-08 16:41:45 +01:00
|
|
|
This project was inspired by EncFS and strives to fix its security
|
2016-05-25 00:28:22 +02:00
|
|
|
issues while providing good performance
|
|
|
|
([benchmarks](https://nuetzlich.net/gocryptfs/comparison/#performance)).
|
2015-11-01 12:14:59 +01:00
|
|
|
For details on the security of gocryptfs see the
|
2015-12-20 18:25:10 +01:00
|
|
|
[Security](https://nuetzlich.net/gocryptfs/security/) design document.
|
2015-09-08 23:09:28 +02:00
|
|
|
|
2015-12-20 21:15:49 +01:00
|
|
|
All tags from v0.4 onward are signed by the *gocryptfs signing key*.
|
2016-07-06 21:26:57 +02:00
|
|
|
Please check [Signed Releases](https://nuetzlich.net/gocryptfs/releases/)
|
|
|
|
for details.
|
2015-12-20 21:15:49 +01:00
|
|
|
|
2015-10-06 23:08:04 +02:00
|
|
|
Current Status
|
|
|
|
--------------
|
2015-11-14 19:10:52 +01:00
|
|
|
|
2017-04-01 13:57:18 +02:00
|
|
|
gocryptfs has reached version 1.0 on July 17, 2016. It has gone through
|
2016-07-17 12:19:50 +02:00
|
|
|
hours and hours of stress (fsstress, extractloop.bash) and correctness
|
|
|
|
testing (xfstests). It is now considered ready for general consumption.
|
|
|
|
|
|
|
|
The old principle still applies: Important data should have a backup.
|
|
|
|
Also, keep a copy of your master key (printed on mount) in a safe place.
|
|
|
|
This allows you to access the data even if the gocryptfs.conf config
|
|
|
|
file is damaged or you lose the password.
|
2015-11-14 19:10:52 +01:00
|
|
|
|
2017-04-01 13:57:18 +02:00
|
|
|
The security of gocryptfs has been audited in March 3, 2017. The audit
|
|
|
|
is available [here (defuse.ca)](https://defuse.ca/audits/gocryptfs.htm).
|
|
|
|
|
2016-07-06 21:26:57 +02:00
|
|
|
Platforms
|
|
|
|
---------
|
|
|
|
|
|
|
|
Linux is gocryptfs' native platform.
|
|
|
|
|
2017-07-01 11:51:02 +02:00
|
|
|
Beta-quality Mac OS X support is available, which means most things work
|
|
|
|
fine but you may hit an occasional problem. Check out
|
|
|
|
[ticket #15](https://github.com/rfjakob/gocryptfs/issues/15) for the history
|
2018-01-25 21:35:57 +01:00
|
|
|
of Mac OS X support but please create a new ticket if you hit a problem.
|
2016-07-06 21:26:57 +02:00
|
|
|
|
2018-02-22 15:21:22 +01:00
|
|
|
For Windows, an independent C++ reimplementation can be found here:
|
2016-07-06 21:26:57 +02:00
|
|
|
[cppcryptfs](https://github.com/bailey27/cppcryptfs)
|
2015-11-14 19:10:52 +01:00
|
|
|
|
|
|
|
Testing
|
|
|
|
-------
|
|
|
|
|
2015-11-15 16:06:19 +01:00
|
|
|
gocryptfs comes with is own test suite that is constantly expanded as features are
|
2016-01-09 15:31:58 +01:00
|
|
|
added. Run it using `./test.bash`. It takes about 1 minute and requires FUSE
|
2015-11-15 16:06:19 +01:00
|
|
|
as it mounts several test filesystems.
|
2015-11-14 19:10:52 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
The `stress_tests` directory contains stress tests that run indefinitely.
|
|
|
|
|
2015-11-15 16:06:19 +01:00
|
|
|
In addition, I have ported `xfstests` to FUSE, the result is the
|
2015-11-14 19:10:52 +01:00
|
|
|
[fuse-xfstests](https://github.com/rfjakob/fuse-xfstests) project. gocryptfs
|
2015-12-01 18:19:24 +01:00
|
|
|
passes the "generic" tests with one exception, results: [XFSTESTS.md](Documentation/XFSTESTS.md)
|
2015-11-14 19:10:52 +01:00
|
|
|
|
|
|
|
A lot of work has gone into this. The testing has found bugs in gocryptfs
|
2016-05-25 00:28:22 +02:00
|
|
|
as well as in the go-fuse library.
|
2015-10-06 23:08:04 +02:00
|
|
|
|
2016-01-09 15:31:58 +01:00
|
|
|
Compile
|
2015-10-06 23:08:04 +02:00
|
|
|
-------
|
|
|
|
|
2018-08-18 18:38:14 +02:00
|
|
|
With [go 1.7 or higher](.travis.yml#L12):
|
2018-02-05 22:24:51 +01:00
|
|
|
|
2017-02-19 20:14:46 +01:00
|
|
|
$ go get -d github.com/rfjakob/gocryptfs
|
|
|
|
$ cd $(go env GOPATH)/src/github.com/rfjakob/gocryptfs
|
|
|
|
$ ./build.bash
|
|
|
|
|
2017-03-28 20:02:56 +02:00
|
|
|
build.bash needs the OpenSSL headers installed (Debian: `apt install libssl-dev`,
|
|
|
|
Fedora: `dnf install openssl-devel`). Alternatively, you can compile
|
|
|
|
without OpenSSL using
|
2017-02-19 20:14:46 +01:00
|
|
|
|
|
|
|
$ ./build-without-openssl.bash
|
2015-10-07 23:30:45 +02:00
|
|
|
|
|
|
|
Use
|
|
|
|
---
|
|
|
|
|
|
|
|
$ mkdir cipher plain
|
2017-02-19 20:43:07 +01:00
|
|
|
$ ./gocryptfs -init cipher
|
|
|
|
$ ./gocryptfs cipher plain
|
2016-01-09 15:31:58 +01:00
|
|
|
|
|
|
|
See the [Quickstart](https://nuetzlich.net/gocryptfs/quickstart/) page for more info.
|
|
|
|
|
2017-02-23 00:14:20 +01:00
|
|
|
The [MANPAGE.md](Documentation/MANPAGE.md) describes all available command-line options.
|
2015-11-11 09:19:53 +01:00
|
|
|
|
2018-01-27 21:59:05 +01:00
|
|
|
Use: Reverse Mode
|
|
|
|
-----------------
|
|
|
|
|
|
|
|
$ mkdir cipher plain
|
|
|
|
$ ./gocryptfs -reverse -init plain
|
|
|
|
$ ./gocryptfs -reverse plain cipher
|
|
|
|
|
2017-02-16 18:36:16 +01:00
|
|
|
Graphical Interface
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
The [SiriKali](https://mhogomchungu.github.io/sirikali/) project supports
|
|
|
|
gocryptfs and runs on Linux and OSX.
|
|
|
|
|
2017-02-16 18:37:12 +01:00
|
|
|
[cppcryptfs](https://github.com/bailey27/cppcryptfs) on Windows provides
|
|
|
|
its own GUI.
|
2017-02-16 18:36:16 +01:00
|
|
|
|
2017-02-12 19:12:02 +01:00
|
|
|
Stable CLI ABI
|
|
|
|
--------------
|
|
|
|
|
|
|
|
If you want to call gocryptfs from your app or script, see
|
|
|
|
[CLI_ABI.md](Documentation/CLI_ABI.md) for the official stable
|
|
|
|
ABI. This ABI is regression-tested by the test suite.
|
|
|
|
|
2015-11-01 12:14:59 +01:00
|
|
|
Storage Overhead
|
|
|
|
----------------
|
|
|
|
|
|
|
|
* Empty files take 0 bytes on disk
|
|
|
|
* 18 byte file header for non-empty files (2 bytes version, 16 bytes random file id)
|
2016-09-26 23:46:37 +02:00
|
|
|
* 32 bytes of storage overhead per 4kB block (16 byte nonce, 16 bytes auth tag)
|
2015-11-01 12:14:59 +01:00
|
|
|
|
2016-01-09 15:31:58 +01:00
|
|
|
[file-format.md](Documentation/file-format.md) contains a more detailed description.
|
|
|
|
|
2015-10-06 23:08:04 +02:00
|
|
|
Performance
|
|
|
|
-----------
|
|
|
|
|
2016-05-04 19:55:20 +02:00
|
|
|
Since version 0.7.2, gocryptfs is as fast as EncFS in the default mode,
|
|
|
|
and significantly faster than EncFS' "paranoia" mode that provides
|
|
|
|
a security level comparable to gocryptfs.
|
2015-09-06 12:16:34 +02:00
|
|
|
|
2018-12-16 12:49:13 +01:00
|
|
|
On CPUs without AES-NI, gocryptfs uses OpenSSL through a thin wrapper called `stupidgcm`.
|
2016-05-04 19:55:20 +02:00
|
|
|
This provides a 4x speedup compared to Go's builtin AES-GCM
|
2018-12-16 12:49:13 +01:00
|
|
|
implementation. See [CPU-Benchmarks](https://github.com/rfjakob/gocryptfs/wiki/CPU-Benchmarks)
|
|
|
|
for details, or run `gocryptfs -speed` to see the encryption performance of your CPU.
|
|
|
|
Example for a CPU without AES-NI:
|
|
|
|
|
|
|
|
```
|
|
|
|
$ ./gocryptfs -speed
|
|
|
|
AES-GCM-256-OpenSSL 165.67 MB/s (selected in auto mode)
|
2019-01-03 20:36:26 +01:00
|
|
|
AES-GCM-256-Go 49.62 MB/s
|
|
|
|
AES-SIV-512-Go 39.98 MB/s
|
2018-12-16 12:49:13 +01:00
|
|
|
```
|
|
|
|
|
|
|
|
You can run `./benchmark.bash` to run gocryptfs' canonical set of
|
2016-05-04 19:55:20 +02:00
|
|
|
benchmarks that include streaming write, extracting a linux kernel
|
|
|
|
tarball, recursively listing and finally deleting it. The output will
|
|
|
|
look like this:
|
2015-09-06 12:12:14 +02:00
|
|
|
|
2016-01-23 20:17:34 +01:00
|
|
|
```
|
2019-01-03 20:36:26 +01:00
|
|
|
$ ./benchmark.bash
|
2018-08-18 18:38:14 +02:00
|
|
|
Testing gocryptfs at /tmp/benchmark.bash.DwL: gocryptfs v1.6; go-fuse v20170619-45-g95c6370; 2018-08-18 go1.10.3
|
|
|
|
WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.1033 s, 238 MB/s
|
|
|
|
READ: 262144000 bytes (262 MB, 250 MiB) copied, 0.945291 s, 277 MB/s
|
|
|
|
UNTAR: 17.768
|
|
|
|
MD5: 8.459
|
|
|
|
LS: 1.460
|
|
|
|
RM: 3.379
|
2016-01-23 20:17:34 +01:00
|
|
|
```
|
2015-10-06 00:31:53 +02:00
|
|
|
|
2015-11-01 01:32:33 +01:00
|
|
|
Changelog
|
|
|
|
---------
|
2019-01-04 18:05:37 +01:00
|
|
|
|
2019-01-05 18:34:22 +01:00
|
|
|
v1.7, in progress (v1.7-beta1: 2019-01-03, v1.7-rc1: 2019-01-04)
|
2019-01-03 20:36:26 +01:00
|
|
|
* **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames
|
|
|
|
* If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade.
|
2019-01-03 21:08:49 +01:00
|
|
|
Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`,
|
2019-01-03 20:36:26 +01:00
|
|
|
or reading files inside `CIPHERDIR` that they should not have access to.
|
|
|
|
* If you do not use `-plaintextnames` (disabled per default), these attacks do
|
|
|
|
not work as symlinks are encrypted.
|
2019-01-04 18:05:37 +01:00
|
|
|
* Forward mode has been reworked to use the "\*at" family of system calls everywhere
|
2019-01-03 20:36:26 +01:00
|
|
|
(`Openat/Unlinkat/Symlinkat/...`).
|
|
|
|
* As a result, gocryptfs may run slightly slower, as the caching logic has been
|
|
|
|
replaced and is very simple at the moment.
|
|
|
|
* The possibility for such attacks was found during an internal code review.
|
2019-01-04 18:05:37 +01:00
|
|
|
* Reverse mode: fix excluded, unaccessible files showing up in directory listings
|
|
|
|
([#285](https://github.com/rfjakob/gocryptfs/issues/285),
|
|
|
|
[#286](https://github.com/rfjakob/gocryptfs/issues/286))
|
2019-01-04 19:39:10 +01:00
|
|
|
* gocryptfs-xray: add `-aessiv` flag for correctly parsing AES-SIV format files
|
|
|
|
([#299](https://github.com/rfjakob/gocryptfs/issues/299))
|
2019-01-05 18:34:22 +01:00
|
|
|
* Ensure that standard fds 0,1,2 are always initialized
|
|
|
|
([#320](https://github.com/rfjakob/gocryptfs/issues/320)).
|
|
|
|
Prevents trouble in the unlikely case that gocryptfs is called with
|
|
|
|
stdin,stdout and/or stderr closed.
|
2015-11-01 01:32:33 +01:00
|
|
|
|
2018-12-12 21:41:05 +01:00
|
|
|
v1.6.1, 2018-12-12
|
|
|
|
* Fix "Operation not supported" chmod errors on Go 1.11
|
|
|
|
([#271](https://github.com/rfjakob/gocryptfs/issues/271))
|
|
|
|
|
2018-08-18 12:19:47 +02:00
|
|
|
v1.6, 2018-08-18
|
2018-08-15 23:44:46 +02:00
|
|
|
* **Add `-e` / `-exclude` option** for reverse mode
|
|
|
|
([#235](https://github.com/rfjakob/gocryptfs/issues/235),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b))
|
|
|
|
* **Add support for the Trezor One HSM** [PR#247](https://github.com/rfjakob/gocryptfs/pull/247), thanks @xaionaro!
|
|
|
|
* Use `./build.bash -tags enable_trezor` to compile with Trezor support
|
|
|
|
* Then, use `gocryptfs -init -trezor` to create a filesystem locked with a physical Trezor device.
|
2018-08-11 23:39:49 +02:00
|
|
|
* Only print master key once, on init
|
|
|
|
([#76](https://github.com/rfjakob/gocryptfs/issues/76),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/6d64dfe8f7acd8e9ca4a659d26318e442c2db85a))
|
2018-08-15 23:44:46 +02:00
|
|
|
* Fall back to buffered IO even when passed `O_DIRECT`
|
|
|
|
([commit](https://github.com/rfjakob/gocryptfs/commit/893e41149ed353f355047003b89eeff456990e76))
|
2018-07-02 23:58:55 +02:00
|
|
|
|
2018-06-10 19:30:10 +02:00
|
|
|
v1.5, 2018-06-12
|
|
|
|
* **Support extended attributes (xattr)** in forward mode
|
|
|
|
([#217](https://github.com/rfjakob/gocryptfs/issues/217)). Older gocryptfs versions
|
|
|
|
will ignore the extended attributes.
|
|
|
|
* **Add `-fsck` function**
|
|
|
|
([#191](https://github.com/rfjakob/gocryptfs/issues/191))
|
|
|
|
* Fix clobbered timestamps on MacOS High Sierra
|
|
|
|
([#229](https://github.com/rfjakob/gocryptfs/issues/229))
|
2018-03-22 00:02:10 +01:00
|
|
|
* Add `-masterkey=stdin` functionality
|
|
|
|
([#218](https://github.com/rfjakob/gocryptfs/issues/218))
|
2018-06-10 19:30:10 +02:00
|
|
|
* Accept `-dev`/`-nodev`, `suid`/`nosuid`, `-exec`/`-noexec`,
|
|
|
|
`-ro`/`-rw` flags to make mounting via `/etc/fstab` possible.
|
|
|
|
Thanks @mahkoh! ([#233](https://github.com/rfjakob/gocryptfs/pull/233),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/53d6a9999dd0e4c31636d16179f284fff35a35d9),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/10212d791a3196c2c8705a7a3cccdeb14a8efdbe))
|
|
|
|
* Fix a `logger` path issue on SuSE
|
|
|
|
[#225](https://github.com/rfjakob/gocryptfs/issues/225)
|
|
|
|
* Stop printing the help text on a "flag provided but not defined"
|
|
|
|
error ([commit](https://github.com/rfjakob/gocryptfs/commit/5ad26495fc86527bbfe75ac6b46528d49a373676))
|
2018-03-22 00:02:10 +01:00
|
|
|
|
2018-03-18 23:23:09 +01:00
|
|
|
v1.4.4, 2018-03-18
|
|
|
|
* Overwrite secrets in memory with zeros as soon as possible
|
|
|
|
([#211](https://github.com/rfjakob/gocryptfs/issues/211))
|
|
|
|
* Fix Getdents problems on i386 and mips64le
|
|
|
|
([#197](https://github.com/rfjakob/gocryptfs/issues/197),
|
|
|
|
[#200](https://github.com/rfjakob/gocryptfs/issues/200))
|
|
|
|
* Make building with gccgo work
|
|
|
|
([#201](https://github.com/rfjakob/gocryptfs/issues/201))
|
|
|
|
* MacOS: fix `osxfuse: vnode changed generation` / `Error code -36` issue in go-fuse
|
|
|
|
([#213](https://github.com/rfjakob/gocryptfs/issues/213),
|
|
|
|
[commit](https://github.com/hanwen/go-fuse/commit/a9ddcb8a4b609500fc59c89ccc9ee05f00a5fefd))
|
|
|
|
* Fix various test issues on MacOS
|
|
|
|
|
2018-01-21 20:48:38 +01:00
|
|
|
v1.4.3, 2018-01-21
|
2018-01-20 14:16:16 +01:00
|
|
|
* **Fix several symlink race attacks** in connection with reverse mode
|
|
|
|
and allow_other. Thanks to @slackner for reporting and helping to fix
|
|
|
|
the issues:
|
|
|
|
* Fix symlink races in reverse mode
|
|
|
|
([issue #165](https://github.com/rfjakob/gocryptfs/issues/165))
|
|
|
|
* Fix symlink races in connection with `-allow_other`
|
|
|
|
([issue #177](https://github.com/rfjakob/gocryptfs/issues/177))
|
|
|
|
* Fix problems with special names when using `-plaintextnames`
|
|
|
|
([issue #174](https://github.com/rfjakob/gocryptfs/issues/174))
|
|
|
|
* Add `-devrandom` command-line option
|
|
|
|
([commit](https://github.com/rfjakob/gocryptfs/commit/f3c777d5eaa682d878c638192311e52f9c204294))
|
|
|
|
* Add `-sharedstorage` command-line option
|
|
|
|
([commit](https://github.com/rfjakob/gocryptfs/commit/e36a0ebf189a826aaa63909c5518c16356f5f903),
|
|
|
|
[issue #156](https://github.com/rfjakob/gocryptfs/issues/156))
|
|
|
|
* MacOS: let OSXFuse create the mountpoint if it does not exist
|
|
|
|
([issue #194](https://github.com/rfjakob/gocryptfs/issues/194))
|
|
|
|
|
2017-11-01 19:29:11 +01:00
|
|
|
v1.4.2, 2017-11-01
|
|
|
|
* Add `Gopkg.toml` file for `dep` vendoring and reproducible builds
|
|
|
|
([issue #142](https://github.com/rfjakob/gocryptfs/issues/142))
|
|
|
|
* MacOS: deal with `.DS_Store` files inside CIPHERDIR
|
|
|
|
([issue #140](https://github.com/rfjakob/gocryptfs/issues/140))
|
|
|
|
* Reverse mode: fix ENOENT error affecting names exactly 176 bytes long
|
|
|
|
([issue #143](https://github.com/rfjakob/gocryptfs/issues/143))
|
|
|
|
* Support kernels compiled with > 128 kiB FUSE request size (Synology NAS)
|
2018-01-20 14:16:16 +01:00
|
|
|
([issue #145](https://github.com/rfjakob/gocryptfs/issues/145),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/4954c87979efaf5b8184efccc7d9a38c21e4209b))
|
2017-11-01 19:29:11 +01:00
|
|
|
* Fix a startup hang when `$PATH` contains the mountpoint
|
|
|
|
([issue #146](https://github.com/rfjakob/gocryptfs/issues/146))
|
|
|
|
|
2017-08-21 19:38:15 +02:00
|
|
|
v1.4.1, 2017-08-21
|
|
|
|
* **Use memory pools for buffer handling** (
|
|
|
|
[3c6fe98](https://github.com/rfjakob/gocryptfs/commit/3c6fe98),
|
|
|
|
[b2a23e9](https://github.com/rfjakob/gocryptfs/commit/b2a23e9),
|
|
|
|
[12c0101](https://github.com/rfjakob/gocryptfs/commit/12c0101))
|
|
|
|
* On my machine, this **doubles** the streaming read speed
|
2017-12-15 03:20:36 +01:00
|
|
|
(see [performance.txt](https://github.com/rfjakob/gocryptfs/blob/v1.4.1/Documentation/performance.txt#L38))
|
2017-08-21 19:38:15 +02:00
|
|
|
* Implement and use the getdents(2) syscall for a more efficient
|
|
|
|
OpenDir implementation
|
|
|
|
([e50a6a5](https://github.com/rfjakob/gocryptfs/commit/e50a6a5))
|
|
|
|
* Purge masterkey from memory as soon as possible
|
|
|
|
([issue #137](https://github.com/rfjakob/gocryptfs/issues/137))
|
|
|
|
* Reverse mode: fix inode number collision between .name and .diriv
|
|
|
|
files
|
|
|
|
([d12aa57](https://github.com/rfjakob/gocryptfs/commit/d12aa57))
|
|
|
|
* Prevent the logger from holding stdout open
|
|
|
|
([issue #130](https://github.com/rfjakob/gocryptfs/issues/130))
|
|
|
|
* MacOS: make testing without openssl work properly
|
|
|
|
([ccf1a84](https://github.com/rfjakob/gocryptfs/commit/ccf1a84))
|
|
|
|
* MacOS: specify a volume name
|
|
|
|
([9f8e19b](https://github.com/rfjakob/gocryptfs/commit/9f8e19b))
|
|
|
|
* Enable writing to write-only files
|
|
|
|
([issue #125](https://github.com/rfjakob/gocryptfs/issues/125))
|
|
|
|
|
2017-06-20 19:56:38 +02:00
|
|
|
v1.4, 2017-06-20
|
|
|
|
* **Switch to static binary releases**
|
|
|
|
* From gocryptfs v1.4, I will only release statically-built binaries.
