You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SiriKali can manage gocryptfs volumes using a key and a keyfile since it generates the effective key by itself and then passes on the result to gocryptfs.
The above creates a problem if a user tries to unlock the volume independently of SiriKali and it will be best if gocryptfs also has this ability.
Proposed solutions.
An option to use a Key. This already works.
An option to use a keyfile.
An option to use a combination of a key and a keyfile with the effective key generated with the below formular: key = hmac(sha256,password,keyfile)
The text was updated successfully, but these errors were encountered:
Yes,and people are using the functionality through SiriKali and then start wondering how the unlock their volumes when they want to do that outside of SiriKali. An example is this bug report: mhogomchungu/sirikali#17
I think i should close this one since SiriKali can now exposes the effective key passed to gocryptfs both in the GUI and CLI.
This means,anybody who want to unlock their volumes created in Sirikali using a key and a keyfile outside of SiriKali can get the effective key from SiriKali,store it somewhere and start using it "straight" with gocryptfs.
The SiriKali command to use is:
sirikali -s -f ~/path/to/keyfile
It is also possible to get the from from other tools like openssl with a command like:
SiriKali can manage gocryptfs volumes using a key and a keyfile since it generates the effective key by itself and then passes on the result to gocryptfs.
The above creates a problem if a user tries to unlock the volume independently of SiriKali and it will be best if gocryptfs also has this ability.
Proposed solutions.
The text was updated successfully, but these errors were encountered: