fusefrontend: make openBackingDir() symlink-safe
openBackingDir() used encryptPath(), which is not symlink-safe itself. Drop encryptPath() and implement our own directory walk. Adds three seconds to untar and two seconds to rm: $ ./benchmark.bash Testing gocryptfs at /tmp/benchmark.bash.MzG: gocryptfs v1.6-36-g8fb3c2f-dirty; go-fuse v20170619-66-g6df8ddc; 2018-10-14 go1.11 WRITE: 262144000 bytes (262 MB, 250 MiB) copied, 1.25078 s, 210 MB/s READ: 262144000 bytes (262 MB, 250 MiB) copied, 1.0318 s, 254 MB/s UNTAR: 20.941 MD5: 11.568 LS: 1.638 RM: 5.337
This commit is contained in:
parent
0e2e7c13cf
commit
932efbd459
@ -4,8 +4,11 @@ package fusefrontend
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
"github.com/rfjakob/gocryptfs/internal/configfile"
|
"github.com/rfjakob/gocryptfs/internal/configfile"
|
||||||
|
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
||||||
"github.com/rfjakob/gocryptfs/internal/syscallcompat"
|
"github.com/rfjakob/gocryptfs/internal/syscallcompat"
|
||||||
"github.com/rfjakob/gocryptfs/internal/tlog"
|
"github.com/rfjakob/gocryptfs/internal/tlog"
|
||||||
)
|
)
|
||||||
@ -42,19 +45,53 @@ func (fs *FS) getBackingPath(relPath string) (string, error) {
|
|||||||
|
|
||||||
// openBackingDir opens the parent ciphertext directory of plaintext path
|
// openBackingDir opens the parent ciphertext directory of plaintext path
|
||||||
// "relPath" and returns the dirfd and the encrypted basename.
|
// "relPath" and returns the dirfd and the encrypted basename.
|
||||||
|
//
|
||||||
// The caller should then use Openat(dirfd, cName, ...) and friends.
|
// The caller should then use Openat(dirfd, cName, ...) and friends.
|
||||||
// openBackingDir is secure against symlink races.
|
// For convenience, if relPath is "", cName is going to be ".".
|
||||||
|
//
|
||||||
|
// openBackingDir is secure against symlink races by using Openat and
|
||||||
|
// ReadDirIVAt.
|
||||||
func (fs *FS) openBackingDir(relPath string) (dirfd int, cName string, err error) {
|
func (fs *FS) openBackingDir(relPath string) (dirfd int, cName string, err error) {
|
||||||
cRelPath, err := fs.encryptPath(relPath)
|
// With PlaintextNames, we don't need to read DirIVs. Easy.
|
||||||
|
if fs.args.PlaintextNames {
|
||||||
|
dir := nametransform.Dir(relPath)
|
||||||
|
dirfd, err = syscallcompat.OpenDirNofollow(fs.args.Cipherdir, dir)
|
||||||
|
if err != nil {
|
||||||
|
return -1, "", err
|
||||||
|
}
|
||||||
|
// If relPath is empty, cName is ".".
|
||||||
|
cName = filepath.Base(relPath)
|
||||||
|
return dirfd, cName, nil
|
||||||
|
}
|
||||||
|
// Open cipherdir (following symlinks)
|
||||||
|
dirfd, err = syscall.Open(fs.args.Cipherdir, syscall.O_RDONLY|syscall.O_DIRECTORY|syscallcompat.O_PATH, 0)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return -1, "", err
|
return -1, "", err
|
||||||
}
|
}
|
||||||
// Open parent dir
|
// If relPath is empty, cName is ".".
|
||||||
dirfd, err = syscallcompat.OpenDirNofollow(fs.args.Cipherdir, filepath.Dir(cRelPath))
|
if relPath == "" {
|
||||||
if err != nil {
|
return dirfd, ".", nil
|
||||||
return -1, "", err
|
}
|
||||||
|
// Walk the directory tree
|
||||||
|
parts := strings.Split(relPath, "/")
|
||||||
|
for i, name := range parts {
|
||||||
|
iv, err := nametransform.ReadDirIVAt(dirfd)
|
||||||
|
if err != nil {
|
||||||
|
return -1, "", err
|
||||||
|
}
|
||||||
|
cName = fs.nameTransform.EncryptAndHashName(name, iv)
|
||||||
|
// Last part? We are done.
|
||||||
|
if i == len(parts)-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
// Not the last part? Descend into next directory.
|
||||||
|
dirfd2, err := syscallcompat.Openat(dirfd, cName, syscall.O_RDONLY|syscall.O_NOFOLLOW|syscall.O_DIRECTORY|syscallcompat.O_PATH, 0)
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
if err != nil {
|
||||||
|
return -1, "", err
|
||||||
|
}
|
||||||
|
dirfd = dirfd2
|
||||||
}
|
}
|
||||||
cName = filepath.Base(cRelPath)
|
|
||||||
return dirfd, cName, nil
|
return dirfd, cName, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
152
internal/fusefrontend/names_test.go
Normal file
152
internal/fusefrontend/names_test.go
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
package fusefrontend
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
|
|
||||||
|
"github.com/rfjakob/gocryptfs/internal/syscallcompat"
|
||||||
|
"github.com/rfjakob/gocryptfs/tests/test_helpers"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestOpenBackingDir(t *testing.T) {
|
||||||
|
cipherdir := test_helpers.InitFS(t)
|
||||||
|
args := Args{
|
||||||
|
Cipherdir: cipherdir,
|
||||||
|
}
|
||||||
|
fs := newTestFS(args)
|
||||||
|
|
||||||
|
code := fs.Mkdir("dir1", 0700, nil)
|
||||||
|
if !code.Ok() {
|
||||||
|
t.Fatal(code)
|
||||||
|
}
|
||||||
|
code = fs.Mkdir("dir1/dir2", 0700, nil)
|
||||||
|
if !code.Ok() {
|
||||||
|
t.Fatal(code)
|
||||||
|
}
|
||||||
|
|
||||||
|
dirfd, cName, err := fs.openBackingDir("")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName != "." {
|
||||||
|
t.Fatal("cName should be .")
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, ".", unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
|
||||||
|
dirfd, cName, err = fs.openBackingDir("dir1")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName == "" {
|
||||||
|
t.Fatal("cName should not be empty")
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
|
||||||
|
dirfd, cName, err = fs.openBackingDir("dir1/dir2")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName == "" {
|
||||||
|
t.Fatal("cName should not be empty")
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
|
||||||
|
n255 := strings.Repeat("n", 255)
|
||||||
|
path := "dir1/" + n255
|
||||||
|
fs.Mkdir(path, 0700, nil)
|
||||||
|
dirfd, cName, err = fs.openBackingDir(path)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName == "" {
|
||||||
|
t.Fatal("cName should not be empty")
|
||||||
|
}
|
||||||
|
if len(cName) >= 255 {
|
||||||
|
t.Fatalf("cName is too long: %q", cName)
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestOpenBackingDirPlaintextNames(t *testing.T) {
|
||||||
|
cipherdir := test_helpers.InitFS(t, "-plaintextnames")
|
||||||
|
args := Args{
|
||||||
|
Cipherdir: cipherdir,
|
||||||
|
PlaintextNames: true,
|
||||||
|
}
|
||||||
|
fs := newTestFS(args)
|
||||||
|
|
||||||
|
code := fs.Mkdir("dir1", 0700, nil)
|
||||||
|
if !code.Ok() {
|
||||||
|
t.Fatal(code)
|
||||||
|
}
|
||||||
|
code = fs.Mkdir("dir1/dir2", 0700, nil)
|
||||||
|
if !code.Ok() {
|
||||||
|
t.Fatal(code)
|
||||||
|
}
|
||||||
|
|
||||||
|
dirfd, cName, err := fs.openBackingDir("")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName != "." {
|
||||||
|
t.Fatal("cName should be .")
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, ".", unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
|
||||||
|
dirfd, cName, err = fs.openBackingDir("dir1")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName != "dir1" {
|
||||||
|
t.Fatalf("wrong cName: %q", cName)
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
|
||||||
|
dirfd, cName, err = fs.openBackingDir("dir1/dir2")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if cName != "dir2" {
|
||||||
|
t.Fatalf("wrong cName: %q", cName)
|
||||||
|
}
|
||||||
|
err = syscallcompat.Faccessat(dirfd, cName, unix.R_OK)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
syscall.Close(dirfd)
|
||||||
|
}
|
@ -11,18 +11,17 @@ import (
|
|||||||
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
||||||
)
|
)
|
||||||
|
|
||||||
func newTestFS() *FS {
|
func newTestFS(args Args) *FS {
|
||||||
// Init crypto backend
|
// Init crypto backend
|
||||||
key := make([]byte, cryptocore.KeyLen)
|
key := make([]byte, cryptocore.KeyLen)
|
||||||
cCore := cryptocore.New(key, cryptocore.BackendGoGCM, contentenc.DefaultIVBits, true, false)
|
cCore := cryptocore.New(key, cryptocore.BackendGoGCM, contentenc.DefaultIVBits, true, false)
|
||||||
cEnc := contentenc.New(cCore, contentenc.DefaultBS, false)
|
cEnc := contentenc.New(cCore, contentenc.DefaultBS, false)
|
||||||
nameTransform := nametransform.New(cCore.EMECipher, true, true)
|
nameTransform := nametransform.New(cCore.EMECipher, true, true)
|
||||||
args := Args{}
|
|
||||||
return NewFS(args, cEnc, nameTransform)
|
return NewFS(args, cEnc, nameTransform)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestEncryptDecryptXattrName(t *testing.T) {
|
func TestEncryptDecryptXattrName(t *testing.T) {
|
||||||
fs := newTestFS()
|
fs := newTestFS(Args{})
|
||||||
attr1 := "user.foo123456789"
|
attr1 := "user.foo123456789"
|
||||||
cAttr := fs.encryptXattrName(attr1)
|
cAttr := fs.encryptXattrName(attr1)
|
||||||
t.Logf("cAttr=%v", cAttr)
|
t.Logf("cAttr=%v", cAttr)
|
||||||
|
@ -121,7 +121,7 @@ func WriteDirIV(dirfd int, dir string) error {
|
|||||||
|
|
||||||
// encryptAndHashName encrypts "name" and hashes it to a longname if it is
|
// encryptAndHashName encrypts "name" and hashes it to a longname if it is
|
||||||
// too long.
|
// too long.
|
||||||
func (be *NameTransform) encryptAndHashName(name string, iv []byte) string {
|
func (be *NameTransform) EncryptAndHashName(name string, iv []byte) string {
|
||||||
cName := be.EncryptName(name, iv)
|
cName := be.EncryptName(name, iv)
|
||||||
if be.longNames && len(cName) > unix.NAME_MAX {
|
if be.longNames && len(cName) > unix.NAME_MAX {
|
||||||
return be.HashLongName(cName)
|
return be.HashLongName(cName)
|
||||||
@ -132,6 +132,9 @@ func (be *NameTransform) encryptAndHashName(name string, iv []byte) string {
|
|||||||
// EncryptPathDirIV - encrypt relative plaintext path "plainPath" using EME with
|
// EncryptPathDirIV - encrypt relative plaintext path "plainPath" using EME with
|
||||||
// DirIV. "rootDir" is the backing storage root directory.
|
// DirIV. "rootDir" is the backing storage root directory.
|
||||||
// Components that are longer than 255 bytes are hashed if be.longnames == true.
|
// Components that are longer than 255 bytes are hashed if be.longnames == true.
|
||||||
|
//
|
||||||
|
// TODO: EncryptPathDirIV is NOT SAFE against symlink races. This function
|
||||||
|
// should eventually be deleted.
|
||||||
func (be *NameTransform) EncryptPathDirIV(plainPath string, rootDir string) (string, error) {
|
func (be *NameTransform) EncryptPathDirIV(plainPath string, rootDir string) (string, error) {
|
||||||
var err error
|
var err error
|
||||||
// Empty string means root directory
|
// Empty string means root directory
|
||||||
@ -148,7 +151,7 @@ func (be *NameTransform) EncryptPathDirIV(plainPath string, rootDir string) (str
|
|||||||
// in the tar extract benchmark.
|
// in the tar extract benchmark.
|
||||||
parentDir := Dir(plainPath)
|
parentDir := Dir(plainPath)
|
||||||
if iv, cParentDir := be.DirIVCache.Lookup(parentDir); iv != nil {
|
if iv, cParentDir := be.DirIVCache.Lookup(parentDir); iv != nil {
|
||||||
cBaseName := be.encryptAndHashName(baseName, iv)
|
cBaseName := be.EncryptAndHashName(baseName, iv)
|
||||||
return filepath.Join(cParentDir, cBaseName), nil
|
return filepath.Join(cParentDir, cBaseName), nil
|
||||||
}
|
}
|
||||||
// We have to walk the directory tree, starting at the root directory.
|
// We have to walk the directory tree, starting at the root directory.
|
||||||
@ -166,7 +169,7 @@ func (be *NameTransform) EncryptPathDirIV(plainPath string, rootDir string) (str
|
|||||||
}
|
}
|
||||||
be.DirIVCache.Store(plainWD, iv, cipherWD)
|
be.DirIVCache.Store(plainWD, iv, cipherWD)
|
||||||
}
|
}
|
||||||
cipherName := be.encryptAndHashName(plainName, iv)
|
cipherName := be.EncryptAndHashName(plainName, iv)
|
||||||
cipherWD = filepath.Join(cipherWD, cipherName)
|
cipherWD = filepath.Join(cipherWD, cipherName)
|
||||||
plainWD = filepath.Join(plainWD, plainName)
|
plainWD = filepath.Join(plainWD, plainName)
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user