diff options
| author | Jakob Unterwurzacher | 2021-09-25 16:44:06 +0200 | 
|---|---|---|
| committer | Jakob Unterwurzacher | 2021-09-25 16:44:06 +0200 | 
| commit | eceeaaad1f56569ac74de5a6780280a7d813d8d9 (patch) | |
| tree | 8978f53c9d9c137de5033b8af7d84318ba8c51d7 | |
| parent | 53d51acd2b321ac50638998f81d268ea58236410 (diff) | |
README: make changelog entries subheadings
This allows to anchor-link in to each release.
| -rw-r--r-- | README.md | 80 | 
1 files changed, 40 insertions, 40 deletions
| @@ -196,7 +196,7 @@ RM:    2,367  Changelog  --------- -v2.2.0, IN PROGRESS +#### v2.2.0, IN PROGRESS  * **`-deterministic-names`: new option for `-init`**, both for reverse and forward mode.     Disables file name randomisation & `gocryptfs.diriv` files     ([#151](https://github.com/rfjakob/gocryptfs/issues/151), [#402](https://github.com/rfjakob/gocryptfs/issues/402), [#592](https://github.com/rfjakob/gocryptfs/pull/592)) @@ -219,7 +219,7 @@ v2.2.0, IN PROGRESS    the [Go module versioning](https://golang.org/doc/modules/version-numbers) convention.    Later releases will also follow the convention. -v2.1, 2021-08-18 +#### v2.1, 2021-08-18  * `-fido2`: do not request PIN on `gocryptfs -init` fixing `FIDO_ERR_UNSUPPORTED_OPTION` with YubiKey    ([#571](https://github.com/rfjakob/gocryptfs/issues/571))  * `-sharedstorage`: present stable inode numbers, fixing getcwd failures @@ -238,19 +238,19 @@ v2.1, 2021-08-18  * Drop support for Go 1.11 & Go 1.12 ([commit](https://github.com/rfjakob/gocryptfs/commit/a5f88e86d186cdbc67e1efabd7aacf389775e027))    * You must have Go 1.13 or newer now -v2.0.1, 2021-06-07 +#### v2.0.1, 2021-06-07  * Fix symlink creation reporting the wrong size, causing git to report it as modified    ([#574](https://github.com/rfjakob/gocryptfs/issues/574)) -v2.0, 2021-06-05 +#### v2.0, 2021-06-05  * Fix a few [issues discovered by xfstests](https://github.com/rfjakob/fuse-xfstests/wiki/results_2021-05-19)    * Biggest change: rewrite SEEK_HOLE / SEEK_DATA logic (now emulates 4k alignment) -v2.0-beta4, 2021-05-15 +#### v2.0-beta4, 2021-05-15  * **Make ACLs *actually* work (pass `-acl` to enable)** ([#536](https://github.com/rfjakob/gocryptfs/issues/536))  * Blocklist `RENAME_EXCHANGE` and `RENAME_WHITEOUT` (broken as discovered by [fuse-xfstest/gocryptfs-2019-12](https://github.com/rfjakob/fuse-xfstests/tree/gocryptfs-2019-12)) -v2.0-beta3, 2021-04-24 +#### v2.0-beta3, 2021-04-24  * MANPAGE: Split options into sections acc. to where they apply ([#517](https://github.com/rfjakob/gocryptfs/issues/517))  * `-idle`: count cwd inside the mount as busy ([#533](https://github.com/rfjakob/gocryptfs/issues/533))  * Make `gocryptfs.diriv` and `gocryptfs.xxx.name` files world-readable to make encrypted backups easier @@ -269,11 +269,11 @@ v2.0-beta3, 2021-04-24  * Add directory fd caching for 2x - 3x speed boost in small file ops compared to v2.0-beta2    ([performance numbers](https://github.com/rfjakob/gocryptfs/blob/5cb1e55714aa92a848c0fb5fc3fa7b91625210fe/Documentation/performance.txt#L73)) -v2.0-beta2, 2020-11-14 +#### v2.0-beta2, 2020-11-14  * Improve [performance](Documentation/performance.txt#L69)  * Fix [GETATTR panic](https://github.com/rfjakob/gocryptfs/issues/519#issuecomment-718790790) in reverse mode -v2.0-beta1, 2020-10-15 +#### v2.0-beta1, 2020-10-15  * **Switch to the improved go-fuse [v2 API](https://pkg.go.dev/github.com/hanwen/go-fuse/v2@v2.0.3/fs)**    * This is a big change, a lot of code has been reorganized or rewritten      to fit the v2 API model. @@ -292,7 +292,7 @@ v2.0-beta1, 2020-10-15    ([go-fuse #276](https://github.com/hanwen/go-fuse/issues/276),    [gocryptfs commit ec74d1d](https://github.com/rfjakob/gocryptfs/commit/ec74d1d2f4217a9a337d1db9902f32ae2aecaf33)) -v1.8.0, 2020-05-09 +#### v1.8.0, 2020-05-09  * Enable ACL support ([#453](https://github.com/rfjakob/gocryptfs/issues/453))    * **Warning 2021-02-07**: This feature is incomplete! Do not use ACLs before gocryptfs v2.0 final!      Reading and writing ACLs works, but they are not enforced or inherited ([#542](https://github.com/rfjakob/gocryptfs/issues/542)) @@ -317,7 +317,7 @@ v1.8.0, 2020-05-09    * Has been disabled since v1.7 due to issues a third-party module.    * Please use FIDO2 instead (gocryptfs v2.0) -v1.7.1, 2019-10-06 +#### v1.7.1, 2019-10-06  * Support wild cards in reverse mode via `--exclude-wildcard`    ([#367](https://github.com/rfjakob/gocryptfs/pull/367)). Thanks @ekalin!  * Create `gocryptfs.diriv` files with 0440 permissions to make it easier to @@ -338,7 +338,7 @@ v1.7.1, 2019-10-06  * tests: use /var/tmp instead of /tmp by default    ([commit 8c4429](https://github.com/rfjakob/gocryptfs/commit/8c4429408716d9890a98a48c246d616dbfea7e31)) -v1.7, 2019-03-17 +#### v1.7, 2019-03-17  * **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames    * If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade.      Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`, @@ -371,11 +371,11 @@ v1.7, 2019-03-17    * Trezor support has been broken since Sept 2018 due to issues      in a third-party module ([#261](https://github.com/rfjakob/gocryptfs/issues/261)) -v1.6.1, 2018-12-12 +#### v1.6.1, 2018-12-12  * Fix "Operation not supported" chmod errors on Go 1.11    ([#271](https://github.com/rfjakob/gocryptfs/issues/271)) -v1.6, 2018-08-18 +#### v1.6, 2018-08-18  * **Add `-e` / `-exclude` option** for reverse mode    ([#235](https://github.com/rfjakob/gocryptfs/issues/235),    [commit](https://github.com/rfjakob/gocryptfs/commit/ec2fdc19cf9358ae7ba09c528a5807b6b0760f9b)) @@ -389,7 +389,7 @@ v1.6, 2018-08-18  * Fall back to buffered IO even when passed `O_DIRECT`    ([commit](https://github.com/rfjakob/gocryptfs/commit/893e41149ed353f355047003b89eeff456990e76)) -v1.5, 2018-06-12 +#### v1.5, 2018-06-12  * **Support extended attributes (xattr)** in forward mode    ([#217](https://github.com/rfjakob/gocryptfs/issues/217)). Older gocryptfs versions    will ignore the extended attributes. @@ -409,7 +409,7 @@ v1.5, 2018-06-12  * Stop printing the help text on a "flag provided but not defined"    error ([commit](https://github.com/rfjakob/gocryptfs/commit/5ad26495fc86527bbfe75ac6b46528d49a373676)) -v1.4.4, 2018-03-18 +#### v1.4.4, 2018-03-18  * Overwrite secrets in memory with zeros as soon as possible    ([#211](https://github.com/rfjakob/gocryptfs/issues/211))  * Fix Getdents problems on i386 and mips64le @@ -422,7 +422,7 @@ v1.4.4, 2018-03-18    [commit](https://github.com/hanwen/go-fuse/commit/a9ddcb8a4b609500fc59c89ccc9ee05f00a5fefd))  * Fix various test issues on MacOS -v1.4.3, 2018-01-21 +#### v1.4.3, 2018-01-21  * **Fix several symlink race attacks** in connection with reverse mode    and allow_other. Thanks to @slackner for reporting and helping to fix    the issues: @@ -440,7 +440,7 @@ v1.4.3, 2018-01-21  * MacOS: let OSXFuse create the mountpoint if it does not exist    ([issue #194](https://github.com/rfjakob/gocryptfs/issues/194)) -v1.4.2, 2017-11-01 +#### v1.4.2, 2017-11-01  * Add `Gopkg.toml` file for `dep` vendoring and reproducible builds    ([issue #142](https://github.com/rfjakob/gocryptfs/issues/142))  * MacOS: deal with `.DS_Store` files inside CIPHERDIR @@ -453,7 +453,7 @@ v1.4.2, 2017-11-01  * Fix a startup hang when `$PATH` contains the mountpoint    ([issue #146](https://github.com/rfjakob/gocryptfs/issues/146)) -v1.4.1, 2017-08-21 +#### v1.4.1, 2017-08-21  * **Use memory pools for buffer handling** (    [3c6fe98](https://github.com/rfjakob/gocryptfs/commit/3c6fe98),    [b2a23e9](https://github.com/rfjakob/gocryptfs/commit/b2a23e9), @@ -477,7 +477,7 @@ v1.4.1, 2017-08-21  * Enable writing to write-only files    ([issue #125](https://github.com/rfjakob/gocryptfs/issues/125)) -v1.4, 2017-06-20 +#### v1.4, 2017-06-20  * **Switch to static binary releases**    * From gocryptfs v1.4, I will only release statically-built binaries.      These support all Linux distributions but cannot use OpenSSL. @@ -502,7 +502,7 @@ v1.4, 2017-06-20    ([commit 80516ed](https://github.com/rfjakob/gocryptfs/commit/80516ed3351477793eec882508969b6b29b69b0a))  * Add `-info` option to pretty-print infos about a filesystem. -v1.3, 2017-04-29 +#### v1.3, 2017-04-29  * **Use HKDF to derive separate keys for GCM and EME**    * New feature flag: `HKDF` (enabled by default)    * This is a forwards-compatible change. gocryptfs v1.3 can mount @@ -525,14 +525,14 @@ v1.3, 2017-04-29      that were compiled without Large File Support.  * Passing "--" now also blocks "-o" parsing -v1.2.1, 2017-02-26 +#### v1.2.1, 2017-02-26  * Add an integrated speed test, `gocryptfs -speed`  * Limit password size to 1000 bytes and reject trailing garbage after the newline  * Make the test suite work on [Mac OS X](https://github.com/rfjakob/gocryptfs/issues/15)  * Handle additional corner cases in `-ctlsock` path sanitization  * Use dedicated exit code 12 on "password incorrect" -v1.2, 2016-12-04 +#### v1.2, 2016-12-04  * Add a control socket interface. Allows to encrypt and decrypt filenames.    For details see [backintime#644](https://github.com/bit-team/backintime/issues/644#issuecomment-259835183).    * New command-line option: `-ctlsock` @@ -551,14 +551,14 @@ v1.2, 2016-12-04  * Preserve owner for symlinks an device files (fixes bug [#64](https://github.com/rfjakob/gocryptfs/issues/64))  * Include rendered man page `gocryptfs.1` in the release tarball -v1.1.1, 2016-10-30 +#### v1.1.1, 2016-10-30  * Fix a panic on setting file timestamps ([go-fuse#131](https://github.com/hanwen/go-fuse/pull/131))  * Work around an issue in tmpfs that caused a panic in xfstests generic/075    ([gocryptfs#56](https://github.com/rfjakob/gocryptfs/issues/56))  * Optimize NFS streaming writes    ([commit](https://github.com/rfjakob/gocryptfs/commit/a08d55f42d5b11e265a8617bee16babceebfd026)) -v1.1, 2016-10-19 +#### v1.1, 2016-10-19  * **Add reverse mode ([#19](https://github.com/rfjakob/gocryptfs/issues/19))**    * AES-SIV (RFC5297) encryption to implement deterministic encryption      securely. Uses the excellent @@ -584,7 +584,7 @@ v1.1, 2016-10-19  * Enable changing the password when you only know the master key    ([#28](https://github.com/rfjakob/gocryptfs/issues/28)) -v1.0, 2016-07-17 +#### v1.0, 2016-07-17  * Deprecate very old filesystems, stage 3/3    * Filesystems created by v0.6 can no longer be mounted    * Drop command-line options `-gcmiv128`, `-emenames`, `-diriv`. These @@ -598,7 +598,7 @@ v1.0, 2016-07-17  * Experimental Mac OS X support. See    [ticket #15](https://github.com/rfjakob/gocryptfs/issues/15) for details. -v0.12, 2016-06-19 +#### v0.12, 2016-06-19  * Deprecate very old filesystems, stage 2/3    * Filesystems created by v0.6 and older can only be mounted read-only    * A [message](https://github.com/rfjakob/gocryptfs/blob/v0.12/internal/configfile/config_file.go#L120) @@ -607,7 +607,7 @@ v0.12, 2016-06-19    * Mounts the filesystem read-only  * Accept password from stdin as well ([ticket #30](https://github.com/rfjakob/gocryptfs/issues/30)) -v0.11, 2016-06-10 +#### v0.11, 2016-06-10  * Deprecate very old filesystems, stage 1/3    * Filesystems created by v0.6 and older can still be mounted but a      [warning](https://github.com/rfjakob/gocryptfs/blob/v0.11/internal/configfile/config_file.go#L120) @@ -619,7 +619,7 @@ v0.11, 2016-06-10  * Build release binaries with Go 1.6.2    * Big speedup for CPUs with AES-NI, see [ticket #23](https://github.com/rfjakob/gocryptfs/issues/23) -v0.10, 2016-05-30 +#### v0.10, 2016-05-30  * **Replace `spacemonkeygo/openssl` with `stupidgcm`**    * gocryptfs now has its own thin wrapper to OpenSSL's GCM implementation      called `stupidgcm`. @@ -639,7 +639,7 @@ v0.10, 2016-05-30  * Fix a fsstress [failure](https://github.com/hanwen/go-fuse/issues/106)    in the go-fuse library. -v0.9, 2016-04-10 +#### v0.9, 2016-04-10  * **Long file name support**    * gocryptfs now supports file names up to 255 characters.    * This is a forwards-compatible change. gocryptfs v0.9 can mount filesystems @@ -652,25 +652,25 @@ v0.9, 2016-04-10    * `-d`: Alias for `-debug`    * `-q`: Alias for `-quiet` -v0.8, 2016-01-23 +#### v0.8, 2016-01-23  * Redirect output to syslog when running in the background  * New command-line option:    * `-memprofile`: Write a memory allocation debugging profile the specified      file -v0.7.2, 2016-01-19 +#### v0.7.2, 2016-01-19  * **Fix performance issue in small file creation**    * This brings performance on-par with EncFS paranoia mode, with streaming writes      significantly faster    * The actual [fix](https://github.com/hanwen/go-fuse/commit/c4b6b7949716d13eec856baffc7b7941ae21778c)      is in the go-fuse library. There are no code changes in gocryptfs. -v0.7.1, 2016-01-09 +#### v0.7.1, 2016-01-09  * Make the `build.bash` script compatible with Go 1.3  * Disable fallocate on OSX (system call not available)  * Introduce pre-built binaries for Fedora 23 and Debian 8 -v0.7, 2015-12-20 +#### v0.7, 2015-12-20  * **Extend GCM IV size to 128 bit from Go's default of 96 bit**    * This pushes back the birthday bound to make IV collisions virtually      impossible @@ -679,7 +679,7 @@ v0.7, 2015-12-20  * New command-line option:    * `-gcmiv128`: Use 128-bit GCM IVs (default true) -v0.6, 2015-12-08 +#### v0.6, 2015-12-08  * **Wide-block filename encryption using EME + DirIV**    * EME (ECB-Mix-ECB) provides even better security than CBC as it fixes      the prefix leak. The used Go EME implementation is @@ -690,11 +690,11 @@ v0.6, 2015-12-08  * New command-line option:    * `-emenames`: Enable EME filename encryption (default true) -v0.5.1, 2015-12-06 +#### v0.5.1, 2015-12-06  * Fix a rename regression caused by DirIV and add test case  * Use fallocate to guard against out-of-space errors -v0.5, 2015-12-04 +#### v0.5, 2015-12-04  * **Stronger filename encryption: DirIV**    * Each directory gets a random 128 bit file name IV on creation,      stored in `gocryptfs.diriv` @@ -710,7 +710,7 @@ v0.5, 2015-12-04      can be used for faster mounting at the cost of lower brute-force      resistance. It was mainly added to speed up the automated tests. -v0.4, 2015-11-15 +#### v0.4, 2015-11-15  * New command-line options:    * `-plaintextnames`: disables filename encryption, added on user request    * `-extpass`: calls an external program for prompting for the password @@ -721,15 +721,15 @@ v0.4, 2015-11-15      format changes. The first user is `-plaintextnames`.  * On-disk format 2 -v0.3, 2015-11-01 +#### v0.3, 2015-11-01  * **Add a random 128 bit file header to authenticate file->block ownership**    * This is an on-disk-format change  * On-disk format 1 -v0.2, 2015-10-11 +#### v0.2, 2015-10-11  * Replace bash daemonization wrapper with native Go implementation  * Better user feedback on mount failures -v0.1, 2015-10-07 +#### v0.1, 2015-10-07  * First release  * On-disk format 0 | 
