Next: The Kerberized Key Management
Up: Key management
Previous: Raw Key Management Scheme
This scheme allows users to generate their keys and to store them
in a database in encrypted form using the login password as key.
Thus, TCFS users must not remember their master key, but only their
login password.
To benefit of the BKMS a user must be registered with the key database
(typically the file /etc/tcfspwdb)
by the system administrator. The usage of the BKM scheme follows the phases below:
- The system administrator registers a user to the key database
(Fig. 1)
by issuing the command tcfsadduser.
- The user creates his master key by running the tcfsgenkey command.
tcfsgenkey generates a random key, encrypts it with the user's password,
and stores it in the entry of the key database associated with the user.
- When the user needs to access his encrypted files, he must extract
his master key from the database (providing his password), and give it to
the TCFS layer. This operation can be performed with the tcfsputkey
command(Fig. 2).
- The user terminates his session by running the tcfsrmkey command
which erases the key from the kernel.
Setting up a TCFS group requires the following steps:
- The system administrator creates a normal UNIX group, then creates a
TCFS group by running the tcfsaddgroup command.
This utility asks for the number of group member, the threshold, the password,
and the username of each member of the new TCFS group.
For each member, a share is created, encrypted with the
password of the respective user and then it is stored in
the TCFS group keys database ( tcfsgpwdb).
- To become active, a member of a TCFS group pushes
her share into the kernel. This can be accomplished by
executing the command tcfsputkey with the -g
switch. Note that, user can get access to shared files
only if the number of the same group shares pushed to the
kernel is greater or equal to the group's threshold.
- The tcfsrmkey -g command ends the user's session.
Figure 2:
A simple TCFS session
|
The aim of the BKMS is to provide the user with a simple to use management
scheme. It is not to be considered very secure as the user master key
is protected by the user login password that can be compromised in several ways.
Next: The Kerberized Key Management
Up: Key management
Previous: Raw Key Management Scheme
The TCFS Team
2001-04-27