|
|
|
|
These support all Linux distributions but cannot use OpenSSL.
|
|
|
|
* OpenSSL is still supported - just compile from source!
|
|
|
|
* Add `-force_owner` option to allow files to be presented as owned by a
|
2017-05-30 23:01:06 +02:00
|
|
|
different user or group from the user running gocryptfs. Please see caveats
|
|
|
|
and guidance in the man page before using this functionality.
|
2017-05-15 00:10:42 +02:00
|
|
|
* Increase open file limit to 4096 ([#82](https://github.com/rfjakob/gocryptfs/issues/82)).
|
|
|
|
* Implement path decryption via ctlsock ([#84](https://github.com/rfjakob/gocryptfs/issues/84)).
|
|
|
|
Previously, decryption was only implemented for reverse mode. Now both
|
|
|
|
normal and reverse mode support both decryption and encryption of
|
|
|
|
paths via ctlsock.
|
|
|
|
* Add more specific exit codes for the most common failure modes,
|
|
|
|
documented in [CLI_ABI.md](Documentation/CLI_ABI.md)
|
2017-05-25 21:36:49 +02:00
|
|
|
* Reverse mode: make sure hard-linked files always return the same
|
2017-08-21 19:38:15 +02:00
|
|
|
ciphertext
|
|
|
|
([commit 9ecf2d1a](https://github.com/rfjakob/gocryptfs/commit/9ecf2d1a3f69e3d995012073afe3fc664bd928f2))
|
2017-05-30 18:01:03 +02:00
|
|
|
* Display a shorter, friendlier help text by default.
|
2017-08-21 19:38:15 +02:00
|
|
|
* **Parallelize file content encryption** by splitting data blocks into two
|
2017-06-20 19:56:38 +02:00
|
|
|
threads ([ticket#116](https://github.com/rfjakob/gocryptfs/issues/116))
|
2017-08-21 19:38:15 +02:00
|
|
|
* Prefetch random nonces in the background
|
|
|
|
([commit 80516ed](https://github.com/rfjakob/gocryptfs/commit/80516ed3351477793eec882508969b6b29b69b0a))
|
2017-06-20 19:56:38 +02:00
|
|
|
* Add `-info` option to pretty-print infos about a filesystem.
|
2017-05-15 00:10:42 +02:00
|
|
|
|
2017-04-29 22:18:28 +02:00
|
|
|
v1.3, 2017-04-29
|
2017-03-05 21:59:55 +01:00
|
|
|
* **Use HKDF to derive separate keys for GCM and EME**
|
2017-03-19 19:55:40 +01:00
|
|
|
* New feature flag: `HKDF` (enabled by default)
|
|
|
|
* This is a forwards-compatible change. gocryptfs v1.3 can mount
|
2017-03-05 21:59:55 +01:00
|
|
|
filesystems created by earlier versions but not the other way round.
|
|
|
|
* Enable Raw64 filename encoding by default (gets rid of trailing `==` characters)
|
2017-03-05 17:45:59 +01:00
|
|
|
* Drop Go 1.4 compatibility. You now need Go 1.5 (released 2015-08-19)
|
2017-03-05 17:26:14 +01:00
|
|
|
or higher to build gocryptfs.
|
2017-03-19 19:48:23 +01:00
|
|
|
* Add `-serialize_reads` command-line option
|
2017-03-19 19:55:40 +01:00
|
|
|
* This can greatly improve performance on storage
|
|
|
|
that is very slow for concurrent out-of-order reads. Example:
|
2017-03-19 19:58:16 +01:00
|
|
|
Amazon Cloud Drive ([#92](https://github.com/rfjakob/gocryptfs/issues/92))
|
2017-03-20 09:29:56 +01:00
|
|
|
* Reject file-header-only files
|
|
|
|
([#90 2.2](https://github.com/rfjakob/gocryptfs/issues/90),
|
|
|
|
[commit](https://github.com/rfjakob/gocryptfs/commit/14038a1644f17f50b113a05d09a2a0a3b3e973b2))
|
2017-04-29 15:15:11 +02:00
|
|
|
* Increase max password size to 2048 bytes ([#93](https://github.com/rfjakob/gocryptfs/issues/93))
|
2017-04-01 20:21:35 +02:00
|
|
|
* Use stable 64-bit inode numbers in reverse mode
|
|
|
|
* This may cause problems for very old 32-bit applications
|
|
|
|
that were compiled without Large File Support.
|
2017-05-22 21:42:47 +02:00
|
|
|
* Passing "--" now also blocks "-o" parsing
|
2017-03-05 17:26:14 +01:00
|
|
|
|
2017-02-28 13:59:33 +01:00
|
|
|
v1.2.1, 2017-02-26
|
2017-02-26 21:34:49 +01:00
|
|
|
* Add an integrated speed test, `gocryptfs -speed`
|
|
|
|
* Limit password size to 1000 bytes and reject trailing garbage after the newline
|
|
|
|
* Make the test suite work on [Mac OS X](https://github.com/rfjakob/gocryptfs/issues/15)
|
|
|
|
* Handle additional corner cases in `-ctlsock` path sanitization
|
|
|
|
* Use dedicated exit code 12 on "password incorrect"
|
|
|
|
|
2016-12-04 19:32:23 +01:00
|
|
|
v1.2, 2016-12-04
|
2016-11-17 23:34:16 +01:00
|
|
|
* Add a control socket interface. Allows to encrypt and decrypt filenames.
|
2016-12-04 19:32:23 +01:00
|
|
|
For details see [backintime#644](https://github.com/bit-team/backintime/issues/644#issuecomment-259835183).
|
2017-03-19 19:55:40 +01:00
|
|
|
* New command-line option: `-ctlsock`
|
2016-11-17 23:34:16 +01:00
|
|
|
* Under certain circumstances, concurrent truncate and read could return
|
|
|
|
an I/O error. This is fixed by introducing a global open file table
|
2016-12-04 19:32:23 +01:00
|
|
|
that stores the file IDs
|
|
|
|
([commit](https://github.com/rfjakob/gocryptfs/commit/0489d08ae21107990d0efd0685443293aa26b35f)).
|
|
|
|
* Coalesce 4kB ciphertext block writes up to the size requested through
|
|
|
|
the write FUSE call
|
2016-11-26 13:09:05 +01:00
|
|
|
([commit with benchmarks](https://github.com/rfjakob/gocryptfs/commit/024511d9c71558be4b1169d6bb43bd18d65539e0))
|
|
|
|
* Add `-noprealloc` command-line option
|
2017-03-19 19:55:40 +01:00
|
|
|
* Greatly speeds up writes on Btrfs
|
|
|
|
([#63](https://github.com/rfjakob/gocryptfs/issues/63))
|
|
|
|
at the cost of reduced out-of-space robustness.
|
|
|
|
* This is a workaround for Btrfs' slow fallocate(2)
|
2016-12-04 19:32:23 +01:00
|
|
|
* Preserve owner for symlinks an device files (fixes bug [#64](https://github.com/rfjakob/gocryptfs/issues/64))
|
2016-12-04 20:38:48 +01:00
|
|
|
* Include rendered man page `gocryptfs.1` in the release tarball
|
2016-11-17 23:34:16 +01:00
|
|
|
|
2016-10-30 16:48:02 +01:00
|
|
|
v1.1.1, 2016-10-30
|
|
|
|
* Fix a panic on setting file timestamps ([go-fuse#131](https://github.com/hanwen/go-fuse/pull/131))
|
|
|
|
* Work around an issue in tmpfs that caused a panic in xfstests generic/075
|
|
|
|
([gocryptfs#56](https://github.com/rfjakob/gocryptfs/issues/56))
|
|
|
|
* Optimize NFS streaming writes
|
|
|
|
([commit](https://github.com/rfjakob/gocryptfs/commit/a08d55f42d5b11e265a8617bee16babceebfd026))
|
|
|
|
|
2016-10-19 22:49:57 +02:00
|
|
|
v1.1, 2016-10-19
|
2016-10-09 01:24:01 +02:00
|
|
|
* **Add reverse mode ([#19](https://github.com/rfjakob/gocryptfs/issues/19))**
|
2017-03-19 19:55:40 +01:00
|
|
|
* AES-SIV (RFC5297) encryption to implement deterministic encryption
|
|
|
|
securely. Uses the excellent
|
|
|
|
[jacobsa/crypto](https://github.com/jacobsa/crypto) library.
|
|
|
|
The corresponding feature flag is called `AESSIV`.
|
|
|
|
* New command-line options: `-reverse`, `-aessiv`
|
|
|
|
* Filesystems using reverse mode can only be mounted with gocryptfs v1.1
|
|
|
|
and later.
|
|
|
|
* The default, forward mode, stays fully compatible with older versions.
|
|
|
|
Forward mode will keep using GCM because it is much faster.
|
2016-10-09 21:29:43 +02:00
|
|
|
* Accept `-o foo,bar,baz`-style options that are passed at the end of
|
2016-10-09 20:34:49 +02:00
|
|
|
the command-line, like mount(1) does. All other options must still
|
|
|
|
precede the passed paths.
|
2017-03-19 19:55:40 +01:00
|
|
|
* This allows **mounting from /etc/fstab**. See
|
|
|
|
[#45](https://github.com/rfjakob/gocryptfs/issues/45) for details.
|
|
|
|
* **Mounting on login using pam_mount** works as well. It is
|
|
|
|
[described in the wiki](https://github.com/rfjakob/gocryptfs/wiki/Mounting-on-login-using-pam_mount).
|
2016-10-09 20:34:49 +02:00
|
|
|
* To prevent confusion, the old `-o` option had to be renamed. It is now
|
|
|
|
called `-ko`. Arguments to `-ko` are passed directly to the kernel.
|
|
|
|
* New `-passfile` command-line option. Provides an easier way to read
|
|
|
|
the password from a file. Internally, this is equivalent to
|
|
|
|
`-extpass "/bin/cat FILE"`.
|
2016-10-19 22:49:57 +02:00
|
|
|
* Enable changing the password when you only know the master key
|
|
|
|
([#28](https://github.com/rfjakob/gocryptfs/issues/28))
|
2016-10-09 00:59:00 +02:00
|
|
|
|
2016-07-17 12:19:50 +02:00
|
|
|
v1.0, 2016-07-17
|
2016-07-06 21:26:57 +02:00
|
|
|
* Deprecate very old filesystems, stage 3/3
|
2017-03-19 19:55:40 +01:00
|
|
|
* Filesystems created by v0.6 can no longer be mounted
|
|
|
|
* Drop command-line options `-gcmiv128`, `-emenames`, `-diriv`. These
|
|
|
|
are now always enabled.
|
2016-07-06 21:26:57 +02:00
|
|
|
* Add fallocate(2) support
|
|
|
|
* New command-line option `-o`
|
2017-03-19 19:55:40 +01:00
|
|
|
* Allows to pass mount options directly to the kernel
|
2016-07-06 21:26:57 +02:00
|
|
|
* Add support for device files and suid binaries
|
2017-03-19 19:55:40 +01:00
|
|
|
* Only works when running as root
|
2017-08-21 21:06:05 +02:00
|
|
|
* Must be explicitly enabled by passing "-o dev" or "-o suid" or "-o suid,dev"
|
2016-07-06 21:26:57 +02:00
|
|
|
* Experimental Mac OS X support. See
|
2016-10-30 16:57:22 +01:00
|
|
|
[ticket #15](https://github.com/rfjakob/gocryptfs/issues/15) for details.
|
2016-06-23 22:16:23 +02:00
|
|
|
|
2016-06-19 19:03:17 +02:00
|
|
|
v0.12, 2016-06-19
|
2016-07-06 21:26:57 +02:00
|
|
|
* Deprecate very old filesystems, stage 2/3
|
2017-03-19 19:55:40 +01:00
|
|
|
* Filesystems created by v0.6 and older can only be mounted read-only
|
|
|
|
* A [message](https://github.com/rfjakob/gocryptfs/blob/v0.12/internal/configfile/config_file.go#L120)
|
|
|
|
explaining the situation is printed as well
|
2016-06-16 23:37:43 +02:00
|
|
|
* New command line option: `-ro`
|
2017-03-19 19:55:40 +01:00
|
|
|
* Mounts the filesystem read-only
|
2016-06-19 19:03:17 +02:00
|
|
|
* Accept password from stdin as well ([ticket #30](https://github.com/rfjakob/gocryptfs/issues/30))
|
2016-06-16 23:37:43 +02:00
|
|
|
|
2016-06-10 09:54:35 +02:00
|
|
|
v0.11, 2016-06-10
|
2016-07-06 21:26:57 +02:00
|
|
|
* Deprecate very old filesystems, stage 1/3
|
2017-03-19 19:55:40 +01:00
|
|
|
* Filesystems created by v0.6 and older can still be mounted but a
|
|
|
|
[warning](https://github.com/rfjakob/gocryptfs/blob/v0.11/internal/configfile/config_file.go#L120)
|
|
|
|
is printed
|
|
|
|
* See [ticket #29](https://github.com/rfjakob/gocryptfs/issues/29) for details and
|
|
|
|
join the discussion
|
2016-06-10 09:33:06 +02:00
|
|
|
* Add rsync stress test "pingpong-rsync.bash"
|
2017-03-19 19:55:40 +01:00
|
|
|
* Fix chown and utimens failures that caused rsync to complain
|
2016-06-10 09:52:49 +02:00
|
|
|
* Build release binaries with Go 1.6.2
|
2017-03-19 19:55:40 +01:00
|
|
|
* Big speedup for CPUs with AES-NI, see [ticket #23](https://github.com/rfjakob/gocryptfs/issues/23)
|
2016-06-10 09:33:06 +02:00
|
|
|
|
2016-05-30 21:04:33 +02:00
|
|
|
v0.10, 2016-05-30
|
|
|
|
* **Replace `spacemonkeygo/openssl` with `stupidgcm`**
|
2017-03-19 19:55:40 +01:00
|
|
|
* gocryptfs now has its own thin wrapper to OpenSSL's GCM implementation
|
|
|
|
called `stupidgcm`.
|
|
|
|
* This should fix the [compile issues](https://github.com/rfjakob/gocryptfs/issues/21)
|
|
|
|
people are seeing with `spacemonkeygo/openssl`. It also gets us
|
|
|
|
a 20% performance boost for streaming writes.
|
2016-05-13 22:18:17 +02:00
|
|
|
* **Automatically choose between OpenSSL and Go crypto** [issue #23](https://github.com/rfjakob/gocryptfs/issues/23)
|
2017-03-19 19:55:40 +01:00
|
|
|
* Go 1.6 added an optimized GCM implementation in amd64 assembly that uses AES-NI.
|
|
|
|
This is faster than OpenSSL and is used if available. In all other
|
|
|
|
cases OpenSSL is much faster and is used instead.
|
|
|
|
* `-openssl=auto` is the new default
|
|
|
|
* Passing `-openssl=true/false` overrides the autodetection.
|
2016-05-30 21:04:33 +02:00
|
|
|
* Warn but continue anyway if fallocate(2) is not supported by the
|
|
|
|
underlying filesystem, see [issue #22](https://github.com/rfjakob/gocryptfs/issues/22)
|
2017-03-19 19:55:40 +01:00
|
|
|
* Enables to use gocryptfs on ZFS and ext3, albeit with reduced out-of-space safety.
|
2016-05-13 22:18:17 +02:00
|
|
|
* [Fix statfs](https://github.com/rfjakob/gocryptfs/pull/27), by @lxp
|
2016-05-25 00:28:22 +02:00
|
|
|
* Fix a fsstress [failure](https://github.com/hanwen/go-fuse/issues/106)
|
|
|
|
in the go-fuse library.
|
2016-05-04 19:55:20 +02:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.9, 2016-04-10
|
2016-04-10 23:01:00 +02:00
|
|
|
* **Long file name support**
|
2017-03-19 19:55:40 +01:00
|
|
|
* gocryptfs now supports file names up to 255 characters.
|
|
|
|
* This is a forwards-compatible change. gocryptfs v0.9 can mount filesystems
|
2016-04-03 23:11:46 +02:00
|
|
|
created by earlier versions but not the other way round.
