Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changing a password doesn't make any sense for seciurity #766

Open
KonoromiHimaries opened this issue Jul 16, 2023 · 6 comments
Open

Changing a password doesn't make any sense for seciurity #766

KonoromiHimaries opened this issue Jul 16, 2023 · 6 comments

Comments

@KonoromiHimaries
Copy link

KonoromiHimaries commented Jul 16, 2023

if i copy gocryptfs.diriv and gocryptfs.conf
next create a single file with random text inside and paste it to mount folder
next unmount and change a password with -passwd option
next mount and change a text inside this file
next unmount and copy back gocryptfs.diriv and gocryptfs.conf that were copied before
then mount and i have new text inside this file with old password

@KonoromiHimaries KonoromiHimaries changed the title Change password dosen't make any sense for seciurity Change password doesn't make any sense for seciurity Jul 16, 2023
@KonoromiHimaries KonoromiHimaries changed the title Change password doesn't make any sense for seciurity Changing a password doesn't make any sense for seciurity Jul 16, 2023
@jumoog
Copy link

jumoog commented Jul 17, 2023

It's not a bug see https://github.com/rfjakob/gocryptfs/blob/master/Documentation/MANPAGE.md#-passwd . With the old gocryptfs.conf file and old password you can still acess the file.

@KonoromiHimaries
Copy link
Author

KonoromiHimaries commented Jul 18, 2023

@jumoog new changes in files after changing a password should be protected.

@jumoog
Copy link

jumoog commented Jul 18, 2023

You only change the password. The master key is still the same as before. And only the master key is used for encryption and decryption.

@jumoog
Copy link

jumoog commented Jul 18, 2023

This is always the case if you use e.g. LUKS to encrypt your hard disk:

  • make a backup of the headers
  • change the password
  • restore the old headers

Now you can also use the old password.

@KonoromiHimaries
Copy link
Author

KonoromiHimaries commented Jul 18, 2023

Maybe create a sub-key for the new password and use it at replace master-key for new changes in files is good solution.

@rfjakob
Copy link
Owner

rfjakob commented Jul 18, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants