DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] miscellaneous dm-crypt/LUKS/cryptsetup questions
@ 2010-05-27 12:51 Christoph Anton Mitterer
  2010-05-27 13:53 ` Milan Broz
  0 siblings, 1 reply; 15+ messages in thread
From: Christoph Anton Mitterer @ 2010-05-27 12:51 UTC (permalink / raw)
  To: dm-crypt

Hi.

I'd have a number of questions regarding dm-crypt/LUKS/cryptsetup and  
would be happy if some of them could be answered :)


1) With LUKS there's a master key (the one which is decrypted via the  
key-slot-keys and that's actually used to decrypt the payload data).
How is it generated? Via /dev/random or /dev/urandom?


2) They key-files specified via --key-file when creating  LUKS volume  
or adding a new key... is it directly used as the  
master-key-encrypting key or is it somehow hashed and the result is  
used for the actual encryption?
And as a follow-up,.. does it need to have a special size, related to  
the used cipher/mode, or can it be e.g. 1 MB and is simply hashed?


3) Which cipher/mode is the "most secure" one? Perhaps with the  
restriction that AES should be used?
Currently I always use aes-xts-plain.
AFAIK lrw is "borken" or has at least some design issues which is why  
xts was developed, right?
Or is something different better?
Should one use plain with xts or better essiv or even benbi? From what  
I understood how XTS works is, that plain should be just fine and  
essiv/benbi should give no additional security, right?

I guess "best" is to use AES with 256 bits, right? How large has the  
key to be then? I've read somewhere that one needs actually 512 bits  
then for use with XTS.


4) Is the master key only stored at one place on the disk, or at multiple?
Imagine I have some severe disk errors, and the LUKS header is  
completely lost... is the dump as created by luksHeaderBackup enough  
the get decryption working again?


5) I guess it's still true that one should (for security reasons) fill  
the disk with random data before creating the LUKS volume, right?
I guess this is also true, when using SSDs, at least when not using TRIM?

May I suggest that you add a feature to cryptsetup, that when doing a  
luksFormat, the disk is automatically filled with random data, and an  
additional switch to disable it (I guess the default should be to do  
the filling, although it's time consuming... I mean we do the whole  
crpyt-thingy for our paranoia ;) ).


6) Are there plans to at LABEL soupport to the LUKS volumes? I mean  
UUID is already there...


Thanks so far,
Chris.

----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.

^ permalink raw reply	[flat|nested] 15+ messages in thread

end of thread, other threads:[~2010-05-28 15:36 UTC | newest]

Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-05-27 12:51 [dm-crypt] miscellaneous dm-crypt/LUKS/cryptsetup questions Christoph Anton Mitterer
2010-05-27 13:53 ` Milan Broz
2010-05-27 14:20   ` Christoph Anton Mitterer
2010-05-27 14:45     ` Milan Broz
2010-05-27 16:21       ` Mario 'BitKoenig' Holbe
2010-05-27 18:21         ` Milan Broz
2010-05-27 21:41           ` Roscoe
2010-05-27 22:12           ` Arno Wagner
2010-05-28  7:39             ` Mario 'BitKoenig' Holbe
2010-05-28  8:03               ` Milan Broz
2010-05-28 11:05         ` Christoph Anton Mitterer
2010-05-28 12:11           ` Mario 'BitKoenig' Holbe
2010-05-28 10:56       ` Christoph Anton Mitterer
2010-05-28 11:26         ` Milan Broz
2010-05-28 15:36         ` Arno Wagner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox