d48ccb3dda
Prior to this commit, gocryptfs's reverse mode did not report correct directory entry sizes for symbolic links, where the dentry size needs to be the same as the length of a string containing the target path. This commit corrects this issue and adds a test case to verify the correctness of the implementation. This issue was discovered during the use of a strict file copying program on a reverse-mounted gocryptfs file system.
370 lines
11 KiB
Go
370 lines
11 KiB
Go
package fusefrontend_reverse
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
"syscall"
|
|
|
|
"github.com/hanwen/go-fuse/fuse"
|
|
"github.com/hanwen/go-fuse/fuse/nodefs"
|
|
"github.com/hanwen/go-fuse/fuse/pathfs"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/configfile"
|
|
"github.com/rfjakob/gocryptfs/internal/contentenc"
|
|
"github.com/rfjakob/gocryptfs/internal/cryptocore"
|
|
"github.com/rfjakob/gocryptfs/internal/fusefrontend"
|
|
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
|
"github.com/rfjakob/gocryptfs/internal/tlog"
|
|
)
|
|
|
|
const (
|
|
// DirIVMode is the mode to use for Dir IV files.
|
|
DirIVMode = syscall.S_IFREG | 0400
|
|
)
|
|
|
|
// ReverseFS implements the pathfs.FileSystem interface and provides an
|
|
// encrypted view of a plaintext directory.
|
|
type ReverseFS struct {
|
|
// Embed pathfs.defaultFileSystem for a ENOSYS implementation of all methods
|
|
pathfs.FileSystem
|
|
// pathfs.loopbackFileSystem, see go-fuse/fuse/pathfs/loopback.go
|
|
loopbackfs pathfs.FileSystem
|
|
// Stores configuration arguments
|
|
args fusefrontend.Args
|
|
// Filename encryption helper
|
|
nameTransform *nametransform.NameTransform
|
|
// Content encryption helper
|
|
contentEnc *contentenc.ContentEnc
|
|
// Inode number generator
|
|
inoGen *inoGenT
|
|
// Maps backing files device+inode pairs to user-facing unique inode numbers
|
|
inoMap map[fusefrontend.DevInoStruct]uint64
|
|
// Protects map access
|
|
inoMapLock sync.Mutex
|
|
}
|
|
|
|
var _ pathfs.FileSystem = &ReverseFS{}
|
|
|
|
// NewFS returns an encrypted FUSE overlay filesystem.
|
|
// In this case (reverse mode) the backing directory is plain-text and
|
|
// ReverseFS provides an encrypted view.
|
|
func NewFS(args fusefrontend.Args) *ReverseFS {
|
|
if args.CryptoBackend != cryptocore.BackendAESSIV {
|
|
log.Panic("reverse mode must use AES-SIV, everything else is insecure")
|
|
}
|
|
initLongnameCache()
|
|
cryptoCore := cryptocore.New(args.Masterkey, args.CryptoBackend, contentenc.DefaultIVBits, args.HKDF)
|
|
contentEnc := contentenc.New(cryptoCore, contentenc.DefaultBS)
|
|
nameTransform := nametransform.New(cryptoCore.EMECipher, args.LongNames, args.Raw64)
|
|
|
|
return &ReverseFS{
|
|
// pathfs.defaultFileSystem returns ENOSYS for all operations
|
|
FileSystem: pathfs.NewDefaultFileSystem(),
|
|
loopbackfs: pathfs.NewLoopbackFileSystem(args.Cipherdir),
|
|
args: args,
|
|
nameTransform: nameTransform,
|
|
contentEnc: contentEnc,
|
|
inoGen: newInoGen(),
|
|
inoMap: map[fusefrontend.DevInoStruct]uint64{},
|
|
}
|
|
}
|
|
|
|
// relDir is identical to filepath.Dir excepts that it returns "" when
|
|
// filepath.Dir would return ".".
|
|
// In the FUSE API, the root directory is called "", and we actually want that.
|
|
func relDir(path string) string {
|
|
dir := filepath.Dir(path)
|
|
if dir == "." {
|
|
return ""
|
|
}
|
|
return dir
|
|
}
|
|
|
|
// dirIVAttr handles GetAttr requests for the virtual gocryptfs.diriv files.
|
|
func (rfs *ReverseFS) dirIVAttr(relPath string, context *fuse.Context) (*fuse.Attr, fuse.Status) {
|
|
cDir := relDir(relPath)
|
|
dir, err := rfs.decryptPath(cDir)
|
|
if err != nil {
|
|
fmt.Printf("decrypt err %q\n", cDir)
|
|
return nil, fuse.ToStatus(err)
|
|
}
|
|
// Does the parent dir exist?
|
|
a, status := rfs.loopbackfs.GetAttr(dir, context)
|
|
if !status.Ok() {
|
|
fmt.Printf("missing parent\n")
|
|
return nil, status
|
|
}
|
|
// Is it a dir at all?
|
|
if !a.IsDir() {
|
|
fmt.Printf("not isdir\n")
|
|
return nil, fuse.ENOTDIR
|
|
}
|
|
// Does the user have execute permissions?
|
|
if a.Mode&syscall.S_IXUSR == 0 {
|
|
fmt.Printf("not exec")
|
|
return nil, fuse.EPERM
|
|
}
|
|
// All good. Let's fake the file. We use the timestamps from the parent dir.
|
|
a.Mode = DirIVMode
|
|
a.Size = nametransform.DirIVLen
|
|
a.Nlink = 1
|
|
a.Ino = rfs.inoGen.next()
|
|
|
|
return a, fuse.OK
|
|
}
|
|
|
|
// isDirIV determines if the path points to a gocryptfs.diriv file
|
|
func (rfs *ReverseFS) isDirIV(relPath string) bool {
|
|
if rfs.args.PlaintextNames {
|
|
return false
|
|
}
|
|
return filepath.Base(relPath) == nametransform.DirIVFilename
|
|
}
|
|
|
|
// isNameFile determines if the path points to a gocryptfs.longname.*.name
|
|
// file
|
|
func (rfs *ReverseFS) isNameFile(relPath string) bool {
|
|
if rfs.args.PlaintextNames {
|
|
return false
|
|
}
|
|
fileType := nametransform.NameType(filepath.Base(relPath))
|
|
return fileType == nametransform.LongNameFilename
|
|
}
|
|
|
|
// isTranslatedConfig returns true if the default config file name is in
|
|
// and the ciphertext path is "gocryptfs.conf".
|
|
// "gocryptfs.conf" then maps to ".gocryptfs.reverse.conf" in the plaintext
|
|
// directory.
|
|
func (rfs *ReverseFS) isTranslatedConfig(relPath string) bool {
|
|
if rfs.args.ConfigCustom {
|
|
return false
|
|
}
|
|
if relPath == configfile.ConfDefaultName {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (rfs *ReverseFS) inoAwareStat(relPlainPath string) (*fuse.Attr, fuse.Status) {
|
|
absPath, err := rfs.abs(relPlainPath, nil)
|
|
if err != nil {
|
|
return nil, fuse.ToStatus(err)
|
|
}
|
|
var fi os.FileInfo
|
|
if relPlainPath == "" {
|
|
// Look through symlinks for the root dir
|
|
fi, err = os.Stat(absPath)
|
|
} else {
|
|
fi, err = os.Lstat(absPath)
|
|
}
|
|
if err != nil {
|
|
return nil, fuse.ToStatus(err)
|
|
}
|
|
st := fi.Sys().(*syscall.Stat_t)
|
|
// The file has hard links. We have to give it a stable inode number so
|
|
// tar or rsync can find them.
|
|
if fi.Mode().IsRegular() && st.Nlink > 1 {
|
|
di := fusefrontend.DevInoFromStat(st)
|
|
rfs.inoMapLock.Lock()
|
|
stableIno := rfs.inoMap[di]
|
|
if stableIno == 0 {
|
|
rfs.inoMap[di] = rfs.inoGen.next()
|
|
}
|
|
rfs.inoMapLock.Unlock()
|
|
st.Ino = stableIno
|
|
} else {
|
|
st.Ino = rfs.inoGen.next()
|
|
}
|
|
a := &fuse.Attr{}
|
|
a.FromStat(st)
|
|
return a, fuse.OK
|
|
}
|
|
|
|
// GetAttr - FUSE call
|
|
func (rfs *ReverseFS) GetAttr(relPath string, context *fuse.Context) (*fuse.Attr, fuse.Status) {
|
|
if rfs.isTranslatedConfig(relPath) {
|
|
return rfs.inoAwareStat(configfile.ConfReverseName)
|
|
}
|
|
// Handle virtual files
|
|
var f nodefs.File
|
|
var status fuse.Status
|
|
virtual := false
|
|
if rfs.isDirIV(relPath) {
|
|
virtual = true
|
|
f, status = rfs.newDirIVFile(relPath)
|
|
}
|
|
if rfs.isNameFile(relPath) {
|
|
virtual = true
|
|
f, status = rfs.newNameFile(relPath)
|
|
}
|
|
if virtual {
|
|
if !status.Ok() {
|
|
fmt.Printf("GetAttr %q: newXFile failed: %v\n", relPath, status)
|
|
return nil, status
|
|
}
|
|
var a fuse.Attr
|
|
status = f.GetAttr(&a)
|
|
return &a, status
|
|
}
|
|
|
|
cPath, err := rfs.decryptPath(relPath)
|
|
if err != nil {
|
|
return nil, fuse.ToStatus(err)
|
|
}
|
|
a, status := rfs.inoAwareStat(cPath)
|
|
if !status.Ok() {
|
|
return nil, status
|
|
}
|
|
// Calculate encrypted file size
|
|
if a.IsRegular() {
|
|
a.Size = rfs.contentEnc.PlainSizeToCipherSize(a.Size)
|
|
} else if a.IsSymlink() {
|
|
var linkTarget string
|
|
var readlinkStatus fuse.Status
|
|
|
|
linkTarget, readlinkStatus = rfs.Readlink(relPath, context)
|
|
if !readlinkStatus.Ok() {
|
|
return nil, readlinkStatus
|
|
}
|
|
|
|
a.Size = uint64(len(linkTarget))
|
|
}
|
|
return a, fuse.OK
|
|
}
|
|
|
|
// Access - FUSE call
|
|
func (rfs *ReverseFS) Access(relPath string, mode uint32, context *fuse.Context) fuse.Status {
|
|
if rfs.isTranslatedConfig(relPath) || rfs.isDirIV(relPath) || rfs.isNameFile(relPath) {
|
|
// Virtual files can always be read and never written
|
|
var R_OK uint32 = 4
|
|
if mode == R_OK || mode == 0 {
|
|
return fuse.OK
|
|
} else {
|
|
return fuse.EPERM
|
|
}
|
|
}
|
|
absPath, err := rfs.abs(rfs.decryptPath(relPath))
|
|
if err != nil {
|
|
return fuse.ToStatus(err)
|
|
}
|
|
return fuse.ToStatus(syscall.Access(absPath, mode))
|
|
}
|
|
|
|
// Open - FUSE call
|
|
func (rfs *ReverseFS) Open(relPath string, flags uint32, context *fuse.Context) (fuseFile nodefs.File, status fuse.Status) {
|
|
if rfs.isTranslatedConfig(relPath) {
|
|
return rfs.loopbackfs.Open(configfile.ConfReverseName, flags, context)
|
|
}
|
|
if rfs.isDirIV(relPath) {
|
|
return rfs.newDirIVFile(relPath)
|
|
}
|
|
if rfs.isNameFile(relPath) {
|
|
return rfs.newNameFile(relPath)
|
|
}
|
|
return rfs.newFile(relPath, flags)
|
|
}
|
|
|
|
func (rfs *ReverseFS) openDirPlaintextnames(relPath string, entries []fuse.DirEntry) ([]fuse.DirEntry, fuse.Status) {
|
|
if relPath != "" || rfs.args.ConfigCustom {
|
|
return entries, fuse.OK
|
|
}
|
|
// We are in the root dir and the default config file name
|
|
// ".gocryptfs.reverse.conf" is used. We map it to "gocryptfs.conf".
|
|
dupe := -1
|
|
status := fuse.OK
|
|
for i := range entries {
|
|
if entries[i].Name == configfile.ConfReverseName {
|
|
entries[i].Name = configfile.ConfDefaultName
|
|
} else if entries[i].Name == configfile.ConfDefaultName {
|
|
dupe = i
|
|
}
|
|
}
|
|
if dupe >= 0 {
|
|
// Warn the user loudly: The gocryptfs.conf_NAME_COLLISION file will
|
|
// throw ENOENT errors that are hard to miss.
