From: Milan Broz <mbroz@redhat.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] minimal LUKS container size
Date: Fri, 16 Dec 2011 09:25:21 +0100 [thread overview]
Message-ID: <4EEB0071.7050706@redhat.com> (raw)
In-Reply-To: <20111216071410.GA22389@tansi.org>
On 12/16/2011 08:14 AM, Arno Wagner wrote:
> To my surprise, giving alignment --align-payload=1 (or = 2) results
> in a data-area staring at 0x101000, while --align-payload=0 gives
> 2MiB offset. Is this rounded up to multiples of 8? I had a brief
> look into the sources but did not find the relevant code.
> The full behaviour should go into the man-page under the
> explanation for "--align-payload".
Align 0 should switch to internal default (4k).
Man page needs rewrite and many grammar and wording fixes...
Any volunteers? :-)
> Data area size can be 512 bytes (verified with loop-device), but
> not 0 bytes, as this gives an ioctl-error on opening.
yes, I think there is also internal check now.
There is a problem with dmcrypt (kernel) -> userspace error reporting,
some fails (like unsupported key size) are only in syslog,
so cryptsetup have to guess to display proper error message,
it need some device-mapper changes though.
> For cipher, the most extreme I found is RC4 with an 8 bit key.
> This can be luksFormat-ed, but fails on opening. This is
> probably a bug when using arc4, as it fails for 128 bit as well.
> (tested with 1.4.1).
Repeat after me: arc4 is not a block cipher :-p
Seriously, you are not the only one trying to do this,
read this thread
http://thread.gmane.org/gmane.linux.kernel.cryptoapi/3822/
I am not sure if crypto API is changed now though (see Herbert's reply
in that thread.)
> Blowfish with 64 bits works though, but is insecure, so added with
> a warning.
My strategy is to provide known "secure" defaults and do not block
anything - there can be always use for some old containers.
If anyone feel need for anything else (you can even write your own
kernel cryptoAPI module and use it without changes in dmcrypt),
no problem - but it is user responsibility that the cipher and
parameters are secure enough for his use case.
Milan
next prev parent reply other threads:[~2011-12-16 8:25 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-12-07 11:27 [dm-crypt] minimal LUKS container size Klaus Schneider
2011-12-07 12:03 ` Milan Broz
2011-12-16 7:14 ` Arno Wagner
2011-12-16 8:25 ` Milan Broz [this message]
2011-12-16 9:19 ` Arno Wagner
2011-12-19 0:05 ` Arno Wagner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4EEB0071.7050706@redhat.com \
--to=mbroz@redhat.com \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox