[Bug 226348] sysutils/fusefs-encfs: broken on 11.1-STABLE sometime between r326896 and r330140

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Mar 5 21:34:21 UTC 2018


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226348

--- Comment #3 from js at jschneider.com ---
Upgraded to 11.1-STABLE r330518 and reinstalled fusefs-libs and fusefs-encfs
from FreeBSD pkg repo.  No change in results.

I'm wondering if this could be an SSL issue with decrypting an encfs first set
up several years ago using EncFS 1.7.4. 

I'm seeing this in /var/log/messages:
Mar  5 16:25:34 mobile-01 encfs[1522]: ERROR decoding 32 bytes, got back 0 (0
in final_ex) [SSL_Cipher.cpp:927]
Mar  5 16:25:34 mobile-01 encfs[1522]: ERROR decoding 16 bytes, got back 0 (0
in final_ex) [SSL_Cipher.cpp:927]
Mar  5 16:25:34 mobile-01 last message repeated 5 times


Output of encfs -v ~/.gdrive-personal/encrypted ~/gdrive-personal :

VERBOSE Root directory: /home/jschneider/.gdrive-personal/encrypted/
[main.cpp:581]
VERBOSE Fuse arguments: (daemon) (threaded) (keyCheck) encfs
/home/jschneider/gdrive-personal/ -o use_ino -o default_permissions 
[main.cpp:582]
VERBOSE found new serialization format [FileUtils.cpp:286]
VERBOSE subVersion = 20100713 [FileUtils.cpp:300]
VERBOSE checking if ssl/aes(3:0:2) implements ssl/aes(3:0) [Interface.cpp:103]
VERBOSE allocated cipher ssl/aes, keySize 32, ivlength 16 [SSL_Cipher.cpp:395]
VERBOSE useStdin: 0 [FileUtils.cpp:1607]
EncFS Password: 
VERBOSE checking if ssl/aes(3:0:2) implements ssl/aes(3:0) [Interface.cpp:103]
VERBOSE allocated cipher ssl/aes, keySize 32, ivlength 16 [SSL_Cipher.cpp:395]
VERBOSE Allocating 41 locks for OpenSSL [openssl.cpp:47]
VERBOSE cipher key size = 52 [FileUtils.cpp:1620]
VERBOSE checking if nameio/block(4:0:2) implements nameio/block(3:0)
[Interface.cpp:103]


Output of encfsctl ~/.gdrive-personal/encrypted/ :

Version 6 configuration; created by EncFS 1.7.4 (revision 20100713)
Filesystem cipher: "ssl/aes", version 3:0:0 (using 3:0:2)
Filename encoding: "nameio/block", version 3:0:0 (using 4:0:2)
Key Size: 256 bits
Using PBKDF2, with 1148279 iterations
Salt Size: 160 bits
Block Size: 1024 bytes, including 8 byte MAC header
Each file contains 8 byte header with unique IV data.
Filenames encoded using IV chaining mode.
File data IV is chained to filename IV.
File holes passed through to ciphertext.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list