DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Some questions about cryptsetup 1.6.x
@ 2014-02-12  9:49 Cpp
  2014-02-12 14:19 ` Arno Wagner
  2014-02-12 16:20 ` Milan Broz
  0 siblings, 2 replies; 11+ messages in thread
From: Cpp @ 2014-02-12  9:49 UTC (permalink / raw)
  To: dm-crypt

Greetings.

I have a few questions about the use of cryptsetup and its security.
First I'd like to know something about the command line options. I've
seen people specify the digest (hash) in two different places in
cryptsetup. Consider the following line:

# cryptsetup -c aes-xts-plain64:sha512 -h sha512 -s 512 -y -i 5000
--use-random -y -v luksFormat /dev/sda1

What is the difference between specifying the hash in the -c parameter
i.e. aes-xts-plain64:sha512 or by using the -h parameter? Do they both
do the same thing meaning that the following two are equivalent?

# cryptsetup -c aes-xts-plain64:sha512 -s 512 -y -i 5000 --use-random
-y -v luksFormat /dev/sda1
# cryptsetup -c aes-xts-plain64 -h sha512 -s 512 -y -i 5000
--use-random -y -v luksFormat /dev/sda1


Next I'd like to ask about the memory management of the master key.
Suppose I mounted a volume using luksOpen (or --type luks open). What
happens when I invoke luksClose (close) on that container? Does the
master key get securely erased from memory (several overwrites with
random data) or is it simply blanked out (single overwrite with
zeros)?

How is the master key stored in memory? I read somewhere that having
the same data in the exact same location in RAM for an extended period
of time (like a 24/7 server) can "burn in" the data into the RAM
module, which can be later recovered. Is this of any concern with
current cryptsetup i.e. for attacks like cold boot?

Finally I'm interested to know about removing all the keyslots.
Suppose I mounted a container and erased every available keyslot
(please don't ask why). I know this would in theory make the data
irrecoverble, but the container is still mounted for the time being.
Assuming that the power doesn't disappear, is there a way to
reintroduce a new key slot into the LUKS container after all slots
have been erased, provided that the container is mounted and I can
read the master key from memory?


Best regards!

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2014-02-13  5:57 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-02-12  9:49 [dm-crypt] Some questions about cryptsetup 1.6.x Cpp
2014-02-12 14:19 ` Arno Wagner
2014-02-12 14:30   ` Thomas Bächler
2014-02-12 15:59     ` Arno Wagner
2014-02-12 16:10     ` Milan Broz
2014-02-13  5:57       ` Arno Wagner
2014-02-12 15:04   ` Matthias Schniedermeyer
2014-02-12 15:57     ` Arno Wagner
2014-02-12 16:29       ` Matthias Schniedermeyer
2014-02-12 17:25         ` Arno Wagner
2014-02-12 16:20 ` Milan Broz

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox