File: NEWS

package info (click to toggle)
encfs 1.9.5-1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid
  • size: 13,560 kB
  • sloc: cpp: 77,790; python: 9,665; xml: 3,888; sh: 995; perl: 866; makefile: 513; ansic: 213; sed: 16; exp: 16
file content (19 lines) | stat: -rw-r--r-- 991 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
encfs (1.7.4-4) unstable; urgency=medium

  * There is a security audit report available on
    https://defuse.ca/audits/encfs.htm
    which identifies some security issues in encfs. Many of them affect the
    retrieval of encrypted data from unsafe storage which could have been
    manipulated by an attacker and have some impact on data retrieval or on
    future encryption operation, like adding zero bytes blocks inside of real
    data, or disabling MACs via configuration file (lowering the encryption
    complexity for subsequently added data). Some attacks affect the
    encryption mechanism (potential timing analysis of MACs, stream cipher is
    used to encrypt the last file block while generating block IV by XORing
    the block number).

    Some users should reconsider the use of encfs for sensitive data in
    environments which allow situations like those described on the mentioned
    website.

 -- Eduard Bloch <blade@debian.org>  Tue, 07 Oct 2014 20:05:57 +0200