Date: Fri, 29 Sep 2000 13:03:26 -0400 (EDT) From: Erez Zadok <ezk@cs.columbia.edu> To: Terry Lambert <tlambert@primenet.com> Cc: kuku@gilberto.physik.rwth-aachen.de (Christoph Kukulies), freebsd-fs@FreeBSD.ORG Subject: Re: crypto fs? Message-ID: <200009291703.NAA29170@shekel.mcl.cs.columbia.edu> In-Reply-To: Your message of "Thu, 28 Sep 2000 08:36:43 -0000." <200009280836.BAA11788@usr02.primenet.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <200009280836.BAA11788@usr02.primenet.com>, Terry Lambert writes: > > Is there an implementation of the crypto filesystem for FreeBSD? > > > > Such that a disk that falls into hands of anyone not knowing > > the secret key cannot be decyphered in the duration of the universe? > > Sorry for the latency on the reply. > > Yes, several students of John Heidemann's at UCLA built a crypto > FS; they have also built a compressing FS. Actually they never got a stackable compression f/s built or working. I asked John about his SOSP15 paper. He told me that they had a low-level block-style compression prototype instead. Mine in the only known (so far :-) working stackable compression f/s. My templates (Linux only) can do arbitrary size-changing f/s: I have a working gzipfs, uuencodefs, etc. See http://www.cs.columbia.edu/~ezk/research/fist/ for code and papers. Cheers, Erez. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-fs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200009291703.NAA29170>