From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] XTS cipher mode limitations (FAQ additions)
Date: Mon, 23 Aug 2010 02:46:35 +0200 [thread overview]
Message-ID: <20100823004635.GA19317@tansi.org> (raw)
In-Reply-To: <1282481432.3241.44.camel@fermat.scientia.net>
On Sun, Aug 22, 2010 at 02:50:32PM +0200, Christoph Anton Mitterer wrote:
> Hi Arno.
>
> Thanks for that =)
>
> On Sat, 2010-08-21 at 02:22 +0200, Arno Wagner wrote:
> > > 1) I guess we've already concluded that it's one of the securest modes
> > > available (if not the securest),... also protecting against certain
> > > attacks for which the others are vulnerable.
> > Yes.
>
> I know this will probably lead to some discussion ;) ... but should we
> perhaps suggest this in the FAQ?
> E.g. something like a section "Which mode should one use?", and then XTS
> withstands currently most known attacks, it has been standardised by
> IEEE (1619 IIRC). etc. pp.
> Perhaps also than one should use plain64 in all kernels supporting it,
> and at least when device > 2TB.
I think the item "What about XTS mode?" already covers that.
> btw: In the question "Can I resize a dm-crypt or LUKS partition?", you
> say one should not use it with > 2TB.
> May I suggest to add a (see <link to Are there any problems with "plain"
> IV? What is "plain64"?>)? Other wise people may miss that it's ok to use
> it with > 2TB when plain 64 is used.
Added.
> May I suggest that all occurrences of e.g. 2 TB are replaced by e.g. 2
> TiB?
Since I typically insist on that, I should have done this in
the first place. Diexed also for MB and kB. (No GB in there)
>
> May I further suggest, that in all references to 2TB, we add "(= 2^32 *
> 512 bytes)"?
> There's always that problem that one never knows whether TB really means
> TB or TiB.
Instead changed all 2TB to 2TiB.
> > > 3) There was a limitation on the block size, used with XTS, right? But
> > > as we _always_ use 512 byte (even if the device below uses larger
> > > sectors), we're fine anyway.
> > > Right?
> > Yes.
> Perhap we can add this to the FAQ, too.
> People may have read about it,... but don't know whether it's a problem
> or not. So telling them "no everything's fine as long as our blocky are
> smaller than xxxx bytes) can be a good idea.
> Especially as the wikipedia article contains some FUD about this.
Added.
> > > - periodically re-encode before about 100TB
> > > - 1TB thingy?!
> >
> > No sure it makes sense. But I can put it in there.
>
> I'd suggest so,... for people with the highest paranoia ;)
> Perhaps with a note, that this is probably not such a big problem for
> many scenarios.
>
> Also adding that this is a general problem, what one can do against it,
> and the rough values when it is estimated to become a problem (e.g. for
> XTS).
>
>
>
> > Was there a literature reference for the attack?
> > If I out this into the FAQ, then I need to
> > get it right as it is something more complicated and the
> > data exposure is low enough that most people rightfully
> > will not care and most attackers will not be able to do it
> > anyways due to the high anount of storage needed.
> Uhm... no idea unfortunately...
Well, if it comes up again, I can look at it. I will
however not start to distribute my own FUD and I am
not a good enough cryptographer for a really thorough
analysis of the issue. I am willing to read a paper on
it if somebody else provides the link ;-)
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name
GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans
If it's in the news, don't worry about it. The very definition of
"news" is "something that hardly ever happens." -- Bruce Schneier
next prev parent reply other threads:[~2010-08-23 0:46 UTC|newest]
Thread overview: 55+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-07-22 14:57 [dm-crypt] Efficacy of xts over 1TB David Santamaría Rogado
2010-07-25 10:34 ` Arno Wagner
2010-07-25 11:18 ` Christoph Anton Mitterer
2010-07-25 12:29 ` Heinz Diehl
2010-07-25 12:25 ` Milan Broz
2010-07-25 13:14 ` Christoph Anton Mitterer
2010-07-25 13:52 ` Milan Broz
2010-07-25 22:37 ` Christoph Anton Mitterer
2010-07-26 0:14 ` Milan Broz
2010-07-26 20:38 ` Christoph Anton Mitterer
2010-07-27 8:46 ` [dm-crypt] Using plain64/plain IV (initialisation vector) in dm-crypt Milan Broz
2010-07-27 10:47 ` Arno Wagner
2010-07-27 14:17 ` Christoph Anton Mitterer
2010-07-27 16:08 ` Arno Wagner
2010-07-27 14:15 ` Christoph Anton Mitterer
2010-07-27 15:45 ` Mario 'BitKoenig' Holbe
2010-07-27 15:55 ` Milan Broz
2010-07-27 18:59 ` Christoph Anton Mitterer
2010-07-27 19:37 ` Arno Wagner
2010-07-27 18:58 ` Christoph Anton Mitterer
2010-07-27 19:35 ` Mario 'BitKoenig' Holbe
2010-07-28 8:42 ` Milan Broz
2010-08-20 21:11 ` [dm-crypt] XTS cipher mode limitations Christoph Anton Mitterer
2010-08-21 0:22 ` Arno Wagner
2010-08-22 12:50 ` [dm-crypt] XTS cipher mode limitations (FAQ additions) Christoph Anton Mitterer
2010-08-23 0:46 ` Arno Wagner [this message]
2010-08-25 9:36 ` Christoph Anton Mitterer
2010-08-22 12:56 ` [dm-crypt] tool to account the written number of bytes to a block device (was: XTS cipher mode limitations) Christoph Anton Mitterer
2010-08-22 16:01 ` Arno Wagner
2010-08-22 21:57 ` Christoph Anton Mitterer
2010-08-23 7:14 ` [dm-crypt] tool to account the written number of bytes to a block device Milan Broz
2010-08-25 9:27 ` Christoph Anton Mitterer
2010-08-24 16:19 ` [dm-crypt] XTS cipher mode limitations Ramius
2010-07-26 8:53 ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-26 20:47 ` Christoph Anton Mitterer
2010-07-26 21:01 ` Arno Wagner
2010-07-26 21:28 ` Christoph Anton Mitterer
2010-07-26 21:35 ` Arno Wagner
2010-07-25 22:52 ` Christoph Anton Mitterer
2010-07-26 9:42 ` Mario 'BitKoenig' Holbe
2010-07-26 18:09 ` Arno Wagner
2010-07-27 18:16 ` [dm-crypt] Including the FAQ in the tarball? Christoph Anton Mitterer
2010-07-27 18:23 ` Arno Wagner
2010-07-29 8:17 ` Heinz Diehl
2010-07-25 15:32 ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-25 22:48 ` Christoph Anton Mitterer
2010-07-25 23:42 ` Milan Broz
2010-07-26 18:35 ` Christoph Anton Mitterer
2010-07-25 15:28 ` Arno Wagner
2010-07-25 18:11 ` Milan Broz
2010-07-26 9:04 ` Mario 'BitKoenig' Holbe
2010-07-27 18:21 ` Christoph Anton Mitterer
2010-07-27 21:02 ` Mario 'BitKoenig' Holbe
2010-07-26 9:17 ` Mario 'BitKoenig' Holbe
2010-07-27 18:42 ` David Santamaría Rogado
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20100823004635.GA19317@tansi.org \
--to=arno@wagner.name \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox