From owner-freebsd-security Tue Jan 29 2:17: 6 2002 Delivered-To: freebsd-security@freebsd.org Received: from relay2.agava.net.ru (ofc.agava.net [217.106.235.141]) by hub.freebsd.org (Postfix) with ESMTP id F01DD37B41D for ; Tue, 29 Jan 2002 02:17:00 -0800 (PST) Received: from hellbell.domain (hellbell.domain [192.168.1.12]) by relay2.agava.net.ru (Postfix) with ESMTP id E63BB66BC5 for ; Tue, 29 Jan 2002 13:16:53 +0300 (MSK) Received: from localhost (localhost [127.0.0.1]) by hellbell.domain (Postfix) with ESMTP id A5DEECD12 for ; Tue, 29 Jan 2002 13:16:53 +0300 (MSK) Date: Tue, 29 Jan 2002 13:16:53 +0300 (MSK) From: Alexey Zakirov X-X-Sender: To: Subject: Re: Cryptographic file systems In-Reply-To: <20020127141053.T6286-100000@walter> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Sun, 27 Jan 2002, Jason Stone wrote: > did for me under 0.0.4.1 and 0.0.4.2. FiST is being actively developed, > though, and things may be better in the 0.0.5 series. I think that FiST > cryptfs is the most promising cryptfs freebsd can expect, so watch its > progress. There is also a nice project based on vn(4) driver. It's pretty robust and stable: http://vncrypt.sourceforge.net/ ======================================================= This is cryptographic disk driver for FreeBSD. It provides transparent encryption and decryption of selected devices. It is based on vn(4). ======================================================= *** WBR, Alexey Zakirov (frank@agava.com) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message