|
|
|
|
* Refactor gocryptfs into multiple "internal" packages
|
|
|
|
* New command-line options:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-longnames`: Enable long file name support (default true)
|
|
|
|
* `-nosyslog`: Print messages to stdout and stderr instead of syslog (default false)
|
|
|
|
* `-wpanic`: Make warning messages fatal (used for testing)
|
|
|
|
* `-d`: Alias for `-debug`
|
|
|
|
* `-q`: Alias for `-quiet`
|
2016-04-03 23:11:46 +02:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.8, 2016-01-23
|
2016-01-23 19:35:51 +01:00
|
|
|
* Redirect output to syslog when running in the background
|
|
|
|
* New command-line option:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-memprofile`: Write a memory allocation debugging profile the specified
|
|
|
|
file
|
2016-01-23 19:35:51 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.7.2, 2016-01-19
|
2016-01-19 23:08:10 +01:00
|
|
|
* **Fix performance issue in small file creation**
|
2017-03-19 19:55:40 +01:00
|
|
|
* This brings performance on-par with EncFS paranoia mode, with streaming writes
|
|
|
|
significantly faster
|
|
|
|
* The actual [fix](https://github.com/hanwen/go-fuse/commit/c4b6b7949716d13eec856baffc7b7941ae21778c)
|
|
|
|
is in the go-fuse library. There are no code changes in gocryptfs.
|
2016-01-19 22:56:33 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.7.1, 2016-01-09
|
2016-01-09 15:31:58 +01:00
|
|
|
* Make the `build.bash` script compatible with Go 1.3
|
2018-12-27 12:03:00 +01:00
|
|
|
* Disable fallocate on OSX (system call not available)
|
2016-01-09 15:31:58 +01:00
|
|
|
* Introduce pre-built binaries for Fedora 23 and Debian 8
|
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.7, 2015-12-20
|
2015-12-20 15:42:52 +01:00
|
|
|
* **Extend GCM IV size to 128 bit from Go's default of 96 bit**
|
2017-03-19 19:55:40 +01:00
|
|
|
* This pushes back the birthday bound to make IV collisions virtually
|
|
|
|
impossible
|
|
|
|
* This is a forwards-compatible change. gocryptfs v0.7 can mount filesystems
|
|
|
|
created by earlier versions but not the other way round.
|
2015-12-20 15:42:52 +01:00
|
|
|
* New command-line option:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-gcmiv128`: Use 128-bit GCM IVs (default true)
|
2015-12-20 15:42:52 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.6, 2015-12-08
|
2015-12-08 16:41:45 +01:00
|
|
|
* **Wide-block filename encryption using EME + DirIV**
|
2017-03-19 19:55:40 +01:00
|
|
|
* EME (ECB-Mix-ECB) provides even better security than CBC as it fixes
|
|
|
|
the prefix leak. The used Go EME implementation is
|
|
|
|
https://github.com/rfjakob/eme which is, as far as I know, the first
|
|
|
|
implementation of EME in Go.
|
|
|
|
* This is a forwards-compatible change. gocryptfs v0.6 can mount filesystems
|
|
|
|
created by earlier versions but not the other way round.
|
2015-12-08 16:41:45 +01:00
|
|
|
* New command-line option:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-emenames`: Enable EME filename encryption (default true)
|
2015-12-08 16:41:45 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.5.1, 2015-12-06
|
2016-01-09 15:31:58 +01:00
|
|
|
* Fix a rename regression caused by DirIV and add test case
|
|
|
|
* Use fallocate to guard against out-of-space errors
|
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.5, 2015-12-04
|
2015-11-29 22:36:25 +01:00
|
|
|
* **Stronger filename encryption: DirIV**
|
2017-03-19 19:55:40 +01:00
|
|
|
* Each directory gets a random 128 bit file name IV on creation,
|
|
|
|
stored in `gocryptfs.diriv`
|
|
|
|
* This makes it impossible to identify identically-named files across
|
|
|
|
directories
|
|
|
|
* A single-entry IV cache brings the performance cost of DirIV close to
|
|
|
|
zero for common operations (see performance.txt)
|
|
|
|
* This is a forwards-compatible change. gocryptfs v0.5 can mount filesystems
|
|
|
|
created by earlier versions but not the other way round.
|
2015-11-29 22:36:25 +01:00
|
|
|
* New command-line option:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-diriv`: Use the new per-directory IV file name encryption (default true)
|
|
|
|
* `-scryptn`: allows to set the scrypt cost parameter N. This option
|
|
|
|
can be used for faster mounting at the cost of lower brute-force
|
|
|
|
resistance. It was mainly added to speed up the automated tests.
|
2015-11-29 22:36:25 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.4, 2015-11-15
|
2015-11-15 16:06:19 +01:00
|
|
|
* New command-line options:
|
2017-03-19 19:55:40 +01:00
|
|
|
* `-plaintextnames`: disables filename encryption, added on user request
|
|
|
|
* `-extpass`: calls an external program for prompting for the password
|
|
|
|
* `-config`: allows to specify a custom gocryptfs.conf path
|
2018-12-27 12:03:00 +01:00
|
|
|
* Add `FeatureFlags` gocryptfs.conf parameter
|
2017-03-19 19:55:40 +01:00
|
|
|
* This is a config format change, hence the on-disk format is incremented
|
|
|
|
* Used for ext4-style filesystem feature flags. This should help avoid future
|
|
|
|
format changes. The first user is `-plaintextnames`.
|
2015-11-03 00:08:31 +01:00
|
|
|
* On-disk format 2
|
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.3, 2015-11-01
|
2015-11-29 22:36:25 +01:00
|
|
|
* **Add a random 128 bit file header to authenticate file->block ownership**
|
2017-03-19 19:55:40 +01:00
|
|
|
* This is an on-disk-format change
|
2015-11-01 14:07:42 +01:00
|
|
|
* On-disk format 1
|
2015-11-01 01:32:33 +01:00
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.2, 2015-10-11
|
2015-11-01 01:32:33 +01:00
|
|
|
* Replace bash daemonization wrapper with native Go implementation
|
|
|
|
* Better user feedback on mount failures
|
|
|
|
|
2016-05-25 00:28:22 +02:00
|
|
|
v0.1, 2015-10-07
|
2015-11-01 01:32:33 +01:00
|
|
|
* First release
|
2015-11-01 14:07:42 +01:00
|
|
|
* On-disk format 0
|