From: Milan Broz <gmazyland@gmail.com>
To: sven@whgl.uni-frankfurt.de
Cc: dm-crypt@saout.de
Subject: Re: [dm-crypt] Avoiding fsck.ext4 destruction of crypto_luks data
Date: Sun, 30 Dec 2012 10:39:43 +0100 [thread overview]
Message-ID: <50E00BDF.2000109@gmail.com> (raw)
In-Reply-To: <96a12d6b77c3f72a240b489e3ceefa4a.squirrel@ssl.verfeiert.org>
On 12/30/2012 09:42 AM, Sven Eschenberg wrote:
> Hi Milan,
>
> What happens though, if signatures are not accessible during luksFormat?
> (Or alternatively, are not found, because they are misaligned from the
> current setup's perspective?)
>
> Scenario, create a md volume with 1.0 metadata (end of device), start md
> device, do luks format.
Well, there are priorities but in fact these configurations need some
external info (or admin knowledge).
> Now, in intial unused state, the luks header and md metadata is visible.
> While cryptsetup might be able to realize that the md device should first
> be started, this might not be true for all tools (unfortunately). Possible
> similiar scenarions with leftover superblocks etc. can surely be created.
Yes, and in the MD format (end of device) case the problem repeats very often.
> I am aware this is a specific case due to the end of device policy of the
> md metada v1.0. What I am trying to say is, not all cases can
> automagically be resolved, sometimes the knowledge and interaction of an
> admin might really be required. And for educated guessing, the admin needs
> to be educated beforehand ;-).
Yes, fully agree. I can mention other situations, which can be configured
this way (LVM has several such undocumented scenarios) where you cannot
automatically say which signature is the first...
(I can write very long description about plans about "block device assembly"
library under util-linux project which should help to solve this, but I am
afraid that I will not work on this project anymore.)
And because we are on dmcrypt list - there is always need from security
(or paranoid ;) people to separate or hide metadata (e.g. LUKS header or
hidden container). In this situation you simply must know some info in advance
to properly activate such storage...
Milan
next prev parent reply other threads:[~2012-12-30 9:39 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-27 6:12 [dm-crypt] Avoiding fsck.ext4 destruction of crypto_luks data Emily Williams
2012-12-27 9:35 ` ken
2012-12-27 9:52 ` Arno Wagner
2012-12-28 14:46 ` Sven Eschenberg
2012-12-28 15:04 ` Arno Wagner
2012-12-28 19:22 ` Milan Broz
2012-12-29 7:06 ` Arno Wagner
2012-12-29 9:05 ` Milan Broz
2012-12-29 11:52 ` Arno Wagner
2012-12-30 8:42 ` Sven Eschenberg
2012-12-30 9:39 ` Milan Broz [this message]
2012-12-30 10:53 ` Arno Wagner
2012-12-30 12:08 ` Sven Eschenberg
2012-12-30 12:25 ` Milan Broz
2012-12-30 13:19 ` Arno Wagner
2012-12-30 16:59 ` Emily Williams
2012-12-30 18:49 ` Matthias Schniedermeyer
2012-12-30 19:45 ` Arno Wagner
2012-12-31 6:37 ` Sven Eschenberg
2012-12-31 12:40 ` Richard
2012-12-27 20:29 ` Richard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50E00BDF.2000109@gmail.com \
--to=gmazyland@gmail.com \
--cc=dm-crypt@saout.de \
--cc=sven@whgl.uni-frankfurt.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.