* [dm-crypt] How to increase key size of existing volume
@ 2012-12-11 14:46 Erik Logtenberg
2012-12-11 15:09 ` Arno Wagner
0 siblings, 1 reply; 5+ messages in thread
From: Erik Logtenberg @ 2012-12-11 14:46 UTC (permalink / raw)
To: dm-crypt
Dear list,
I have been using luks for quite some time, and as a result I have
several luks volumes in use that are still based on 128 bits key sizes.
Current default in Fedora is already upped to 256 bits and RSA even
advices key sizes of 1024 or even 2048 for highly secure stuff.
So, how do I increase the key size? In man cryptsetup I see that the
--key-size option only applies to the create, luksFormat and loopaesOpen
commands. Is there any way I can make this happen?
Thanks,
Erik Logtenberg.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dm-crypt] How to increase key size of existing volume
2012-12-11 14:46 [dm-crypt] How to increase key size of existing volume Erik Logtenberg
@ 2012-12-11 15:09 ` Arno Wagner
2012-12-11 15:34 ` Erik Logtenberg
0 siblings, 1 reply; 5+ messages in thread
From: Arno Wagner @ 2012-12-11 15:09 UTC (permalink / raw)
To: dm-crypt
On Tue, Dec 11, 2012 at 03:46:19PM +0100, Erik Logtenberg wrote:
> Dear list,
>
> I have been using luks for quite some time, and as a result I have
> several luks volumes in use that are still based on 128 bits key sizes.
> Current default in Fedora is already upped to 256 bits and RSA even
> advices key sizes of 1024 or even 2048 for highly secure stuff.
You are confusing symmetric and assymetric keys here. 2048 bit
asymmetric is (very roughly) equivalent to 128 bit symmetric.
Have a look here for currently recomended key sizes:
http://www.keylength.com/
There is no idication that anybody can break 128 but AES
at this time or in the next few decades. Your passphrase
has likely a lot less entropy anyways and is the better
target.
> So, how do I increase the key size? In man cryptsetup I see that the
> --key-size option only applies to the create, luksFormat and loopaesOpen
> commands. Is there any way I can make this happen?
It is unnecessary. If you really want to, use your normal
backup procedure, recreate a new LUKS volume and restore
(you do have backup, right?).
There is also a re-encryption in place tool by Milan, but that is
experimental and definitely requires a current backup.
It is called "cryptsetup-reencrypt" and part of the source package
as of version 1.5.0 (current version is 1.5.1).
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dm-crypt] How to increase key size of existing volume
2012-12-11 15:09 ` Arno Wagner
@ 2012-12-11 15:34 ` Erik Logtenberg
2012-12-11 15:48 ` Milan Broz
2012-12-11 16:34 ` Arno Wagner
0 siblings, 2 replies; 5+ messages in thread
From: Erik Logtenberg @ 2012-12-11 15:34 UTC (permalink / raw)
To: dm-crypt
Hi Arno,
Thanks for your explanation. It is good to know that the 128 bit
symmetric encryption key is still considered okay to some extent.
I did try the keylength site, and if I want my volume to be secure until
roughly a decade after my projected demise, say 2100, then the adviced
symmetric key size is already 135, 147 or 256 depending on the used
method. So it'd still be somewhat better to increase the current 128 a bit.
> (you do have backup, right?).
Actually I am talking about my backup volume. And as such, it is quite a
bit of data, that I don't have a (second) backup of. Neither do I have
enough storage available to make an additional backup, nor the required
amount of time, since a full copy/restore of such a volume would take weeks.
In fact, there seems to be a second use case for re-encrypting an
existing volume. I read some articles explaining the possibility to use
the luksDump command in conjunction with the --dump-master-key option on
a mounted luks volume, to reset the password even if the current
password is no longer known.
Additionally, also the luksHeaderBackup command is available to extract
the master key.
So there are at least two methods of extracting a master key. Now if I
would suspect that a machine, that has a luks volume mounted, was
compromised to the extent that someone had temporaryly gained root
access, I would not only have to reset (all) passwords after fixing the
security hole, but also I would have to create a new master key to be sure.
Is the cryptsetup-reencrypt tool also meant for that purpose?
Thanks,
Erik.
On 12/11/2012 04:09 PM, Arno Wagner wrote:
> On Tue, Dec 11, 2012 at 03:46:19PM +0100, Erik Logtenberg wrote:
>> Dear list,
>>
>> I have been using luks for quite some time, and as a result I have
>> several luks volumes in use that are still based on 128 bits key sizes.
>> Current default in Fedora is already upped to 256 bits and RSA even
>> advices key sizes of 1024 or even 2048 for highly secure stuff.
>
> You are confusing symmetric and assymetric keys here. 2048 bit
> asymmetric is (very roughly) equivalent to 128 bit symmetric.
>
> Have a look here for currently recomended key sizes:
>
> http://www.keylength.com/
>
> There is no idication that anybody can break 128 but AES
> at this time or in the next few decades. Your passphrase
> has likely a lot less entropy anyways and is the better
> target.
