We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
From: https://defuse.ca/audits/encfs.htm
Exploitability: Low Security Impact: Medium
EncFS uses 64-bit MACs. This is not long enough, as they can be forged in 2^64 time, which is feasible today.
EncFS should use (at least) 128-bit MACs.
The text was updated successfully, but these errors were encountered:
Remove EncFS
c4e8b79
From the latest audit (https://defuse.ca/audits/encfs.htm): > EncFS is probably safe as long as the adversary only gets one copy of > the ciphertext and nothing more. EncFS is not safe if the adversary has > the opportunity to see two or more snapshots of the ciphertext at > different times. EncFS attempts to protect files from malicious > modification, but there are serious problems with this feature. vgough/encfs#8 vgough/encfs#9 (critical) vgough/encfs#10 vgough/encfs#11 vgough/encfs#13 vgough/encfs#16 vgough/encfs#17
No branches or pull requests
From: https://defuse.ca/audits/encfs.htm
Exploitability: Low
Security Impact: Medium
EncFS uses 64-bit MACs. This is not long enough, as they can be forged in 2^64 time, which is feasible today.
EncFS should use (at least) 128-bit MACs.
The text was updated successfully, but these errors were encountered: