public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Jari Ruusu <jariruusu@users.sourceforge.net>
To: Fruhwirth Clemens <clemens-dated-1085407799.3f43@endorphin.org>
Cc: Michal Ludvig <michal@logix.cz>, Andrew Morton <akpm@osdl.org>,
	jmorris@redhat.com, davem@redhat.com,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH 2/2] Support for VIA PadLock crypto engine
Date: Fri, 14 May 2004 19:05:16 +0300	[thread overview]
Message-ID: <40A4EE3C.A80D4B5B@users.sourceforge.net> (raw)
In-Reply-To: 20040514140958.GA8645@ghanima.endorphin.org

Fruhwirth Clemens wrote:
> On Fri, May 14, 2004 at 04:31:20PM +0300, Jari Ruusu wrote:
> > cryptoloop and dm-crypt on-disk formats are FUBAR: precomputable ciphertexts
> > of known plaintext, and weak IV computation. Anything that claims
> > "cryptoloop compatible", and only that, is completely FUBAR. dm-crypt is
> > such. IOW, there are now _two_ backdoored device crypto implementations in
> > mainline.
> 
> Jari, you're starting to annoy me.

Hey, don't kill the messenger for bringing bad news.

loop-AES wasn't born perfect. But I have plead quilty for each and every
fuck-up that was there. And then went on and fixed the damn code.
Countermeasures against optimized dictionary attacks was included in 2001,
and stronger IV in 2003.

May I suggest that you do the same. Better late than never.

> You have been campaigning with FUD
> against cryptoloop/dm-crypt for too long now. There are NO exploitable
> security holes in neither dm-crypt nor cryptoloop.

In the past you, Fruhwirth, have demonstrated that you don't understand what
the security holes are. The fact that you still don't seem to undertand,
does not mean that the holes are not there.

> There is room for
> improving both IV deducation schemes, but it's a theoretic weakness, one
> which should be corrected nonetheless. However, modern ciphers are designed
> to resist known-plaintext attacks.

Optimized dictionary attack is exploitable. Ok, it requires major government
size funding, but what do you think NSA guys get paid for?

Watermark attack is exploitable using zero budget.

> The default setup of loop-aes' initrd is
> a greater threat to security, but wait for my paper on this.

I doubt it, but I'm waiting...

> In the meantime, stop spreading FUD,

You insisting that cryptoloop/dm-crypt do not have exploitable security
issues does not increase confidence at all. Quite the contrary, as it
implies that existing vulnerabilities won't be fixed.

>  especially stop abusing the term "backdoored"!

Initial crypto merge for mainline mount and losetup included support for
gpg-encrypted key files, and seeded+iterated key setup. This support was
merged to util-linux-2.12-WIP (work in progress). One cryptoloop developer
somehow managed to convince util-linux maintaner to drop those
countermeasures against optimized dictionary attacks. To protect the guilty,
I won't name his name here, but search linux-crypto archives for 14 Mar 2003
11:12:13 -0800 posting if you want know his name. Final util-linux-2.12 was
released with those countermeasures removed. In my opinion that was
deliberate implanting of exploitable vulnerability to mainline mount and
losetup. I call that backdoor. You call that whatever you want.

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

  reply	other threads:[~2004-05-14 16:06 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-05-10 14:40 [PATCH 2/2] Support for VIA PadLock crypto engine Michal Ludvig
2004-05-10 15:55 ` James Morris
2004-05-10 19:23   ` Michal Ludvig
2004-05-11 16:56   ` [PATCH 1/2] " Michal Ludvig
2004-05-12  8:55     ` Michal Ludvig
2004-05-11 16:56   ` [PATCH 2/2] " Michal Ludvig
2004-05-12 13:37     ` James Morris
2004-05-12 14:42       ` Michal Ludvig
2004-05-12 14:52         ` James Morris
2004-05-12 15:25           ` Michal Ludvig
2004-05-13  0:44             ` James Morris
2004-05-14 15:10               ` New list for CryptoAPI development Michal Ludvig
2004-05-17  8:39                 ` Arnd Bergmann
2004-05-17  8:53                   ` Michal Ludvig
2004-05-13 12:59         ` [PATCH 2/2] Support for VIA PadLock crypto engine Jari Ruusu
2004-05-13 18:30           ` Andrew Morton
2004-05-13 19:02             ` Jari Ruusu
2004-05-13 20:00               ` Michal Ludvig
2004-05-14 13:31                 ` Jari Ruusu
2004-05-14 14:09                   ` Fruhwirth Clemens
2004-05-14 16:05                     ` Jari Ruusu [this message]
2004-05-16 15:32                       ` Fruhwirth Clemens
2004-05-16 17:46                         ` Jari Ruusu
2004-05-11 17:04   ` [PATCH 3/2 :-] " Michal Ludvig

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=40A4EE3C.A80D4B5B@users.sourceforge.net \
    --to=jariruusu@users.sourceforge.net \
    --cc=akpm@osdl.org \
    --cc=clemens-dated-1085407799.3f43@endorphin.org \
    --cc=davem@redhat.com \
    --cc=jmorris@redhat.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=michal@logix.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox