> Date: Tue, 12 Oct 1999 18:08:53 +0530 (IST) > From: samir agrawal <[EMAIL PROTECTED]> > X-Sender: [EMAIL PROTECTED] > To: [EMAIL PROTECTED] > Subject: Re: [LI] Information on security desired... > MIME-Version: 1.0 > X-Loop: [EMAIL PROTECTED] > X-Url: http://www.linux-india.org > > hi, > your problem set me thinking and thought this should not be that > difficult. I am not sure something like this exists butI am sure a file > system withthe following capabilties can be implemented rather easily. > assuming you are familiar with public key cryptography - simply stated Ok that is fine, here is my two anana, there is simpler and bit less flexable solution as well, user command crypt dir. So even root can not see the contant of file/dir but can delete or move, same will be the case with public key option. But this is less flexible as only you have to crypt the dir unlike public key option where the system could do the encryption with ur public key. -Chetan S > there are two keys, one public known to everybody and a private one only > known to you. the nice thing is that they are symmetric in the sense that > messages encrypted with your public key can only be decrypted using your > private key only and vice versa. > > so here is my idea. > > 1. Give every user a public and private key. > > 2. All data on the disk belonging to a user is encrypted using his public > key. > > 3. when a user wants to access a file he will need his private key to > access it. > > now there are issues related to key management, like how are sessions and > session key managed so that the root or some other user get hold of the > key while you are using it. > > I do not know of an implementation, but I think all this is very much > possible technically. > > comments ! > > samir > > -------------------------------------------------------------------- > The Linux India Mailing List Archives are now available. Please search > the archive at http://lists.linux-india.org/ before posting your question > to avoid repetition and save bandwidth. -------------------------------------------------------------------- The Linux India Mailing List Archives are now available. Please search the archive at http://lists.linux-india.org/ before posting your question to avoid repetition and save bandwidth.
Re: [LI] Information on security desired...
Kumar Cheetan A2 5 WIPRO consultant Tue, 12 Oct 1999 08:51:19 -0700
- Re: [LI] Information on security desir... Atul Chitnis
- Re: [LI] Information on security ... samir agrawal
- Re: [LI] Information on security ... Raj Mathur
- Re: [LI] Information on secur... Rohit
- Re: [LI] Information on secur... Mannu Kalra
- Re: [LI] Information on security desir... mukund
- Re: [LI] Information on security ... Rohit
- Re: [LI] Information on secur... Shirish Bhagwat
- RE: [LI] Information on security desir... Benny Mathew
- Re: [LI] Information on security desir... Kumar Cheetan A2 5 WIPRO consultant
- Re: [LI] Information on security desir... Swapan Sarkar
- Re: [LI] Information on security desir... Kishore C. Pattnaik
- Re: [LI] Information on security desir... Sundar Narayanan
- Re: [LI] Information on security ... Mukund Deshmukh
- [LI] Beowulf Clusters. samir agrawal
- Re: [LI] Beowulf Clusters... Syed Khader Vali
- Re: [LI] Information on security desir... Kumar Cheetan A2 5 WIPRO consultant