>
>> So, how do I increase the key size? In man cryptsetup I see that the
>> --key-size option only applies to the create, luksFormat and loopaesOpen
>> commands. Is there any way I can make this happen?
>
> It is unnecessary. If you really want to, use your normal
> backup procedure, recreate a new LUKS volume and restore
> (you do have backup, right?).
>
> There is also a re-encryption in place tool by Milan, but that is
> experimental and definitely requires a current backup.
> It is called "cryptsetup-reencrypt" and part of the source package
> as of version 1.5.0 (current version is 1.5.1).
>
> Arno
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dm-crypt] How to increase key size of existing volume
2012-12-11 15:34 ` Erik Logtenberg
@ 2012-12-11 15:48 ` Milan Broz
2012-12-11 16:34 ` Arno Wagner
1 sibling, 0 replies; 5+ messages in thread
From: Milan Broz @ 2012-12-11 15:48 UTC (permalink / raw)
To: Erik Logtenberg; +Cc: dm-crypt
On 12/11/2012 04:34 PM, Erik Logtenberg wrote:
> So there are at least two methods of extracting a master key. Now if I
> would suspect that a machine, that has a luks volume mounted, was
> compromised to the extent that someone had temporaryly gained root
> access, I would not only have to reset (all) passwords after fixing the
> security hole, but also I would have to create a new master key to be sure.
So attacker had already access to your mounted backup in plaintext
and could change anything there.
>
> Is the cryptsetup-reencrypt tool also meant for that purpose?
yes, in fact changing volume (master) key was primary use for it.
Read http://asalor.blogspot.cz/2012/08/re-encryption-of-luks-device-cryptsetup.html
(But always be sure you have backup. Backup of backup in your case :)
Milan
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dm-crypt] How to increase key size of existing volume
2012-12-11 15:34 ` Erik Logtenberg
2012-12-11 15:48 ` Milan Broz
@ 2012-12-11 16:34 ` Arno Wagner
1 sibling, 0 replies; 5+ messages in thread
From: Arno Wagner @ 2012-12-11 16:34 UTC (permalink / raw)
To: dm-crypt
On Tue, Dec 11, 2012 at 04:34:40PM +0100, Erik Logtenberg wrote:
> Hi Arno,
>
> Thanks for your explanation.
You are welcome.
> It is good to know that the 128 bit
> symmetric encryption key is still considered okay to some extent.
Until AES gets (real-world) broken, it will be secure. So not
only "to some extent" ;-)
> I did try the keylength site, and if I want my volume to be secure until
> roughly a decade after my projected demise, say 2100, then the adviced
> symmetric key size is already 135, 147 or 256 depending on the used
> method. So it'd still be somewhat better to increase the current 128 a bit.
There are no reliable forecasts for 2100. Even 30 years is highly
speculative. Brute-forcing 128 bits may not be possible even
in 2100, but AES may get broken. And, as I said, your passphrase
needs to be 128 bit as well (well, accounting for iteration, only
something like 110 bit, but that is still 22 random characters and
letters).
> > (you do have backup, right?).
>
> Actually I am talking about my backup volume. And as such, it is quite a
> bit of data, that I don't have a (second) backup of. Neither do I have
> enough storage available to make an additional backup, nor the required
> amount of time, since a full copy/restore of such a volume would take weeks.
I see. My advice would be to get that second backup and just
copy the primary backup over to it.
> In fact, there seems to be a second use case for re-encrypting an
> existing volume. I read some articles explaining the possibility to use
> the luksDump command in conjunction with the --dump-master-key option on
> a mounted luks volume, to reset the password even if the current
> password is no longer known.
> Additionally, also the luksHeaderBackup command is available to extract
> the master key.
That does not help you to change the master key, and that is what
you need to do if you want a longer one. A better passphrase
can just be added (luksAddKey) and then the old one removed
(luksRemoveKey). But with this the master key and disk
encryption cipher stay the same.
> So there are at least two methods of extracting a master key. Now if I
> would suspect that a machine, that has a luks volume mounted, was
> compromised to the extent that someone had temporaryly gained root
> access, I would not only have to reset (all) passwords after fixing the
> security hole, but also I would have to create a new master key to be sure.
Yes. And new data, as the attacker had access to all of it.
Of course, that is usually not possible...
> Is the cryptsetup-reencrypt tool also meant for that purpose?
In fact that would be its primary use. And the case does arise.
Milan is a very careful developer/maintainer and would not have
created a potentially unsafe tool like this otherwise.
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
One of the painful things about our time is that those who feel certainty
are stupid, and those with any imagination and understanding are filled
with doubt and indecision. -- Bertrand Russell
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2012-12-11 16:33 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-12-11 14:46 [dm-crypt] How to increase key size of existing volume Erik Logtenberg
2012-12-11 15:09 ` Arno Wagner
2012-12-11 15:34 ` Erik Logtenberg
2012-12-11 15:48 ` Milan Broz
2012-12-11 16:34 ` Arno Wagner
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox