I have taken the berkeley loopback-encryption file kernel patches for
2.0.lownumber and fiddled the patch so that it works with the latest kernel.
(2.0.34, at this stage, but I guess it will work with 2.0.35-pre*). There
are also patches to allow new versions of 'mount/losetup' to handle encrypted
filesystems. The original page is
ftp://ftp.csua.berkeley.edu/pub/cypherpunks/filesystems/linux/
The changes to the original patch were pretty minimal, but I would appreciate
someone going through and checking if there are holes. I don't believe I
have introduced any, but I may be wrong.
I have approached the previous maintainers and have received no reply,
but this may be since I am outside the USA, and they are worried about crypto
laws.
The files are available at:
ftp.is.co.za/linux/local/kernel/crypto/loopback-device-berkeley-recent/
South Africa (za) has no cryptography import/export/posession laws.
There is, of course, no warranty, and this has nothing to do with my
work - it's a hobby :)
If there is sufficient interest, I could create a mailing list for linux
cryptography extensions. Please mail me if you think that this is a good
idea.
Oskar
--- "Haven't slept at all. I don't see why people insist on sleeping. You feel so much better if you don't. And how can anyone want to lose a minute - a single minute of being alive?" -- Think Twice- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu