Encrypted Fileserver with Bittorrent Web Interface 266
mistermark writes "I built a fully encrypted (samba) fileserver with a web interface for managing torrent downloads on it. All I used is OpenBSD 3.6 and its package collection, except for the TorrentFlux-interface (which you need to install separately). Anyway, it can be built using binary packages only. I included a rough HOWTO on how to make one of these yourself."
Re:Piracy how-tos? (Score:1, Informative)
Re:why? (Score:1, Informative)
On 2000/XP, you can do this yourself by right clicking on the folder containing your warez/tunez and checking the encryption box. As long as Bittorrent runs with you as the current user, its reads and writes to that folder are automatically encrypted and decrypted by the filesystem.
Re:why? (Score:3, Informative)
Obstruction of justice (Score:5, Informative)
http://www.ohiobar.org/pub/lycu/index.asp?article
Already Been Done (Score:2, Informative)
Why is my way better? Well, the default BitTorrent client is somewhat lacking feature wise. Azureus is more powerful and gives you more control over what to do with the torrents when they are done downloading. Not to mention the support for trackerless torrents [slashdot.org] in the latest version. As for encryption goes... uh, why? The only people who have access to my "files" are those that are on the network. And the Swing Web Interface plugin has password functionality with HTTP SSL (you need GPG to be installed).
Be very, very careful when using EFS!!! (Score:5, Informative)
Be very, very careful when using the Windows XP built-in file encryption, called EFS (Encryping File System).
EFS is very poorly documented. The encryption is tied to your user password in a way that is apparently not documented. EFS depends on being part of a Windows 2003 Server domain in a way that is not clearly documented; if you are using Windows XP on a stand alone computer, there are situations in which you will lose your files forever.
Microsoft technical support agrees with what I just said, and provides no help or fixes.
The official Microsoft forums contain the complaints of many people who have lost their files due to problems with EFS. One man said he lost 11 years of research.
People complain about Microsoft every day on Slashdot, but I've never seen a discussion by anyone who seemed to realize how bad Microsoft truly is.
Re:Be very, very careful when using EFS!!! (Score:3, Informative)
For Your Eyes Only... (Score:3, Informative)
Recovering Encrypted Files
Any data recovery agent can recover an encrypted file when a user's private key fails to decrypt the file.
To recover an encrypted file
1. Log on to a computer that has access to the user's profile; for example, a computer that has a designated recovery console or a recovery key on removable media such as a floppy disk. You might log on at the user's computer or the user might have a roaming profile.
2. Locate the encrypted file. For example, the user might have made a backup of the file by using Backup or sent the file to a WebDAV Web folder.
3. Decrypt the file by using either the cipher command or My Computer. This will make the file available to the user.
For more information about decrypting files, see "Working with Encryption and Decryption" earlier in this chapter.
As for corrupted encripted files, well, I think it is almost impossible for an encripted file to be restored if it is corrupted, unless it has some kind of recovery record overhead...
Of course, I would better opt out for an standard open cyphering method.
Slashdotted - Mirrors Here (Score:2, Informative)
Re:Be very, very careful when using EFS!!! (Score:3, Informative)
Re:Obstruction of justice (Score:3, Informative)
Let me get this straight with another example:
Cop: "Are you guilty of [crime]?"
Me: "No!" or
Me: "..."
Despite my handsomely elaborate defense, I end up in jail for [crime] with a definitive sentence.
At that point, the zealous cop shows up and tells me he's also going to charge me with obstruction of justice, because he kindly asked me a question the first time around, and I lied or said nothing?
You got it backwards, I guess. The suspect is never required to collaborate with his/her prosecutors. They may strike a deal if they choose to do so. Obstruction of justice is a felony witnesses and persons who haven't been charged commit.
One instance where you could be right might be if a suspect tampers with something that already has been "identified" as evidence, or falsifies something as evidence in their defense. Your linked citation doesn't mention a single instance where a suspect is actually committing obstruction of justice. RTFC.
Re:I prefer VNC & Azureus (Score:1, Informative)
Re:Be very, very careful when using EFS!!! (Score:3, Informative)
"You're just a user so screw off. We're far too important to worry about your stupid data."
I can't see any other explanation.
Many scattered, poorly written documents about EFS (Score:3, Informative)
I've read the many scattered, poorly written documents about EFS. I find them very misleading. For example, the information above does not say that it applies only if the encrypting computer is part of a Windows domain.
You act sure, but you say, "I believe." (Score:4, Informative)
You said, "This is another example of mod-by-agreement. Anyway, EFS is documented perfectly well."
Correction: This is another example of someone on Slashdot acting sure when he knows nothing about the issue, and didn't even read the document at his first link in his Google Search: Microsoft Windows XP - Data Recovery and Data Recovery Agents [microsoft.com], which says:
"The default design for the EFS recovery policy is different in Windows XP Professional than it was in Windows 2000 Professional. Stand-alone computers [using Windows XP] do not have a default DRA, but Microsoft strongly recommends that all environments have at least one designated DRA.
"In a Windows 2000 environment, if an administrator attempts to configure an EFS recovery policy with no recovery agent certificates, EFS is automatically disabled. In a Windows XP Professional environment, the same action enables users to encrypt files without a DRA. In a mixed environment an empty EFS recovery policy turns off EFS on Windows 2000 computers, but only eliminates the requirement for a DRA on Windows XP Professional computers."
This information means that you can lose your files in Windows XP in a way that you could not lose them in Windows 2000. Microsoft made this change, but provided no on-screen warning.
The Microsoft document quoted above says, "Stand-alone computers do not have a default DRA,..."
It should say, Stand-alone computers CANNOT have a DRA that allows decryption of files from a different computer with the same user name and password.
As I mentioned, this was verified by Microsoft Tecnhical Support representatives, as was the information in my parent post.
You said above, "I believe the process can be started with a simple cipher
Re:Obstruction of justice (Score:3, Informative)
I'm not sure if we're thinking of the same project, but the one I knew was called "rubber hose". For a while, it was hosted at www.rubberhose.org, but that site dropped off the net several years ago, and to the best of my knowledge has not reappeared since.
A few sites still carry copies of the rubberhose 0.8.3 source - a quick Google for the tarball [google.com] returns a half-dozen or so hits, although some of the copies no longer exist.
The goal of the project was to allow a virtually unlimited number of encrypted filesystems to live on a drive, each with its own key. If someone attempts a "rubber hose" crypto attack (beating you with a rubber hose until you cough up a key), you can provide key(s) for accessing the sacrificial filesystem(s). Since there's no way for the attacker to know how many keys you may have created, there's no way for the attacker to be certain that you've handed over every single key. Conversely, there's also no way for you to prove that you've actually cooperated and turned over every key. The doc/beatings.txt file from the source tarball has some interesting thoughts about the implications of neither attacker nor defender being able to prove/disprove the existence of additional keys.
Re:EFS encrypts with two passwords. (Score:3, Informative)
There aren't any 'hidden passwords'.
Re:Be very, very careful when using EFS!!! (Score:2, Informative)
Re:Be very, very careful when using EFS!!! (Score:4, Informative)
http://support.microsoft.com/default.aspx?scid=kb
Summary: Rejoin your original domain and change your password to your original password.
People complain about Microsoft every day on Slashdot, but I've never seen a discussion by anyone who seemed to realize that if all you wannabe Windows Administrators left the "market", the world would be a better place for everyone.