Skip to content

Commit

Permalink
Merge pull request #263 from DrDaveD/pick262
Browse files Browse the repository at this point in the history
update security description related to unprivileged encryption (1.2)
  • Loading branch information
DrDaveD authored Mar 12, 2024
2 parents 9e4393c + f3a210b commit 04773ea
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/pull_request.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ jobs:

- name: Install Sphinx
run: |
pip install --user --upgrade --upgrade-strategy eager sphinx sphinx-rtd-theme restructuredtext_lint rstcheck pygments m2r2
pip install --user --upgrade --upgrade-strategy eager setuptools sphinx sphinx-rtd-theme restructuredtext_lint rstcheck pygments m2r2
- name: Lint rst
run: |
Expand Down
12 changes: 6 additions & 6 deletions security.rst
Original file line number Diff line number Diff line change
Expand Up @@ -109,11 +109,10 @@ However, there are also some disadvantages of the non-suid mode:
container, which is a big advantage over having many files directly
on networked filesystems.

- Encryption is not yet supported. In suid mode, {Project} uses kernel LUKS2
mounts to run encrypted containers without writing a decrypted
version of their content to disk.
An unprivileged FUSE filesystem will hopefully be able to perform this
operation in a future release.
- Non-suid mode SIF file encryption is incompatible with the older suid
mode encryption. It uses a kernel feature that does not have an exact
uprivileged replacement, but encryption is available unprivileged by
making use of a FUSE program.

- Some little used :ref:`security options <security-options>` and
:ref:`network options <networking>` of {Project} that give users elevated
Expand Down Expand Up @@ -215,7 +214,8 @@ feature. This is the same technology routinely used for full disk
encryption. The encrypted container is mounted directly through the
kernel. Unlike other container formats, the encrypted container is run
without ever decrypting its contents to disk.
Encryption and decryption is not currently supported in non-suid mode.
Non-suid encryption and decryption uses the FUSE gocryptfs program,
which also avoids decrypting contents to disk.

*******************************
Configuration & Runtime Options
Expand Down

0 comments on commit 04773ea

Please sign in to comment.