Replies: 4 comments
-
Yeah. Now most distros mount Did you actually try to recover it (just curious 😉)? |
Beta Was this translation helpful? Give feedback.
-
Welp I was able to recover it only with specific TMPDIR environment variable pointing to non tmpfs storage. So it looks like you need to intentionally seriously mess your system for someone be able to exploit his. And If someone is able to grab your tmp file in 1 second between it's creation, passing to gocryptfs and deletion - you have way more serious security problems and it's also unsafe for you to type your password directly into gocryptfs cli. |
Beta Was this translation helpful? Give feedback.
-
Converted this to a discussion. There are probably some ways to improve this. I'm open for any ideas and suggestions. 😉 |
Beta Was this translation helpful? Give feedback.
-
Changed with: c4c945c We use |
Beta Was this translation helpful? Give feedback.
-
Providing master password to gocryptfs via temporary file may rise some security concerns.
Current workflow is:
var temp_file = File.new_tmp (null, out ps);
-passfile
option.pfile.delete ();
Simple
delete ()
may not be enough in this case, because this temporary file will probably be recoverable for some time (using ext4magic for example). We should either use some kind of "wipe then delete" scenario or implement some kind of virtual passfile.Beta Was this translation helpful? Give feedback.
All reactions