* [dm-crypt] FAQ Montly pointer 12/2012
@ 2012-12-06 15:29 Arno Wagner
2012-12-07 19:29 ` Javier Juan Martínez Cabezón
0 siblings, 1 reply; 3+ messages in thread
From: Arno Wagner @ 2012-12-06 15:29 UTC (permalink / raw)
To: dm-crypt
Updates: Added a passphrase strength estimate based on
http://it.slashdot.org/story/12/12/05/0623215/new-25-gpu-monster-devours-strong-passwords-in-minutes
Executive summary: It may be time to increase passphrase length.
-----
The FAQ can be found at
- http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions
and
- in the sources as FAQ in the top-level directory.
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dm-crypt] FAQ Montly pointer 12/2012
2012-12-06 15:29 [dm-crypt] FAQ Montly pointer 12/2012 Arno Wagner
@ 2012-12-07 19:29 ` Javier Juan Martínez Cabezón
2012-12-07 19:57 ` Arno Wagner
0 siblings, 1 reply; 3+ messages in thread
From: Javier Juan Martínez Cabezón @ 2012-12-07 19:29 UTC (permalink / raw)
To: dm-crypt
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 06/12/12 16:29, Arno Wagner wrote:
> Updates: Added a passphrase strength estimate based on
> http://it.slashdot.org/story/12/12/05/0623215/new-25-gpu-monster-devours-strong-passwords-in-minutes
>
> Executive summary: It may be time to increase passphrase length.
>
> -----
>
> The FAQ can be found at -
> http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions
> and - in the sources as FAQ in the top-level directory.
>
This is applicable if the algoritm used to cipher is unknown as happen
in plain dmcrypt?
Arno, is really useful/secure to get the ciphering algoritm in the
LUKS header?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=RCwp
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dm-crypt] FAQ Montly pointer 12/2012
2012-12-07 19:29 ` Javier Juan Martínez Cabezón
@ 2012-12-07 19:57 ` Arno Wagner
0 siblings, 0 replies; 3+ messages in thread
From: Arno Wagner @ 2012-12-07 19:57 UTC (permalink / raw)
To: dm-crypt
On Fri, Dec 07, 2012 at 08:29:09PM +0100, Javier Juan Martínez Cabezón wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 06/12/12 16:29, Arno Wagner wrote:
> > Updates: Added a passphrase strength estimate based on
> > http://it.slashdot.org/story/12/12/05/0623215/new-25-gpu-monster-devours-strong-passwords-in-minutes
> >
> > Executive summary: It may be time to increase passphrase length.
> >
> > -----
> >
> > The FAQ can be found at -
> > http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions
> > and - in the sources as FAQ in the top-level directory.
> >
>
>
>
> This is applicable if the algoritm used to cipher is unknown as happen
> in plain dmcrypt?
It depends. In plain dm-crypt, determining whether you have
guessed the password is tricky anyways. Testing for different
ciphers would add some overhead and maybe give you something
like 5-6 bits of security in addition.
>
> Arno, is really useful/secure to get the ciphering algoritm in the
> LUKS header?
Yes, very much so. For LUKS, you do trial decryption of a keyslot,
and that is enough to tell you whether you have a good password.
My intuition is that the iterated hashing takes a lot longer than
the trial decryption, so trying different ciphers does not
add significant overhead. And there are not that many possible
ciphers anyways. Now, if you decide to not store the cipher,
then normal decryption would also need to try them and the
time would need to be taken into account in the maximum delay
a user is faced with. Better to increase the hash iteration
count instead.
Bottom line: An unknown hash or cipher algorithm does not add
much, unless it is homebrew. But in that case, it is still
accessible via the kernel and glaringly obvious. Besides,
homebrew ciphers are often insecure.
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2012-12-07 19:57 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-12-06 15:29 [dm-crypt] FAQ Montly pointer 12/2012 Arno Wagner
2012-12-07 19:29 ` Javier Juan Martínez Cabezón
2012-12-07 19:57 ` Arno Wagner
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox