DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] [ANNOUNCE] cryptsetup 1.6.0-rc1
Date: Sun, 30 Dec 2012 09:38:14 +0100	[thread overview]
Message-ID: <20121230083814.GA12005@tansi.org> (raw)
In-Reply-To: <50DF635C.90003@gmail.com>

Hmm. Fails to build because it does not find linux/if_alg.h
This is on Debian with a self-compiled 3.4.19. I suspect
some link to the kernel-headers is missing. Can anybody tell
me what I should link where? Kernel dir is linked to /usr/src/linux
as traditional.  

Arno

On Sat, Dec 29, 2012 at 10:40:44PM +0100, Milan Broz wrote:
> 
> The testing release candidate cryptsetup 1.6.0-rc1 is available at
> 
>    http://code.google.com/p/cryptsetup/
> 
> Feedback and bug reports are welcomed.
> 
> Cryptsetup 1.6.0 Release Notes (RC1)
> ====================================
> 
> Changes since version 1.5.1
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 
> Important changes
> ~~~~~~~~~~~~~~~~~
> 
>  * Cryptsetup and libcryptsetup is now released under GPLv2+
>    (GPL version 2 or any later).
>    Some internal code handling files (loopaes, verity, tcrypt
>    and crypto backend wrapper) are LGPLv2+.
> 
>    Previously code was GPL version 2 only.
> 
> 
>  * Introducing new unified command open and close.
> 
>    Example:
>       cryptsetup open --type plain|luks|loopaes|tcrypt <device> <name>
>       (type defaults to luks)
> 
>    with backward-compatible aliases plainOpen, luksOpen, loopaesOpen,
>    tcryptOpen. Basically "open --type xyz" has alias "xyzOpen".
> 
>    The "create" command (plain device create) is DEPRECATED but will
>    be still supported.
>    (This command is confusing because of switched arguments order.)
> 
>    The close command is generic command to remove mapping and have
>    backward compatible aliases (remove, luksClose, ...) which behaves
>    exactly the same.
> 
>    While all old syntax is still supported, I strongly suggest to use
>    new command syntax which is common for all device types (and possible
>    new formats added in future).
> 
> 
>  * cryptsetup now support directly TCRYPT (TrueCrypt and compatible tc-play)
>    on-disk format
>    (Code is independent implementation not related to original project).
> 
>    Only dump (tcryptDump command) and activation (open --type tcrypt or tcryptOpen)
>    of TCRYPT device are supported. No header changes are supported.
> 
>    It is intended to easily access containers shared with other operating systems
>    without need to install 3rd party software. For native Linux installations LUKS
>    is the preferred format.
> 
>    WARNING: TCRYPT  extension  requires kernel userspace crypto API to be available
>    (kernel af_alg and algif_skcipher modules, introduced in Linux kernel 2.6.38).
> 
>    Because  TCRYPT  header  is encrypted, you have to always provide valid
>    passphrase and keyfiles. Keyfiles are handled exactly the same as in original
>    format (basically, first 1MB of every keyfile is mixed using CRC32 into pool).
> 
>    Cryptsetup should recognize all TCRYPT header variants ever released, except 
>    legacy  cipher chains  using LRW encryption mode with 64 bits encryption block
>    (namely Blowfish in LRW mode is not recognized, this is limitation of kernel
>    crypto API).
> 
>    Device activation is supported only for LRW/XTS modes (again, limitation
>    of kernel dmcrypt which do not implements TCRYPT extensions to CBC mode).
>    (So old containers cannot be activated, but you can use libcryptsetup
>    for lost password search, example of such code is included in misc directory.)
> 
>    Hidden header are supported using --tcrypt-hidden option, system encryption
>    using --tcrypt-system option.
> 
>    For detailed description see man page.
> 
>    EXAMPLE:
>      * Dump device parameters of container in file:
> 
>      # cryptsetup tcryptDump tst
>        Enter passphrase: 
> 
>      TCRYPT header information for tst
>      Version:        5
>      Driver req.:    7
>      Sector size:    512
>      MK offset:      131072
>      PBKDF2 hash:    sha512
>      Cipher chain:   serpent-twofish-aes
>      Cipher mode:    xts-plain64
>      MK bits:        1536
> 
>      You can also dump master key using --dump-master-key.
>      Dump does not require superuser privilege.
> 
>      * Activation of this container
> 
>      # cryptsetup tcryptOpen tst tcrypt_dev       
>        Enter passphrase: 
>       (Chain of dmcrypt devices is activated as /dev/mapper/tcrypt_dev.)
>    
>      * See status of active TCRYPT device
> 
>      # cryptsetup status tcrypt_dev
> 
>      /dev/mapper/tcrypt_dev is active.
>      type:    TCRYPT
>      cipher:  serpent-twofish-aes-xts-plain64
>      keysize: 1536 bits
>      device:  /dev/loop0
>      loop:    /tmp/tst
>      offset:  256 sectors
>      size:    65024 sectors
>      skipped: 256 sectors
>      mode:    read/write
> 
>     * And plaintext filesystem now ready to mount
> 
>     # blkid /dev/mapper/tcrypt_dev
>     /dev/mapper/tcrypt_dev: SEC_TYPE="msdos" UUID="9F33-2954" TYPE="vfat" 
> 
> 
>  * Add (optional) support for lipwquality for new LUKS passwords.
> 
>    If password is entered through terminal (no keyfile specified)
>    and cryptsetup is compiled with --enable-pwquality, default
>    system pwquality settings are used to check password quality.
> 
>    You can always override this check by using new --force-password option.
> 
>    For more info about pwquality project see http://libpwquality.fedorahosted.org/
> 
> 
>  * Proper handle interrupt signals (ctrl+c and TERM signal) in tools
> 
>    Code should now handle interrupt properly, release and explicitly wipe
>    in-memory key materials on interrupt.
>    (Direct users of libcryptsetup should always call crypt_free() when
>    code is interrupted to wipe all resources. There is no signal handling
>    in library, it is up to the tool using it.)
> 
>  
>  * Add new benchmark command
> 
>    The "benchmark" command now tries to benchmark PBKDF2 and some block
>    cipher variants. You can specify you own parameters (--cipher/--key-size
>    for block ciphers, --hash for PBKDF2).
> 
>    See man page for detailed description.
> 
>    WARNING: benchmark requires kernel userspace crypto API to be available
>    (kernel af_alg and algif_skcipher modules, introduced in  Linux  kernel 2.6.38).
> 
>    EXAMPLE:
>      # cryptsetup benchmark
>      # Tests are approximate using memory only (no storage IO).
>      PBKDF2-sha1       111077 iterations per second
>      PBKDF2-sha256      53718 iterations per second
>      PBKDF2-sha512      18832 iterations per second
>      PBKDF2-ripemd160   89775 iterations per second
>      PBKDF2-whirlpool   23918 iterations per second
>      #  Algorithm | Key | Encryption | Decryption
>           aes-cbc   128b  212.0 MiB/s  428.0 MiB/s
>       serpent-cbc   128b   23.1 MiB/s   66.0 MiB/s
>       twofish-cbc   128b   46.1 MiB/s   50.5 MiB/s
>           aes-cbc   256b  163.0 MiB/s  350.0 MiB/s
>       serpent-cbc   256b   23.1 MiB/s   66.0 MiB/s
>       twofish-cbc   256b   47.0 MiB/s   50.0 MiB/s
>           aes-xts   256b  190.0 MiB/s  190.0 MiB/s
>       serpent-xts   256b   58.4 MiB/s   58.0 MiB/s
>       twofish-xts   256b   49.0 MiB/s   49.5 MiB/s
>           aes-xts   512b  175.0 MiB/s  175.0 MiB/s
>       serpent-xts   512b   59.0 MiB/s   58.0 MiB/s
>       twofish-xts   512b   48.5 MiB/s   49.5 MiB/s
> 
>      Or you can specify cipher yourself:
>      # cryptsetup benchmark --cipher cast5-cbc-essiv:sha256 -s 128
>      # Tests are approximate using memory only (no storage IO).
>      #  Algorithm | Key | Encryption | Decryption
>         cast5-cbc   128b   32.4 MiB/s   35.0 MiB/s
> 
>      WARNING: these tests do not use dmcrypt, only crypto API.
>      You have to benchmark the whole device stack and you can get completely
>      different results. But is is usable for basic comparison.
>      (Note for example AES-NI decryption optimization effect in example above.)
> 
> Features
> ~~~~~~~~
> 
>  * Do not maintain ChangeLog file anymore, see git log for detailed changes,
>    e.g. here http://code.google.com/p/cryptsetup/source/list
> 
>  * Move change key into library, add crypt_keyslot_change_by_passphrase().
>    This change is useful mainly in FIPS mode, where we cannot
>    extract volume key directly from libcryptsetup.
> 
>  * Add verbose messages during reencryption.
> 
>  * Default LUKS PBKDF2 iteration time is now configurable.
> 
>  * Add simple cipher benchmarking API.
> 
>  * Add kernel skcipher backend.
> 
>  * Add CRC32 implementation (for TCRYPT).
> 
>  * Move PBKDF2 into crypto backend wrapper.
>    This allows use it in other formats, use library implementations and
>    also possible use of different KDF function in future.
> 
>  * New PBKDF2 benchmark using getrusage().
> 
> Fixes
> ~~~~~
> 
>  * Avoid O_DIRECT open if underlying storage doesn't support it.
> 
>  * Fix some non-translated messages.
> 
>  * Fix regression in header backup (1.5.1) with container in file.
> 
>  * Fix blockwise read/write for end writes near end of device.
>    (was not used in previous versions)
> 
>  * Ignore setpriority failure.
> 
>  * Code changes to fix/ignore problems found by Coverity static analysis, including
>    - Get page size should never fail.
>    - Fix time of check/use (TOCTOU test) in tools
>    - Fix time of check/use in loop/wipe utils.
>    - Fix time of check/use in device utils.
> 
>  * Disallow header restore if context is non-LUKS device.
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell

  parent reply	other threads:[~2012-12-30  8:38 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-12-29 21:40 [dm-crypt] [ANNOUNCE] cryptsetup 1.6.0-rc1 Milan Broz
2012-12-29 22:24 ` Matthias Schniedermeyer
2012-12-29 22:42   ` Milan Broz
2012-12-29 23:21     ` Matthias Schniedermeyer
2012-12-29 23:15 ` Matthias Schniedermeyer
2012-12-29 23:31   ` Milan Broz
2013-01-02 12:50     ` Matthias Schniedermeyer
2013-01-02 20:55       ` Milan Broz
2012-12-30  8:38 ` Arno Wagner [this message]
2012-12-30  8:56   ` Sven Eschenberg
2012-12-30 10:20     ` Arno Wagner
2012-12-30 11:40       ` Milan Broz
2013-01-06 12:16         ` Yves-Alexis Perez
2013-01-06 16:24           ` Milan Broz
2013-01-07  6:23             ` Yves-Alexis Perez
2013-01-07  8:53               ` Milan Broz
2013-01-07 11:21               ` Sven Eschenberg
2013-01-07 18:12                 ` Milan Broz
2013-01-07 19:20                   ` Sven Eschenberg
2013-01-21 21:01                 ` Yves-Alexis Perez
2012-12-30 11:47       ` Milan Broz
2013-01-05 19:47         ` Jonas Meurer
2012-12-30  9:03   ` Milan Broz
2013-01-04 11:50 ` [dm-crypt] Switch to XTS mode for LUKS in cryptsetup in 1.6.0 (Was Re: [ANNOUNCE] cryptsetup 1.6.0-rc1) Milan Broz
2013-01-04 11:53   ` Ralf Ramsauer
2013-01-04 12:18     ` Milan Broz
2013-01-04 16:26       ` Arno Wagner
2013-01-04 20:20         ` Heinz Diehl
2013-01-04 20:56           ` Milan Broz
2013-01-04 22:05             ` Arno Wagner
2013-01-04 22:39               ` Milan Broz
2013-01-05 17:20                 ` Arno Wagner
2013-01-05 18:25                   ` Milan Broz
2013-01-05 19:47                     ` Arno Wagner
2013-01-04 13:39   ` Christoph Anton Mitterer
2013-01-04 16:17   ` Arno Wagner
2013-01-04 17:36   ` Zdenek Kaspar
2013-01-04 18:55   ` Romain Francoise
2013-01-04 19:14     ` Milan Broz
2013-01-04 21:56       ` Arno Wagner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121230083814.GA12005@tansi.org \
    --to=arno@wagner.name \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox