| .. | .. |
|---|
| 5 | 5 | ECryptfs is a stacked filesystem which transparently encrypts and decrypts each |
|---|
| 6 | 6 | file using a randomly generated File Encryption Key (FEK). |
|---|
| 7 | 7 | |
|---|
| 8 | | -Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEFEK) |
|---|
| 8 | +Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEKEK) |
|---|
| 9 | 9 | either in kernel space or in user space with a daemon called 'ecryptfsd'. In |
|---|
| 10 | 10 | the former case the operation is performed directly by the kernel CryptoAPI |
|---|
| 11 | | -using a key, the FEFEK, derived from a user prompted passphrase; in the latter |
|---|
| 11 | +using a key, the FEKEK, derived from a user prompted passphrase; in the latter |
|---|
| 12 | 12 | the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order |
|---|
| 13 | 13 | to support other mechanisms like public key cryptography, PKCS#11 and TPM based |
|---|
| 14 | 14 | operations. |
|---|
| .. | .. |
|---|
| 22 | 22 | The 'encrypted' key type has been extended with the introduction of the new |
|---|
| 23 | 23 | format 'ecryptfs' in order to be used in conjunction with the eCryptfs |
|---|
| 24 | 24 | filesystem. Encrypted keys of the newly introduced format store an |
|---|
| 25 | | -authentication token in its payload with a FEFEK randomly generated by the |
|---|
| 25 | +authentication token in its payload with a FEKEK randomly generated by the |
|---|
| 26 | 26 | kernel and protected by the parent master key. |
|---|
| 27 | 27 | |
|---|
| 28 | 28 | In order to avoid known-plaintext attacks, the datablob obtained through |
|---|
| 29 | 29 | commands 'keyctl print' or 'keyctl pipe' does not contain the overall |
|---|
| 30 | | -authentication token, which content is well known, but only the FEFEK in |
|---|
| 30 | +authentication token, which content is well known, but only the FEKEK in |
|---|
| 31 | 31 | encrypted form. |
|---|
| 32 | 32 | |
|---|
| 33 | 33 | The eCryptfs filesystem may really benefit from using encrypted keys in that the |
|---|