All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Bugs/Undoucmented features
@ 2015-01-23 21:33 Ahmed, Safayet (GE Global Research)
  2015-01-23 22:23 ` Sven Eschenberg
  2015-01-24  9:44 ` Milan Broz
  0 siblings, 2 replies; 7+ messages in thread
From: Ahmed, Safayet (GE Global Research) @ 2015-01-23 21:33 UTC (permalink / raw)
  To: dm-crypt@saout.de

I've been looking into the cryptsetup tool and I just wanted to mention some 
bugs/undocumented features I came across.

1 detached headers
------------------

For a Luks setup that uses a detached header, a lot of the cryptsetup commands
don't work in an intuitive way. Specifically, the "--header" option is ignored 
and cryptsetup throws an error that the specified device is not a Luks device. 
The cryptsetup commands work when the path to the actual luks device is 
replaced with the path to the header file. This was the case for the following 
commands:

    luksDump
    luksAddKey
    luksKillSlot

I didn't check for the other commands. If this is the intended behavior, I 
think it should be mentioned in the doucmentation that the header file should 
be used in place of the <device> argument in the case of detached LUKS headers.


2 master-key-file with new-key-file
-----------------------------------

For the luksAddKey command, when the "--master-key-file" argument is specified,
the new-key-file positional argument is ignored. Whether or not a file is
provided for the new pass phrase, the user is prompted to enter a pass phrase.

The problem is in the implementation of the function "action_luksAddKey" in 
"src/cryptsetup.c". Consider the following lines (916 - 927):

	if (opt_master_key_file) {
		r = _read_mk(opt_master_key_file, &key, keysize);
		if (r < 0)
			goto out;
		//FIXME: process keyfile arg
		r = crypt_keyslot_add_by_volume_key(cd, opt_key_slot,
						    key, keysize, NULL, 0);
	} else if (opt_key_file || opt_new_key_file) {
		r = crypt_keyslot_add_by_keyfile_offset(cd, opt_key_slot,
			opt_key_file, opt_keyfile_size, opt_keyfile_offset,
			opt_new_key_file, opt_new_keyfile_size, opt_new_keyfile_offset);
	} else {

When the master key is present, the code doesn't check "opt_new_key_file" and 
assumes that the user should be prompted for the pass phrase.

Is this the intended behavior of luksAddKey?

regards,

Safayet Ahmed

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-23 21:33 [dm-crypt] Bugs/Undoucmented features Ahmed, Safayet (GE Global Research)
@ 2015-01-23 22:23 ` Sven Eschenberg
  2015-01-24  0:10   ` Arno Wagner
  2015-01-24  9:44 ` Milan Broz
  1 sibling, 1 reply; 7+ messages in thread
From: Sven Eschenberg @ 2015-01-23 22:23 UTC (permalink / raw)
  To: dm-crypt

On Fri, January 23, 2015 22:33, Ahmed, Safayet (GE Global Research) wrote:
> I've been looking into the cryptsetup tool and I just wanted to mention
> some
> bugs/undocumented features I came across.
>
> 1 detached headers
> ------------------
>
> For a Luks setup that uses a detached header, a lot of the cryptsetup
> commands
> don't work in an intuitive way. Specifically, the "--header" option is
> ignored
> and cryptsetup throws an error that the specified device is not a Luks
> device.
> The cryptsetup commands work when the path to the actual luks device is
> replaced with the path to the header file. This was the case for the
> following
> commands:
>
>     luksDump
>     luksAddKey
>     luksKillSlot
>
> I didn't check for the other commands. If this is the intended behavior, I
> think it should be mentioned in the doucmentation that the header file
> should
> be used in place of the <device> argument in the case of detached LUKS
> headers.

Operations on the HEADER naturally require the header and not the actual
payload. It would be redundant to pass the payload (device) and naturally
the header is the only (direct) parameter. Should this be mentioned more
clearly in the docs/manpage? Possibly yes.

>
>
> 2 master-key-file with new-key-file
> -----------------------------------
>
> For the luksAddKey command, when the "--master-key-file" argument is
> specified,
> the new-key-file positional argument is ignored. Whether or not a file is
> provided for the new pass phrase, the user is prompted to enter a pass
> phrase.

I think I reported this quite a while back and it was supposedly fixed
some while ago (2010 IIRC).

>
> The problem is in the implementation of the function "action_luksAddKey"
> in
> "src/cryptsetup.c". Consider the following lines (916 - 927):
>
> 	if (opt_master_key_file) {
> 		r = _read_mk(opt_master_key_file, &key, keysize);
> 		if (r < 0)
> 			goto out;
> 		//FIXME: process keyfile arg
> 		r = crypt_keyslot_add_by_volume_key(cd, opt_key_slot,
> 						    key, keysize, NULL, 0);
> 	} else if (opt_key_file || opt_new_key_file) {
> 		r = crypt_keyslot_add_by_keyfile_offset(cd, opt_key_slot,
> 			opt_key_file, opt_keyfile_size, opt_keyfile_offset,
> 			opt_new_key_file, opt_new_keyfile_size, opt_new_keyfile_offset);
> 	} else {
>
> When the master key is present, the code doesn't check "opt_new_key_file"
> and
> assumes that the user should be prompted for the pass phrase.
>
> Is this the intended behavior of luksAddKey?
>
> regards,
>
> Safayet Ahmed
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-23 22:23 ` Sven Eschenberg
@ 2015-01-24  0:10   ` Arno Wagner
  0 siblings, 0 replies; 7+ messages in thread
From: Arno Wagner @ 2015-01-24  0:10 UTC (permalink / raw)
  To: dm-crypt

On Fri, Jan 23, 2015 at 23:23:16 CET, Sven Eschenberg wrote:
> On Fri, January 23, 2015 22:33, Ahmed, Safayet (GE Global Research) wrote:
> > I've been looking into the cryptsetup tool and I just wanted to mention
> > some
> > bugs/undocumented features I came across.
> >
> > 1 detached headers
> > ------------------
> >
> > For a Luks setup that uses a detached header, a lot of the cryptsetup
> > commands
> > don't work in an intuitive way. Specifically, the "--header" option is
> > ignored
> > and cryptsetup throws an error that the specified device is not a Luks
> > device.
> > The cryptsetup commands work when the path to the actual luks device is
> > replaced with the path to the header file. This was the case for the
> > following
> > commands:
> >
> >     luksDump
> >     luksAddKey
> >     luksKillSlot
> >
> > I didn't check for the other commands. If this is the intended behavior, I
> > think it should be mentioned in the doucmentation that the header file
> > should
> > be used in place of the <device> argument in the case of detached LUKS
> > headers.
> 
> Operations on the HEADER naturally require the header and not the actual
> payload. It would be redundant to pass the payload (device) and naturally
> the header is the only (direct) parameter. Should this be mentioned more
> clearly in the docs/manpage? Possibly yes.

While this is obvious behavior if you have the LUKS data model
in mind, I think it is a valid criticism of the documentation.

I will make this more obvious in the man-page and maybe add an 
FAQ-item. May take a week or two though, I currently have a lot 
of work.

> >
> >
> > 2 master-key-file with new-key-file
> > -----------------------------------
> >
> > For the luksAddKey command, when the "--master-key-file" argument is
> > specified,
> > the new-key-file positional argument is ignored. Whether or not a file is
> > provided for the new pass phrase, the user is prompted to enter a pass
> > phrase.
> 
> I think I reported this quite a while back and it was supposedly fixed
> some while ago (2010 IIRC).

This code seems to still be in 1.6.5, but starting at line 955. 

> >
> > The problem is in the implementation of the function "action_luksAddKey"
> > in
> > "src/cryptsetup.c". Consider the following lines (916 - 927):
> >
> > 	if (opt_master_key_file) {
> > 		r = _read_mk(opt_master_key_file, &key, keysize);
> > 		if (r < 0)
> > 			goto out;
> > 		//FIXME: process keyfile arg
> > 		r = crypt_keyslot_add_by_volume_key(cd, opt_key_slot,
> > 						    key, keysize, NULL, 0);
> > 	} else if (opt_key_file || opt_new_key_file) {
> > 		r = crypt_keyslot_add_by_keyfile_offset(cd, opt_key_slot,
> > 			opt_key_file, opt_keyfile_size, opt_keyfile_offset,
> > 			opt_new_key_file, opt_new_keyfile_size, opt_new_keyfile_offset);
> > 	} else {
> >
> > When the master key is present, the code doesn't check "opt_new_key_file"
> > and
> > assumes that the user should be prompted for the pass phrase.
> >
> > Is this the intended behavior of luksAddKey?

I think this is actually a defect. It is a minor one, as using
the master-key is an emergency-only operation and hence likely
done manyally anyways. But if I am right and it is a defect, it
should probably get an item on the issues-list.

Gr"usse,
Arno

> > regards,
> >
> > Safayet Ahmed
> > _______________________________________________
> > dm-crypt mailing list
> > dm-crypt@saout.de
> > http://www.saout.de/mailman/listinfo/dm-crypt
> >
> 
> 
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-23 21:33 [dm-crypt] Bugs/Undoucmented features Ahmed, Safayet (GE Global Research)
  2015-01-23 22:23 ` Sven Eschenberg
@ 2015-01-24  9:44 ` Milan Broz
  2015-01-25 14:00   ` Arno Wagner
  2015-01-26 13:55   ` Milan Broz
  1 sibling, 2 replies; 7+ messages in thread
From: Milan Broz @ 2015-01-24  9:44 UTC (permalink / raw)
  To: Ahmed, Safayet (GE Global Research), dm-crypt@saout.de

Hi,

On 01/23/2015 10:33 PM, Ahmed, Safayet (GE Global Research) wrote:
> I've been looking into the cryptsetup tool and I just wanted to mention some 
> bugs/undocumented features I came across.
> 
> 1 detached headers
> ------------------
> 
> For a Luks setup that uses a detached header, a lot of the cryptsetup commands
> don't work in an intuitive way. Specifically, the "--header" option is ignored 
> and cryptsetup throws an error that the specified device is not a Luks device. 
> The cryptsetup commands work when the path to the actual luks device is 
> replaced with the path to the header file. This was the case for the following 
> commands:
> 
>     luksDump
>     luksAddKey
>     luksKillSlot
> 
> I didn't check for the other commands. If this is the intended behavior, I 
> think it should be mentioned in the doucmentation that the header file should 
> be used in place of the <device> argument in the case of detached LUKS headers.

The detached header was added later and only the commands that require
the --header were initially modified; commands above operates only with header device.

But they should support --header as well and simply use it if specified, should be
easy to fix.
(The libcryptsetup has universal crypt_set_data_device() call.)

I do not think we should document it as an exception, the --header should be simply supported
everywhere (despite the data device would be completely ignored, this seems to me like
a simpler way for the user - once you specify --header, it is used.
If not, code will try to use default arg.)


> 2 master-key-file with new-key-file
> -----------------------------------
> 
> For the luksAddKey command, when the "--master-key-file" argument is specified,
> the new-key-file positional argument is ignored. Whether or not a file is
> provided for the new pass phrase, the user is prompted to enter a pass phrase.
> 
> The problem is in the implementation of the function "action_luksAddKey" in 
> "src/cryptsetup.c". Consider the following lines (916 - 927):
> 
> 	if (opt_master_key_file) {
> 		r = _read_mk(opt_master_key_file, &key, keysize);
> 		if (r < 0)
> 			goto out;
> 		//FIXME: process keyfile arg
> 		r = crypt_keyslot_add_by_volume_key(cd, opt_key_slot,
> 						    key, keysize, NULL, 0);
> 	} else if (opt_key_file || opt_new_key_file) {
> 		r = crypt_keyslot_add_by_keyfile_offset(cd, opt_key_slot,
> 			opt_key_file, opt_keyfile_size, opt_keyfile_offset,
> 			opt_new_key_file, opt_new_keyfile_size, opt_new_keyfile_offset);
> 	} else {
> 
> When the master key is present, the code doesn't check "opt_new_key_file" and 
> assumes that the user should be prompted for the pass phrase.
> 
> Is this the intended behavior of luksAddKey?

No, I think it is just missing code here. Only opt_new_keyfile_size should be parsed
here because master-key is provided (opt_key_file would be redundant).

Milan

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-24  9:44 ` Milan Broz
@ 2015-01-25 14:00   ` Arno Wagner
  2015-01-26 13:55   ` Milan Broz
  1 sibling, 0 replies; 7+ messages in thread
From: Arno Wagner @ 2015-01-25 14:00 UTC (permalink / raw)
  To: dm-crypt

