diff options
author | Jakob Unterwurzacher | 2015-11-01 01:32:33 +0100 |
---|---|---|
committer | Jakob Unterwurzacher | 2015-11-01 01:38:27 +0100 |
commit | 76311b60f2e208dbd93e1e7b6e9794770c14fede (patch) | |
tree | fa71d48744fd1ad6de26aaadd03f2440e4d4103d /pathfs_frontend | |
parent | 73fa8efdb27172210b9751eb86689287db0b1170 (diff) |
Add file header (on-disk-format change)
Format: [ "Version" uint16 big endian ] [ "Id" 16 random bytes ]
Quoting SECURITY.md:
* Every file has a header that contains a 16-byte random *file id*
* Each block uses the file id and its block number as GCM *authentication data*
* This means the position of the blocks is protected as well. The blocks
can not be reordered or copied between different files without
causing an decryption error.
Diffstat (limited to 'pathfs_frontend')
-rw-r--r-- | pathfs_frontend/file.go | 179 | ||||
-rw-r--r-- | pathfs_frontend/fs.go | 3 |
2 files changed, 144 insertions, 38 deletions
diff --git a/pathfs_frontend/file.go b/pathfs_frontend/file.go index 3304267..438fe77 100644 --- a/pathfs_frontend/file.go +++ b/pathfs_frontend/file.go @@ -23,7 +23,7 @@ type file struct { // reuse the fd number after it is closed. When open races // with another close, they may lead to confusion as which // file gets written in the end. - lock sync.Mutex + fdLock sync.Mutex // Was the file opened O_WRONLY? writeOnly bool @@ -33,6 +33,9 @@ type file struct { // Inode number ino uint64 + + // File header + header *cryptfs.FileHeader } func NewFile(fd *os.File, writeOnly bool, cfs *cryptfs.CryptFS) nodefs.File { @@ -54,26 +57,83 @@ func (f *file) InnerFile() nodefs.File { func (f *file) SetInode(n *nodefs.Inode) { } +// Ensure that all modifications to the file contents are serialized and no +// reads happen concurrently. +// +// This prevents several races: +// * getFileId vs Truncate +// * zeroPad vs Read +// * RMW vs Write +func (f *file) wlock() { +} +func (f *file) rlock() { +} +func (f *file) unlock() { +} + +// readHeader - load the file header from disk +// +// Returns io.EOF if the file is empty +func (f *file) readHeader() error { + buf := make([]byte, cryptfs.HEADER_LEN) + _, err := f.fd.ReadAt(buf, 0) + if err != nil { + return err + } + h, err := cryptfs.ParseHeader(buf) + if err != nil { + return err + } + f.header = h + + return nil +} + +// createHeader - create a new random header and write it to disk +func (f *file) createHeader() error { + h := cryptfs.RandomHeader() + buf := h.Pack() + _, err := f.fd.WriteAt(buf, 0) + if err != nil { + return err + } + f.header = h + + return nil +} + func (f *file) String() string { return fmt.Sprintf("cryptFile(%s)", f.fd.Name()) } // doRead - returns "length" plaintext bytes from plaintext offset "off". -// Arguments "length" and "off" do not have to be aligned. +// Arguments "length" and "off" do not have to be block-aligned. // -// doRead reads the corresponding ciphertext blocks from disk, decryptfs them and +// doRead reads the corresponding ciphertext blocks from disk, decrypts them and // returns the requested part of the plaintext. // -// Called by Read() and by Write() and Truncate() for RMW +// Called by Read() for normal reading, +// by Write() and Truncate() for Read-Modify-Write func (f *file) doRead(off uint64, length uint64) ([]byte, fuse.Status) { + // Read file header + if f.header == nil { + err := f.readHeader() + if err == io.EOF { + return nil, fuse.OK + } + if err != nil { + return nil, fuse.ToStatus(err) + } + } + // Read the backing ciphertext in one go alignedOffset, alignedLength, skip := f.cfs.CiphertextRange(off, length) cryptfs.Debug.Printf("CiphertextRange(%d, %d) -> %d, %d, %d\n", off, length, alignedOffset, alignedLength, skip) ciphertext := make([]byte, int(alignedLength)) - f.lock.Lock() + f.fdLock.Lock() n, err := f.fd.ReadAt(ciphertext, int64(alignedOffset)) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil && err != io.EOF { cryptfs.Warn.Printf("read: ReadAt: %s\n", err.Error()) return nil, fuse.ToStatus(err) @@ -81,14 +141,14 @@ func (f *file) doRead(off uint64, length uint64) ([]byte, fuse.Status) { // Truncate ciphertext buffer down to actually read bytes ciphertext = ciphertext[0:n] - blockNo := alignedOffset / f.cfs.CipherBS() + blockNo := (alignedOffset - cryptfs.HEADER_LEN) / f.cfs.CipherBS() cryptfs.Debug.Printf("ReadAt offset=%d bytes (%d blocks), want=%d, got=%d\n", alignedOffset, blockNo, alignedLength, n) // Decrypt it - plaintext, err := f.cfs.DecryptBlocks(ciphertext, blockNo) + plaintext, err := f.cfs.DecryptBlocks(ciphertext, blockNo, f.header.Id) if err != nil { blockNo := (alignedOffset + uint64(len(plaintext))) / f.cfs.PlainBS() - cipherOff := blockNo * f.cfs.CipherBS() + cipherOff := cryptfs.HEADER_LEN + blockNo * f.cfs.CipherBS() plainOff := blockNo * f.cfs.PlainBS() cryptfs.Warn.Printf("ino%d: doRead: corrupt block #%d (plainOff=%d/%d, cipherOff=%d/%d)\n", f.ino, blockNo, plainOff, f.cfs.PlainBS(), cipherOff, f.cfs.CipherBS()) @@ -103,15 +163,15 @@ func (f *file) doRead(off uint64, length uint64) ([]byte, fuse.Status) { out = plaintext[skip : skip+int(length)] } else if lenHave > skip { out = plaintext[skip:lenHave] - } else { - // Out stays empty, file was smaller than the requested offset } + // else: out stays empty, file was smaller than the requested offset return out, fuse.OK } // Read - FUSE call func (f *file) Read(buf []byte, off int64) (resultData fuse.ReadResult, code fuse.Status) { + cryptfs.Debug.Printf("ino%d: FUSE Read: offset=%d length=%d\n", f.ino, len(buf), off) if f.writeOnly { @@ -132,8 +192,27 @@ func (f *file) Read(buf []byte, off int64) (resultData fuse.ReadResult, code fus return fuse.ReadResultData(out), status } -// Do the actual write +// doWrite - encrypt "data" and write it to plaintext offset "off" +// +// Arguments do not have to be block-aligned, read-modify-write is +// performed internally as neccessary +// +// Called by Write() for normal writing, +// and by Truncate() to rewrite the last file block. func (f *file) doWrite(data []byte, off int64) (uint32, fuse.Status) { + + // Read header from disk, create a new one if the file is empty + if f.header == nil { + err := f.readHeader() + if err == io.EOF { + err = f.createHeader() + + } + if err != nil { + return 0, fuse.ToStatus(err) + } + } + var written uint32 status := fuse.OK dataBuf := bytes.NewBuffer(data) @@ -158,14 +237,16 @@ func (f *file) doWrite(data []byte, off int64) (uint32, fuse.Status) { // Write blockOffset, _ := b.CiphertextRange() - blockData = f.cfs.EncryptBlock(blockData, b.BlockNo) - cryptfs.Debug.Printf("ino%d: Writing %d bytes to block #%d, md5=%s\n", f.ino, len(blockData), b.BlockNo, cryptfs.Debug.Md5sum(blockData)) + blockData = f.cfs.EncryptBlock(blockData, b.BlockNo, f.header.Id) + cryptfs.Debug.Printf("ino%d: Writing %d bytes to block #%d, md5=%s\n", + f.ino, len(blockData) - cryptfs.BLOCK_OVERHEAD, b.BlockNo, cryptfs.Debug.Md5sum(blockData)) if len(blockData) != int(f.cfs.CipherBS()) { - cryptfs.Debug.Printf("ino%d: Writing partial block #%d (%d bytes)\n", f.ino, b.BlockNo, len(blockData)) + cryptfs.Debug.Printf("ino%d: Writing partial block #%d (%d bytes)\n", + f.ino, b.BlockNo, len(blockData) - cryptfs.BLOCK_OVERHEAD) } - f.lock.Lock() + f.fdLock.Lock() _, err := f.fd.WriteAt(blockData, int64(blockOffset)) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil { cryptfs.Warn.Printf("Write failed: %s\n", err.Error()) @@ -199,20 +280,20 @@ func (f *file) Write(data []byte, off int64) (uint32, fuse.Status) { // Release - FUSE call, forget file func (f *file) Release() { - f.lock.Lock() + f.fdLock.Lock() f.fd.Close() - f.lock.Unlock() + f.fdLock.Unlock() } // Flush - FUSE call func (f *file) Flush() fuse.Status { - f.lock.Lock() + f.fdLock.Lock() // Since Flush() may be called for each dup'd fd, we don't // want to really close the file, we just want to flush. This // is achieved by closing a dup'd fd. newFd, err := syscall.Dup(int(f.fd.Fd())) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil { return fuse.ToStatus(err) @@ -222,14 +303,27 @@ func (f *file) Flush() fuse.Status { } func (f *file) Fsync(flags int) (code fuse.Status) { - f.lock.Lock() + f.fdLock.Lock() r := fuse.ToStatus(syscall.Fsync(int(f.fd.Fd()))) - f.lock.Unlock() + f.fdLock.Unlock() return r } func (f *file) Truncate(newSize uint64) fuse.Status { + // Common case first: Truncate to zero + if newSize == 0 { + f.fdLock.Lock() + err := syscall.Ftruncate(int(f.fd.Fd()), 0) + f.fdLock.Unlock() + if err != nil { + cryptfs.Warn.Printf("Ftruncate(fd, 0) returned error: %v", err) + return fuse.ToStatus(err) + } + // A truncate to zero kills the file header + f.header = nil + return fuse.OK + } // We need the old file size to determine if we are growing or shrinking // the file @@ -247,6 +341,15 @@ func (f *file) Truncate(newSize uint64) fuse.Status { // File grows if newSize > oldSize { + + // File was empty, create new header + if oldSize == 0 { + err := f.createHeader() + if err != nil { + return fuse.ToStatus(err) + } + } + blocks := f.cfs.SplitRange(oldSize, newSize-oldSize) for _, b := range blocks { // First and last block may be partial @@ -259,9 +362,9 @@ func (f *file) Truncate(newSize uint64) fuse.Status { } } else { off, length := b.CiphertextRange() - f.lock.Lock() + f.fdLock.Lock() err := syscall.Ftruncate(int(f.fd.Fd()), int64(off+length)) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil { cryptfs.Warn.Printf("grow Ftruncate returned error: %v", err) return fuse.ToStatus(err) @@ -272,7 +375,7 @@ func (f *file) Truncate(newSize uint64) fuse.Status { } else { // File shrinks blockNo := f.cfs.BlockNoPlainOff(newSize) - cipherOff := blockNo * f.cfs.CipherBS() + cipherOff := cryptfs.HEADER_LEN + blockNo * f.cfs.CipherBS() plainOff := blockNo * f.cfs.PlainBS() lastBlockLen := newSize - plainOff var data []byte @@ -284,13 +387,15 @@ func (f *file) Truncate(newSize uint64) fuse.Status { return status } } - f.lock.Lock() + // Truncate down to last complete block + f.fdLock.Lock() err = syscall.Ftruncate(int(f.fd.Fd()), int64(cipherOff)) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil { cryptfs.Warn.Printf("shrink Ftruncate returned error: %v", err) return fuse.ToStatus(err) } + // Append partial block if lastBlockLen > 0 { _, status := f.doWrite(data, int64(plainOff)) return status @@ -300,17 +405,17 @@ func (f *file) Truncate(newSize uint64) fuse.Status { } func (f *file) Chmod(mode uint32) fuse.Status { - f.lock.Lock() + f.fdLock.Lock() r := fuse.ToStatus(f.fd.Chmod(os.FileMode(mode))) - f.lock.Unlock() + f.fdLock.Unlock() return r } func (f *file) Chown(uid uint32, gid uint32) fuse.Status { - f.lock.Lock() + f.fdLock.Lock() r := fuse.ToStatus(f.fd.Chown(int(uid), int(gid))) - f.lock.Unlock() + f.fdLock.Unlock() return r } @@ -318,9 +423,9 @@ func (f *file) Chown(uid uint32, gid uint32) fuse.Status { func (f *file) GetAttr(a *fuse.Attr) fuse.Status { cryptfs.Debug.Printf("file.GetAttr()\n") st := syscall.Stat_t{} - f.lock.Lock() + f.fdLock.Lock() err := syscall.Fstat(int(f.fd.Fd()), &st) - f.lock.Unlock() + f.fdLock.Unlock() if err != nil { return fuse.ToStatus(err) } @@ -330,7 +435,7 @@ func (f *file) GetAttr(a *fuse.Attr) fuse.Status { return fuse.OK } -// Allocate FUSE call, fallocate(2) +// Allocate - FUSE call, fallocate(2) func (f *file) Allocate(off uint64, sz uint64, mode uint32) fuse.Status { cryptfs.Warn.Printf("Fallocate is not supported, returning ENOSYS - see https://github.com/rfjakob/gocryptfs/issues/1\n") return fuse.ENOSYS @@ -354,9 +459,9 @@ func (f *file) Utimens(a *time.Time, m *time.Time) fuse.Status { ts[1].Sec = m.Unix() } - f.lock.Lock() + f.fdLock.Lock() fn := fmt.Sprintf("/proc/self/fd/%d", f.fd.Fd()) err := syscall.UtimesNano(fn, ts) - f.lock.Unlock() + f.fdLock.Unlock() return fuse.ToStatus(err) } diff --git a/pathfs_frontend/fs.go b/pathfs_frontend/fs.go index ba46309..eebc87b 100644 --- a/pathfs_frontend/fs.go +++ b/pathfs_frontend/fs.go @@ -119,7 +119,8 @@ func (fs *FS) Mknod(name string, mode uint32, dev uint32, context *fuse.Context) } func (fs *FS) Truncate(path string, offset uint64, context *fuse.Context) (code fuse.Status) { - return fs.FileSystem.Truncate(fs.EncryptPath(path), offset, context) + cryptfs.Warn.Printf("Truncate of a closed file is not supported, returning ENOSYS\n") + return fuse.ENOSYS } func (fs *FS) Utimens(path string, Atime *time.Time, Mtime *time.Time, context *fuse.Context) (code fuse.Status) { |