Age | Commit message (Collapse) | Author | Files | Lines |
|
here. So it's not possible to mount cfs from "mountall" -- it will have to
be mounted by hand later in startup, e.g. rc.local.
|
|
|
|
bsd.pkg.install.mk to handle its generation and installation.
While here, switch to buildlink2. Bump PKGREVISION to 1.
|
|
without needing -traditional. This fixes socklen_t lossage mentioned in
the README.netbsd file. This was tested on i386 NetBSD-1.5 and -current.
|
|
homegrown one doesn't seem to hide the password when it is being entered.
* Add a rc.d style script to start cfsd, and also install the documentation
for the filesystem.
* Rename c* commands to cfs_* to avoid conflicts with coda programs with
a similar name.
|
|
jlam has time to merge them, on request by jlam.
|
|
CFS pushes encryption services into the UN*X file system. It supports
secure storage at the system level through a standard UN*X file system
interface to encrypted files. Users associate a cryptographic key with the
directories they wish to protect. Files in these directories (as well as
their pathname components) are transparently encrypted and decrypted with
the specified key without further user intervention; cleartext is never
stored on a disk or sent to a remote file server. CFS employs a novel
combination of DES stream and codebook cipher modes to provide high
security with good performance on a modern workstation. CFS can use any
available file system for its underlying storage without modification,
including remote file servers such as NFS. System management functions,
such as file backup, work in a normal manner and without knowledge of the
key.
|