[ale] BoS: new release (v.1.3.3) of CFS encrypting filesystem (fwd)
Chris Farris
cfarris at phoenix.iss.net
Sun Mar 17 13:54:49 EST 1996
I mentioned this in my security presentation, but had not found out any
details. Well here they are:
Forwarded message:
> From owner-best-of-security at suburbia.net Sun Mar 17 08:50:12 1996
> X-Authentication-Warning: suburbia.net: majordom set sender to owner-best-of-security using -f
> Message-Id: <199603170931.EAA02014 at nsa.tempo.att.com>
> To: cypherpunks at toad.com
> Subject: BoS: new release (v.1.3.3) of CFS encrypting filesystem
> Date: Sun, 17 Mar 1996 04:31:49 -0500
> From: Matt Blaze <mab at research.att.com>
> Sender: owner-best-of-security at suburbia.net
> Errors-to: nobody at mail.uu.net
> Precedence: bulk
> Reply-To: nobody at mail.uu.net
>
> Source code for the latest version (release 1.3.3) of CFS, the Cryptographic
> File System, is now available upon request for research and experimental
> use in the US and Canada. This version works under most BSD-derived Unix
> systems and should now run without modification under most current Linux
> releases as well.
>
> CFS pushes encryption services into the Unix(tm) file system. It
> supports secure storage at the system level through a standard Unix
> file system interface to encrypted files. Users associate a
> cryptographic key with the directories they wish to protect. Files in
> these directories (as well as their pathname components) are
> transparently encrypted and decrypted with the specified key without
> further user intervention; cleartext is never stored on a disk or sent
> to a remote file server. CFS employs a novel combination of DES
> stream and codebook cipher modes to provide high security with good
> performance on a modern workstation. CFS can use any available file
> system for its underlying storage without modification, including
> remote file servers such as NFS. System management functions, such as
> file backup, work in a normal manner and without knowledge of the key.
>
> CFS runs under SunOS and several other BSD-derived systems with NFS.
> It is implemented entirely at user level, as a local NFS server
> running on the client machine's "loopback" interface. It consists of
> about 5000 lines of code and supporting documentation. You must have
> "root" access to install CFS.
>
> CFS was first mentioned at the work-in-progress session at the Winter
> '93 USENIX Conference and was more fully detailed in:
>
> Matt Blaze. "A Cryptographic File System for Unix", Proc. 1st ACM
> Conference on Computer and Communications Security, Fairfax, VA,
> November 1993. (PostScript available by anonymous ftp from
> research.att.com in the file dist/mab/cfs.ps.)
>
> and in
>
> Matt Blaze. "Key Management in an Encrypting File System", Proc.
> Summer '94 USENIX Tech. Conference, Boston, MA, June 1994.
> (PostScript available by anonymous ftp from research.att.com
> in the file dist/mab/cfskey.ps.)
>
> Version 1.3 of CFS also includes ESM, the Encrypting Session Manager.
> ESM provides shell-to-shell encrypted sessions across insecure links
> and requires no OS or network support. It is useful for typing cfs
> passphrases when logged in over the network. ESM needs RSAREF 2.0 to
> compile and is tested only on SunOS and BSDI. ESM is the first released
> part of a suite of session encryption tools that are described in
>
> Matt Blaze and Steve Bellovin. "Session-layer Encryption."
> Proc. 1995 USENIX Security Workshop, Salt Lake City, June 1995.
> (PostScript is available from
> ftp://research.att.com/dist/mab/sesscrypt.ps)
>
> The new version of CFS differs from the version described in the
> papers in a few ways:
>
> * The DES-based encryption scheme has been strengthened, and now
> provides greater security but with the online latency of only single-DES.
>
> * Support for the smartcard-based key management system is not
> included and a few of the tools are not included.
>
> * An impoved key management scheme now allows chaning the passphrase
> associated with a directory.
>
> * The performance has been improved.
>
> * The security of the system against certain non-cryptanalytic attacks
> has been improved somewhat.
>
> * User-contributed ports to a number of additional platforms.
>
> * Hooks for adding new ciphers.
>
> * 3-DES, MacGuffin, and SAFER-SK128 encryption options.
>
> * Timeout options allow automatic detach of encrypted directories
> after a set time or period of inactivity.
>
> CFS is distributed as a research prototype; it is COMPLETELY
> UNSUPPORTED software. No warranty of any kind is provided. We will
> not be responsible if the system deletes all your files and emails the
> cleartext directly to the NSA or your mother. Also, we do not have
> the resources to port the software to other platforms, although you
> are welcome to do this yourself. The software was developed under
> SunOS and BSDI, and there are also unsupported user-contributed ports
> available for AIX, HP/UX, Irix, Linux, Solaris and Ultrix. We really
> can't promise to provide any technical support at all, beyond the
> source code itself. We also maintain a mailing list for CFS users and
> developers; subscription information is included with the source code.
>
> Because of export restrictions on cryptographic software, we are only
> able to make the software available within the US and Canada to US and
> Canadian citizens and permanent residents. Unfortunately, we cannot
> make it available for general anonymous ftp or other uncontrolled
> access, nor can we allow others to do so. Sorry.
>
> Legal stuff from the README file:
>
> * Copyright (c) 1992, 1993, 1994, 1995 by AT&T.
> * Permission to use, copy, and modify this software without fee
> * is hereby granted, provided that this entire notice is included in
> * all copies of any software which is or includes a copy or
> * modification of this software and in all copies of the supporting
> * documentation for such software.
> *
> * This software is subject to United States export controls.
> *
> * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
> * WARRANTY. IN PARTICULAR, NEITHER THE AUTHORS NOR AT&T MAKE ANY
> * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY
> * OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
>
> If you would like a copy of the CFS source code, please read to the end
> of this message and then send email to:
>
> cfs at research.att.com
>
> DO NOT REPLY DIRECTLY TO THIS MESSAGE. You must include a statement
> that you are in the US or Canada, are a citizen or legal permanent
> resident of the US or Canada, and have read and understand the license
> conditions stated above. Be sure to include an email address in a US-
> or Canada-registered domain. The code will be sent to you via email in
> a "shar" shell archive (a little over 300K bytes long).
>
More information about the Ale
mailing list