From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] [ANNOUNCE] cryptsetup 1.6.0-rc1
Date: Sun, 30 Dec 2012 09:38:14 +0100 [thread overview]
Message-ID: <20121230083814.GA12005@tansi.org> (raw)
In-Reply-To: <50DF635C.90003@gmail.com>
Hmm. Fails to build because it does not find linux/if_alg.h
This is on Debian with a self-compiled 3.4.19. I suspect
some link to the kernel-headers is missing. Can anybody tell
me what I should link where? Kernel dir is linked to /usr/src/linux
as traditional.
Arno
On Sat, Dec 29, 2012 at 10:40:44PM +0100, Milan Broz wrote:
>
> The testing release candidate cryptsetup 1.6.0-rc1 is available at
>
> http://code.google.com/p/cryptsetup/
>
> Feedback and bug reports are welcomed.
>
> Cryptsetup 1.6.0 Release Notes (RC1)
> ====================================
>
> Changes since version 1.5.1
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> Important changes
> ~~~~~~~~~~~~~~~~~
>
> * Cryptsetup and libcryptsetup is now released under GPLv2+
> (GPL version 2 or any later).
> Some internal code handling files (loopaes, verity, tcrypt
> and crypto backend wrapper) are LGPLv2+.
>
> Previously code was GPL version 2 only.
>
>
> * Introducing new unified command open and close.
>
> Example:
> cryptsetup open --type plain|luks|loopaes|tcrypt <device> <name>
> (type defaults to luks)
>
> with backward-compatible aliases plainOpen, luksOpen, loopaesOpen,
> tcryptOpen. Basically "open --type xyz" has alias "xyzOpen".
>
> The "create" command (plain device create) is DEPRECATED but will
> be still supported.
> (This command is confusing because of switched arguments order.)
>
> The close command is generic command to remove mapping and have
> backward compatible aliases (remove, luksClose, ...) which behaves
> exactly the same.
>
> While all old syntax is still supported, I strongly suggest to use
> new command syntax which is common for all device types (and possible
> new formats added in future).
>
>
> * cryptsetup now support directly TCRYPT (TrueCrypt and compatible tc-play)
> on-disk format
> (Code is independent implementation not related to original project).
>
> Only dump (tcryptDump command) and activation (open --type tcrypt or tcryptOpen)
> of TCRYPT device are supported. No header changes are supported.
>
> It is intended to easily access containers shared with other operating systems
> without need to install 3rd party software. For native Linux installations LUKS
> is the preferred format.
>
> WARNING: TCRYPT extension requires kernel userspace crypto API to be available
> (kernel af_alg and algif_skcipher modules, introduced in Linux kernel 2.6.38).
>
> Because TCRYPT header is encrypted, you have to always provide valid
> passphrase and keyfiles. Keyfiles are handled exactly the same as in original
> format (basically, first 1MB of every keyfile is mixed using CRC32 into pool).
>
> Cryptsetup should recognize all TCRYPT header variants ever released, except
> legacy cipher chains using LRW encryption mode with 64 bits encryption block
> (namely Blowfish in LRW mode is not recognized, this is limitation of kernel
> crypto API).
>
> Device activation is supported only for LRW/XTS modes (again, limitation
> of kernel dmcrypt which do not implements TCRYPT extensions to CBC mode).
> (So old containers cannot be activated, but you can use libcryptsetup
> for lost password search, example of such code is included in misc directory.)
>
> Hidden header are supported using --tcrypt-hidden option, system encryption
> using --tcrypt-system option.
>
> For detailed description see man page.
>
> EXAMPLE:
> * Dump device parameters of container in file:
>
> # cryptsetup tcryptDump tst
> Enter passphrase:
>
> TCRYPT header information for tst
> Version: 5
> Driver req.: 7
> Sector size: 512
> MK offset: 131072
> PBKDF2 hash: sha512
> Cipher chain: serpent-twofish-aes
> Cipher mode: xts-plain64
> MK bits: 1536
>
> You can also dump master key using --dump-master-key.
> Dump does not require superuser privilege.
>
> * Activation of this container
>
> # cryptsetup tcryptOpen tst tcrypt_dev
> Enter passphrase:
> (Chain of dmcrypt devices is activated as /dev/mapper/tcrypt_dev.)
>
> * See status of active TCRYPT device
>
> # cryptsetup status tcrypt_dev
>
> /dev/mapper/tcrypt_dev is active.
> type: TCRYPT
> cipher: serpent-twofish-aes-xts-plain64
> keysize: 1536 bits
> device: /dev/loop0
> loop: /tmp/tst
> offset: 256 sectors
> size: 65024 sectors
> skipped: 256 sectors
> mode: read/write
>
> * And plaintext filesystem now ready to mount
>
> # blkid /dev/mapper/tcrypt_dev
> /dev/mapper/tcrypt_dev: SEC_TYPE="msdos" UUID="9F33-2954" TYPE="vfat"
>
>
> * Add (optional) support for lipwquality for new LUKS passwords.
>
> If password is entered through terminal (no keyfile specified)
> and cryptsetup is compiled with --enable-pwquality, default
> system pwquality settings are used to check password quality.
>
> You can always override this check by using new --force-password option.
>
> For more info about pwquality project see http://libpwquality.fedorahosted.org/
>
>
> * Proper handle interrupt signals (ctrl+c and TERM signal) in tools
>
> Code should now handle interrupt properly, release and explicitly wipe
> in-memory key materials on interrupt.
> (Direct users of libcryptsetup should always call crypt_free() when
> code is interrupted to wipe all resources. There is no signal handling
> in library, it is up to the tool using it.)
>
>
> * Add new benchmark command
>
> The "benchmark" command now tries to benchmark PBKDF2 and some block
> cipher variants. You can specify you own parameters (--cipher/--key-size
> for block ciphers, --hash for PBKDF2).
>
> See man page for detailed description.
>
> WARNING: benchmark requires kernel userspace crypto API to be available
> (kernel af_alg and algif_skcipher modules, introduced in Linux kernel 2.6.38).
>
> EXAMPLE:
> # cryptsetup benchmark
> # Tests are approximate using memory only (no storage IO).
> PBKDF2-sha1 111077 iterations per second
> PBKDF2-sha256 53718 iterations per second
> PBKDF2-sha512 18832 iterations per second
> PBKDF2-ripemd160 89775 iterations per second
> PBKDF2-whirlpool 23918 iterations per second
> # Algorithm | Key | Encryption | Decryption
> aes-cbc 128b 212.0 MiB/s 428.0 MiB/s
> serpent-cbc 128b 23.1 MiB/s 66.0 MiB/s
> twofish-cbc 128b 46.1 MiB/s 50.5 MiB/s
> aes-cbc 256b 163.0 MiB/s 350.0 MiB/s
> serpent-cbc 256b 23.1 MiB/s 66.0 MiB/s
> twofish-cbc 256b 47.0 MiB/s 50.0 MiB/s
> aes-xts 256b 190.0 MiB/s 190.0 MiB/s
> serpent-xts 256b 58.4 MiB/s 58.0 MiB/s
> twofish-xts 256b 49.0 MiB/s 49.5 MiB/s
> aes-xts 512b 175.0 MiB/s 175.0 MiB/s
> serpent-xts 512b 59.0 MiB/s 58.0 MiB/s
> twofish-xts 512b 48.5 MiB/s 49.5 MiB/s
>
> Or you can specify cipher yourself:
> # cryptsetup benchmark --cipher cast5-cbc-essiv:sha256 -s 128
> # Tests are approximate using memory only (no storage IO).
> # Algorithm | Key | Encryption | Decryption
> cast5-cbc 128b 32.4 MiB/s 35.0 MiB/s
>
> WARNING: these tests do not use dmcrypt, only crypto API.
> You have to benchmark the whole device stack and you can get completely
> different results. But is is usable for basic comparison.
> (Note for example AES-NI decryption optimization effect in example above.)
>
> Features
> ~~~~~~~~
>
> * Do not maintain ChangeLog file anymore, see git log for detailed changes,
> e.g. here http://code.google.com/p/cryptsetup/source/list
>
> * Move change key into library, add crypt_keyslot_change_by_passphrase().
> This change is useful mainly in FIPS mode, where we cannot
> extract volume key directly from libcryptsetup.
>
> * Add verbose messages during reencryption.
>
> * Default LUKS PBKDF2 iteration time is now configurable.
>
> * Add simple cipher benchmarking API.
>
> * Add kernel skcipher backend.
>
> * Add CRC32 implementation (for TCRYPT).
>
> * Move PBKDF2 into crypto backend wrapper.
> This allows use it in other formats, use library implementations and
> also possible use of different KDF function in future.
>
> * New PBKDF2 benchmark using getrusage().
>
> Fixes
> ~~~~~
>
> * Avoid O_DIRECT open if underlying storage doesn't support it.
>
> * Fix some non-translated messages.
>
> * Fix regression in header backup (1.5.1) with container in file.
>
> * Fix blockwise read/write for end writes near end of device.
> (was not used in previous versions)
>
> * Ignore setpriority failure.
>
> * Code changes to fix/ignore problems found by Coverity static analysis, including
> - Get page size should never fail.
> - Fix time of check/use (TOCTOU test) in tools
> - Fix time of check/use in loop/wipe utils.
> - Fix time of check/use in device utils.
>
> * Disallow header restore if context is non-LUKS device.
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell
next prev parent reply other threads:[~2012-12-30 8:38 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-29 21:40 [dm-crypt] [ANNOUNCE] cryptsetup 1.6.0-rc1 Milan Broz
2012-12-29 22:24 ` Matthias Schniedermeyer
2012-12-29 22:42 ` Milan Broz
2012-12-29 23:21 ` Matthias Schniedermeyer
2012-12-29 23:15 ` Matthias Schniedermeyer
2012-12-29 23:31 ` Milan Broz
2013-01-02 12:50 ` Matthias Schniedermeyer
2013-01-02 20:55 ` Milan Broz
2012-12-30 8:38 ` Arno Wagner [this message]
2012-12-30 8:56 ` Sven Eschenberg
2012-12-30 10:20 ` Arno Wagner
2012-12-30 11:40 ` Milan Broz
2013-01-06 12:16 ` Yves-Alexis Perez
2013-01-06 16:24 ` Milan Broz
2013-01-07 6:23 ` Yves-Alexis Perez
2013-01-07 8:53 ` Milan Broz
2013-01-07 11:21 ` Sven Eschenberg
2013-01-07 18:12 ` Milan Broz
2013-01-07 19:20 ` Sven Eschenberg
2013-01-21 21:01 ` Yves-Alexis Perez
2012-12-30 11:47 ` Milan Broz
2013-01-05 19:47 ` Jonas Meurer
2012-12-30 9:03 ` Milan Broz
2013-01-04 11:50 ` [dm-crypt] Switch to XTS mode for LUKS in cryptsetup in 1.6.0 (Was Re: [ANNOUNCE] cryptsetup 1.6.0-rc1) Milan Broz
2013-01-04 11:53 ` Ralf Ramsauer
2013-01-04 12:18 ` Milan Broz
2013-01-04 16:26 ` Arno Wagner
2013-01-04 20:20 ` Heinz Diehl
2013-01-04 20:56 ` Milan Broz
2013-01-04 22:05 ` Arno Wagner
2013-01-04 22:39 ` Milan Broz
2013-01-05 17:20 ` Arno Wagner
2013-01-05 18:25 ` Milan Broz
2013-01-05 19:47 ` Arno Wagner
2013-01-04 13:39 ` Christoph Anton Mitterer
2013-01-04 16:17 ` Arno Wagner
2013-01-04 17:36 ` Zdenek Kaspar
2013-01-04 18:55 ` Romain Francoise
2013-01-04 19:14 ` Milan Broz
2013-01-04 21:56 ` Arno Wagner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20121230083814.GA12005@tansi.org \
--to=arno@wagner.name \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox