Hi, there is a serious security hole in cryptkeeper.
Details are in this Debian bugreport: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852751
Here is a quote from Kirill Tkhai ktkhai@virtuozzo.com, who found this bug:
"I've looked into cryptkeeper code and found, it calls encfs
with -S option:
execlp ("encfs", "encfs", "-S", crypt_dir, mount_dir, NULL);
exit (0);
While the password is passed to encfs using pipe in this way:
// paranoid default setup mode
//write (fd[1], "y\n", 2);
//write (fd[1], "y\n", 2);
write (fd[1], "p\n", 2);
write (fd[1], password, strlen (password));
write (fd[1], "\n", 1);
But it seems it's wrong. When I'm executing encfs program
from console
$ encfs -S crypt_dir mount_dir
and I'm passing "p\n", encfs exits and doesn't wait for a password
itself."
This may be caused by a change in the underlying encfs interface.