From owner-freebsd-hackers@freebsd.org Mon Oct 26 22:12:19 2020 Return-Path: Delivered-To: freebsd-hackers@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 760D3450B31 for ; Mon, 26 Oct 2020 22:12:19 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CKpwf3Z0nz3ZQG for ; Mon, 26 Oct 2020 22:12:17 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 09QMCGFY044482 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 26 Oct 2020 15:12:16 -0700 (PDT) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 09QMCGP5044481; Mon, 26 Oct 2020 15:12:16 -0700 (PDT) (envelope-from jmg) Date: Mon, 26 Oct 2020 15:12:16 -0700 From: John-Mark Gurney To: Eric McCorkle Cc: FreeBSD Hackers Subject: Re: Mounting encrypted ZFS datasets/GELI for users? Message-ID: <20201026221215.GB31099@funkthat.com> Mail-Followup-To: Eric McCorkle , FreeBSD Hackers References: <8d467e98-237f-c6a2-72de-94c0195ec964@metricspace.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="YZ5djTAD1cGYuMQK" Content-Disposition: inline In-Reply-To: <8d467e98-237f-c6a2-72de-94c0195ec964@metricspace.net> X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Mon, 26 Oct 2020 15:12:16 -0700 (PDT) X-Rspamd-Queue-Id: 4CKpwf3Z0nz3ZQG X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [-2.33 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FREEFALL_USER(0.00)[jmg]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_MEDIUM(-1.08)[-1.080]; MID_RHS_MATCH_FROM(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[funkthat.com]; AUTH_NA(1.00)[]; NEURAL_HAM_LONG(-1.02)[-1.024]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_SHORT(-0.32)[-0.324]; RCPT_COUNT_TWO(0.00)[2]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_SPF_NA(0.00)[no SPF record]; SUBJECT_ENDS_QUESTION(1.00)[]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MAILMAN_DEST(0.00)[freebsd-hackers] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2020 22:12:19 -0000 --YZ5djTAD1cGYuMQK Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Eric McCorkle wrote this message on Mon, Oct 05, 2020 at 09:45 -0400: > I'm presently looking into options presented by ZFS encryption. One > idea I had was something like this (I'm going to go with ZFS for now, > but you could presumably do something like this with GELI, with more > effort). I'd still recommend using GELI. Even w/ ZFS's native encryption, the metadata for ZFS remains unencrypted, and able to be munged. If you geli w/ ZFS and a strong checksum, like sha512/256, I believe that this is the equiavlent to authenticated encryption, ala geli's authenticated mode, but with significantly less overhead... > You could have your users' home directories on separate ZFS datasets, > with a separate encryption key generated from their passphrase (you > could also generalize this to a session key generated from some other > form of authentication). When a user logs in, their authentication > materials are used to recover the ZFS key, which is then used to mount > the home directory. When they log out, their home directory is unmounted. This has already been implemented in PEFS: https://pefs.io/ and there's already a port for it: https://www.freshports.org/sysutils/pefs-kmod/ --=20 John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." --YZ5djTAD1cGYuMQK Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQJ8BAEBCgBmBQJfl0m/XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MEI1RTRGMTNDNzYyMDZDNjEyMDBCNjAy MDVGMEIzM0REMDA2QURBAAoJECBfCzPdAGraK0cP/R2H6mClfvVcaudD6LwDbHGF DjlDFsggf6prvLGa2vMEHsZjtknLP6aNzuf1FJNzPis71ZAhVW2bk6Bfex2s77YE fU2aGPjp8SRK/2bBx5WMJO1wdH9vGmfhG9bftfpnwxn4NYtZXw6p94SW3tMtrtgY ZuL4badw3DJOXKYRvomYJFWpDh8nUK7weRA8NG70n8HNcMOHk9osmI9UpSWKLFT/ jJTlMnBi5g9ikOKLfyykfWoU6sHk4pc4vJut32kRTel+jk7wzlLP9D9hffEjVBQj yHpQPsg0vWU6at0O1qJzH3eXsen/GkB6HzlkdEi1pBWjRcnKj3+KIy+brEtYSK2m W7CJQY10ikXQpmqOV7P6qT/qbOxq2cVJOLmpcaDND3dKBITreYDMCae7KJajThdV HUjcmIwxnpzpS3HNcph3wnCzolqWmdKuWGRPgx5b0wLi4EoYCItTdgc0+CTmhcvG H63jXqF9XKoL64+fjR9JDDBL0gtD+YOKwSowQjGvu5ODNmS+IfuWzk8K7UJFuOo4 sd5TgyrM7aMpesfXF9rS+mkHOcUK6PBePEgZdVAH122CFRMJ0dag4jC/5IXXmfRw d3copkTX+vPlsFHrtXu5Ds0k9qImjVMlUWGLibKPI/5I7oWXN6Y2ghKEBj+sapbe IAJ5HF+/7gcUxQkiy6RW =mwN6 -----END PGP SIGNATURE----- --YZ5djTAD1cGYuMQK--