[76] in The Cryptographic File System users list

home help back first fref pref prev next nref lref last post

Re: Keyfile

daemon@ATHENA.MIT.EDU (Matt Blaze)
Mon Apr 27 22:04:16 1998

From owner-cfs-users@research.att.com Tue Apr 28 02:04:15 1998
Return-Path: <owner-cfs-users@research.att.com>
Delivered-To: cfs-mtg@bloom-picayune.mit.edu
Received: (qmail 17102 invoked from network); 28 Apr 1998 02:04:12 -0000
Received: from unknown (HELO rumor.research.att.com) (192.20.225.9)
  by bloom-picayune.mit.edu with SMTP; 28 Apr 1998 02:04:12 -0000
Received: from research.att.com ([135.207.30.100]) by rumor; Mon Apr 27 21:59:25 EDT 1998
Received: from amontillado.research.att.com ([135.207.24.32]) by research-clone; Mon Apr 27 22:01:09 EDT 1998
Received: from nsa.research.att.com (majordomo@nsa.research.att.com [135.207.24.155])
	by amontillado.research.att.com (8.8.7/8.8.7) with ESMTP id WAA00352;
	Mon, 27 Apr 1998 22:01:06 -0400 (EDT)
Received: (from majordomo@localhost) by nsa.research.att.com (8.7.3/8.7.3) id VAA12130 for cfs-users-list; Mon, 27 Apr 1998 21:58:47 -0400 (EDT)
Received: from research.att.com (research.research.att.com [135.205.32.20]) by nsa.research.att.com (8.7.3/8.7.3) with SMTP id VAA12126 for <cfs-users@nsa.research.att.com>; Mon, 27 Apr 1998 21:58:45 -0400 (EDT)
Received: from fbi ([135.205.51.3]) by research; Mon Apr 27 22:00:03 EDT 1998
Received: from fbi (mab@localhost)
	by fbi (8.8.5/8.8.5) with ESMTP id VAA14175;
	Mon, 27 Apr 1998 21:58:56 -0400 (EDT)
Message-Id: <199804280158.VAA14175@fbi>
X-Authentication-Warning: fbi: mab owned process doing -bs
X-Mailer: exmh version 1.6.9 8/22/96
To: res@colnet.cmhnet.org (Rob Stampfli)
cc: cfs-users@research.att.com, john@interlog.com
Subject: Re: Keyfile 
In-reply-to: Your message of "Mon, 27 Apr 1998 21:25:00 EDT."
             <m0yTz9A-0008F9C@colnet.cmhnet.org> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Mon, 27 Apr 1998 21:58:47 -0400
From: Matt Blaze <mab@research.att.com>
Sender: owner-cfs-users@research.att.com
Precedence: bulk

> If you happen to relocate the file to a floppy disk, you have created a
> key disk, and both the disk and your password are now required to decrypt
> the corresponding directory.  (I haven't tested it, but I doubt you can
> just "cat ..k >/dev/floppy"; you'd probably have to make a file system
> on the floppy, mv the file to the floppy filesystem and make sure the
> file system was mounted each time you wanted to do the cattach.)

I just tried, under BSDI, creating a ..k file that's a symlink to
/dev/fd0, and what do you know, it works.

Of course, this is not an especially great way to accomplish this, but
it does work.

-matt





home help back first fref pref prev next nref lref last post