From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S267031AbUBSIO3 (ORCPT ); Thu, 19 Feb 2004 03:14:29 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S267033AbUBSIO3 (ORCPT ); Thu, 19 Feb 2004 03:14:29 -0500 Received: from ns.suse.de ([195.135.220.2]:40588 "EHLO Cantor.suse.de") by vger.kernel.org with ESMTP id S267031AbUBSIO0 (ORCPT ); Thu, 19 Feb 2004 03:14:26 -0500 Date: Thu, 19 Feb 2004 18:54:32 +0100 From: Andi Kleen To: Andrew Morton Cc: thornber@redhat.com, linux-kernel@vger.kernel.org Subject: Re: 2.6.3-mm1 Message-Id: <20040219185432.1ffee3d7.ak@suse.de> In-Reply-To: <20040218152745.766ede4c.akpm@osdl.org> References: <20040217232130.61667965.akpm@osdl.org.suse.lists.linux.kernel> <20040218025549.4e7c56a1.akpm@osdl.org> <20040219073734.309e396d.ak@suse.de> <20040218134558.GN27549@reti> <20040219125219.54978b4e.ak@suse.de> <20040218152745.766ede4c.akpm@osdl.org> X-Mailer: Sylpheed version 0.9.7 (GTK+ 1.2.10; i686-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 18 Feb 2004 15:27:45 -0800 Andrew Morton wrote: > Andi Kleen wrote: > > > > On Wed, 18 Feb 2004 13:45:58 +0000 > > Joe Thornber wrote: > > > > > On Thu, Feb 19, 2004 at 07:37:34AM +0100, Andi Kleen wrote: > > > > Supporting metadata can be quite simple - e.g. a standard header on the first blocks that > > > > has a length and a number of records with unique IDs. And the kernel driver would need > > > > to skip over these headers. > > > > > > The target already takes an offset into the device, so you have what you want. > > > > Ok fine. The only requirement would be compatible IVs then. > > > > Would it be correct to say that until someone does this development, > dm-crypt has the same vulnerabilities as cryptoloop? Or is there some It all depends on what the crypto API module and the user space utils implement. That is why calling it dm-crypt is misleading, dm-filter or somesuch would be better. > different way of using dm-crypt which is incompatible with cryptoloop, but > is more secure? More secure will be incompatible. -Andi