From: Milan Broz <gmazyland@gmail.com>
To: Ciprian Dorin Craciun <ciprian.craciun@gmail.com>
Cc: dm-crypt@saout.de, ".. ink .." <mhogomchungu@gmail.com>,
Milan Broz <gmazyland@gmail.com>
Subject: Re: [dm-crypt] dm-crypt "inverted" usage (i.e. exporting an "encrypted" image of a block device)
Date: Thu, 01 Aug 2013 12:41:34 +0200 [thread overview]
Message-ID: <51FA3B5E.6030800@gmail.com> (raw)
In-Reply-To: <CA+Tk8fwmr7FaetvfFkoydiLY2KMpNCmxTStCd8VgrCnHr7gRqA@mail.gmail.com>
On 08/01/2013 11:49 AM, Ciprian Dorin Craciun wrote:
> On Thu, Aug 1, 2013 at 10:43 AM, Milan Broz <gmazyland@gmail.com> wrote:
>> On 1.8.2013 9:00, Ciprian Dorin Craciun wrote:
>>>
>>> As said, I guess this can be obtained in two ways:
>>> * either if there is a "backward" mode for dm-crypt; (which I'm
>>> not aware of;)
>>
>>
>> No, there is not.
>>
>> I hope I understand your use case correctly, bu if so, this mode
>> (transport over network) _cannot_ be secure.
>
> Indeed such a solution I'm after won't be "completely" secure (as
> a matter of fact nothing can be completely as that would imply
> perfection). And in my particular use case I don't need it.
Well, you have been warned... and you can always shoot yourself in the foot ;-)
I think that quick hack to try it would be to write simple kernel
cipher module (or wrapper), where you only change cipher name
(so it will not mix up with normal implementation, name like reverse_aes or so)
and just switch encrypt/decrypt callbacks.
I am afraid you will need to avoid LUKS and IV where encryption
is used (ESSIV) (or at least you must analyze if encrypt/decrypt change
for the given cipher is safe for use there).
Then just use this reverse cipher for exported disk only.
IMHO configuring openVPN an just use iscsi over it is better, more secure
and you do not need to hack around it.
For saturating Gigabit network you need fast cpu anyway.
Milan
next prev parent reply other threads:[~2013-08-01 10:41 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-07-31 19:28 [dm-crypt] dm-crypt "inverted" usage (i.e. exporting an "encrypted" image of a block device) Ciprian Dorin Craciun
2013-08-01 0:35 ` Arno Wagner
2013-08-01 4:38 ` Ciprian Dorin Craciun
2013-08-01 6:02 ` .. ink ..
2013-08-01 7:00 ` Ciprian Dorin Craciun
2013-08-01 7:43 ` Milan Broz
2013-08-01 9:49 ` Ciprian Dorin Craciun
2013-08-01 10:41 ` Milan Broz [this message]
2013-08-01 13:34 ` Arno Wagner
2013-08-01 14:46 ` Erik Logtenberg
2013-08-01 16:17 ` Ciprian Dorin Craciun
2013-08-01 20:36 ` infrabit
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=51FA3B5E.6030800@gmail.com \
--to=gmazyland@gmail.com \
--cc=ciprian.craciun@gmail.com \
--cc=dm-crypt@saout.de \
--cc=mhogomchungu@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.