On Sat, Jan 24, 2015 at 10:44:55 CET, Milan Broz wrote:
> Hi,
> 
> On 01/23/2015 10:33 PM, Ahmed, Safayet (GE Global Research) wrote:
> > I've been looking into the cryptsetup tool and I just wanted to mention some 
> > bugs/undocumented features I came across.
> > 
> > 1 detached headers
> > ------------------
> > 
> > For a Luks setup that uses a detached header, a lot of the cryptsetup commands
> > don't work in an intuitive way. Specifically, the "--header" option is ignored 
> > and cryptsetup throws an error that the specified device is not a Luks device. 
> > The cryptsetup commands work when the path to the actual luks device is 
> > replaced with the path to the header file. This was the case for the following 
> > commands:
> > 
> >     luksDump
> >     luksAddKey
> >     luksKillSlot
> > 
> > I didn't check for the other commands. If this is the intended behavior, I 
> > think it should be mentioned in the doucmentation that the header file should 
> > be used in place of the <device> argument in the case of detached LUKS headers.
> 
> The detached header was added later and only the commands that require
> the --header were initially modified; commands above operates only with header device.
> 
> But they should support --header as well and simply use it if specified, should be
> easy to fix.
> (The libcryptsetup has universal crypt_set_data_device() call.)
> 
> I do not think we should document it as an exception, the --header should be simply supported
> everywhere (despite the data device would be completely ignored, this seems to me like
> a simpler way for the user - once you specify --header, it is used.
> If not, code will try to use default arg.)

Yes, I think that would be better as it does not silently switch 
between two different semantics of the positional argument.
So no changes to the documentation.

Arno
 
> 
> > 2 master-key-file with new-key-file
> > -----------------------------------
> > 
> > For the luksAddKey command, when the "--master-key-file" argument is specified,
> > the new-key-file positional argument is ignored. Whether or not a file is
> > provided for the new pass phrase, the user is prompted to enter a pass phrase.
> > 
> > The problem is in the implementation of the function "action_luksAddKey" in 
> > "src/cryptsetup.c". Consider the following lines (916 - 927):
> > 
> > 	if (opt_master_key_file) {
> > 		r = _read_mk(opt_master_key_file, &key, keysize);
> > 		if (r < 0)
> > 			goto out;
> > 		//FIXME: process keyfile arg
> > 		r = crypt_keyslot_add_by_volume_key(cd, opt_key_slot,
> > 						    key, keysize, NULL, 0);
> > 	} else if (opt_key_file || opt_new_key_file) {
> > 		r = crypt_keyslot_add_by_keyfile_offset(cd, opt_key_slot,
> > 			opt_key_file, opt_keyfile_size, opt_keyfile_offset,
> > 			opt_new_key_file, opt_new_keyfile_size, opt_new_keyfile_offset);
> > 	} else {
> > 
> > When the master key is present, the code doesn't check "opt_new_key_file" and 
> > assumes that the user should be prompted for the pass phrase.
> > 
> > Is this the intended behavior of luksAddKey?
> 
> No, I think it is just missing code here. Only opt_new_keyfile_size should be parsed
> here because master-key is provided (opt_key_file would be redundant).
> 
> Milan
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-24  9:44 ` Milan Broz
  2015-01-25 14:00   ` Arno Wagner
@ 2015-01-26 13:55   ` Milan Broz
  2015-01-26 14:36     ` Arno Wagner
  1 sibling, 1 reply; 7+ messages in thread
From: Milan Broz @ 2015-01-26 13:55 UTC (permalink / raw)
  To: Ahmed, Safayet (GE Global Research), dm-crypt@saout.de

On 01/24/2015 10:44 AM, Milan Broz wrote:

>> 1 detached headers
>> 2 master-key-file with new-key-file

Both these problems are fixed in the devel git tree (so it will be in the next release).

(If there is anything more, let me know please, the best is to use a new issue or this list.)

Thanks,
Milan

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [dm-crypt] Bugs/Undoucmented features
  2015-01-26 13:55   ` Milan Broz
@ 2015-01-26 14:36     ` Arno Wagner
  0 siblings, 0 replies; 7+ messages in thread
From: Arno Wagner @ 2015-01-26 14:36 UTC (permalink / raw)
  To: dm-crypt

Excellent!

Arno


On Mon, Jan 26, 2015 at 14:55:16 CET, Milan Broz wrote:
> On 01/24/2015 10:44 AM, Milan Broz wrote:
> 
> >> 1 detached headers
> >> 2 master-key-file with new-key-file
> 
> Both these problems are fixed in the devel git tree (so it will be in the next release).
> 
> (If there is anything more, let me know please, the best is to use a new issue or this list.)
> 
> Thanks,
> Milan
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2015-01-26 14:36 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-01-23 21:33 [dm-crypt] Bugs/Undoucmented features Ahmed, Safayet (GE Global Research)
2015-01-23 22:23 ` Sven Eschenberg
2015-01-24  0:10   ` Arno Wagner
2015-01-24  9:44 ` Milan Broz
2015-01-25 14:00   ` Arno Wagner
2015-01-26 13:55   ` Milan Broz
2015-01-26 14:36     ` Arno Wagner

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.