|
|
tlog.Warn.Printf("The file %s is mapped to %s and shadows another file. Please rename %s in %s .",
|
|
configfile.ConfReverseName, configfile.ConfDefaultName, configfile.ConfDefaultName, rfs.args.Cipherdir)
|
|
entries[dupe].Name = "gocryptfs.conf_NAME_COLLISION_" + fmt.Sprintf("%d", cryptocore.RandUint64())
|
|
}
|
|
return entries, status
|
|
}
|
|
|
|
// OpenDir - FUSE readdir call
|
|
func (rfs *ReverseFS) OpenDir(cipherPath string, context *fuse.Context) ([]fuse.DirEntry, fuse.Status) {
|
|
relPath, err := rfs.decryptPath(cipherPath)
|
|
if err != nil {
|
|
return nil, fuse.ToStatus(err)
|
|
}
|
|
// Read plaintext dir
|
|
entries, status := rfs.loopbackfs.OpenDir(relPath, context)
|
|
if entries == nil {
|
|
return nil, status
|
|
}
|
|
if rfs.args.PlaintextNames {
|
|
return rfs.openDirPlaintextnames(cipherPath, entries)
|
|
}
|
|
// Allocate maximum possible number of virtual files.
|
|
// If all files have long names we need a virtual ".name" file for each,
|
|
// plus one for gocryptfs.diriv.
|
|
virtualFiles := make([]fuse.DirEntry, len(entries)+1)
|
|
// Virtual gocryptfs.diriv file
|
|
virtualFiles[0] = fuse.DirEntry{
|
|
Mode: syscall.S_IFREG | 0400,
|
|
Name: nametransform.DirIVFilename,
|
|
}
|
|
// Actually used entries
|
|
nVirtual := 1
|
|
|
|
// Encrypt names
|
|
dirIV := derivePathIV(cipherPath, ivPurposeDirIV)
|
|
for i := range entries {
|
|
var cName string
|
|
// ".gocryptfs.reverse.conf" in the root directory is mapped to "gocryptfs.conf"
|
|
if cipherPath == "" && entries[i].Name == configfile.ConfReverseName {
|
|
cName = configfile.ConfDefaultName
|
|
} else {
|
|
cName = rfs.nameTransform.EncryptName(entries[i].Name, dirIV)
|
|
if len(cName) > syscall.NAME_MAX {
|
|
cName = rfs.nameTransform.HashLongName(cName)
|
|
dotNameFile := fuse.DirEntry{
|
|
Mode: syscall.S_IFREG | 0600,
|
|
Name: cName + nametransform.LongNameSuffix,
|
|
}
|
|
virtualFiles[nVirtual] = dotNameFile
|
|
nVirtual++
|
|
}
|
|
}
|
|
entries[i].Name = cName
|
|
}
|
|
entries = append(entries, virtualFiles[:nVirtual]...)
|
|
return entries, fuse.OK
|
|
}
|
|
|
|
// StatFs - FUSE call
|
|
func (rfs *ReverseFS) StatFs(name string) *fuse.StatfsOut {
|
|
return rfs.loopbackfs.StatFs(name)
|
|
}
|
|
|
|
// Readlink - FUSE call
|
|
func (rfs *ReverseFS) Readlink(cipherPath string, context *fuse.Context) (string, fuse.Status) {
|
|
absPath, err := rfs.abs(rfs.decryptPath(cipherPath))
|
|
if err != nil {
|
|
return "", fuse.ToStatus(err)
|
|
}
|
|
plainTarget, err := os.Readlink(absPath)
|
|
if err != nil {
|
|
return "", fuse.ToStatus(err)
|
|
}
|
|
if rfs.args.PlaintextNames {
|
|
return plainTarget, fuse.OK
|
|
}
|
|
nonce := derivePathIV(cipherPath, ivPurposeSymlinkIV)
|
|
// Symlinks are encrypted like file contents and base64-encoded
|
|
cBinTarget := rfs.contentEnc.EncryptBlockNonce([]byte(plainTarget), 0, nil, nonce)
|
|
cTarget := rfs.nameTransform.B64.EncodeToString(cBinTarget)
|
|
return cTarget, fuse.OK
|
|
}
|