From: Jari Ruusu <jariruusu@users.sourceforge.net>
To: Fruhwirth Clemens <clemens-dated-1085585540.2c1d@endorphin.org>
Cc: Michal Ludvig <michal@logix.cz>, Andrew Morton <akpm@osdl.org>,
jmorris@redhat.com, davem@redhat.com,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH 2/2] Support for VIA PadLock crypto engine
Date: Sun, 16 May 2004 20:46:32 +0300 [thread overview]
Message-ID: <40A7A8F8.16426546@users.sourceforge.net> (raw)
In-Reply-To: 20040516153218.GA9170@ghanima.endorphin.org
Fruhwirth Clemens wrote:
> Your countermeasures to optimized dictionary attacks are suboptimal. The
> following code is from your util-linux patch:
>
> aes_encrypt(&ctx, &loopinfo.lo_encrypt_key[ 0], &loopinfo.lo_encrypt_key[ 0]);
> aes_encrypt(&ctx, &loopinfo.lo_encrypt_key[16], &loopinfo.lo_encrypt_key[16]);
> /* exchange upper half of first block with lower half of second block */
> memcpy(&tempkey[0], &loopinfo.lo_encrypt_key[8], 8);
> memcpy(&loopinfo.lo_encrypt_key[8], &loopinfo.lo_encrypt_key[16], 8);
> memcpy(&loopinfo.lo_encrypt_key[16], &tempkey[0], 8);
>
> Symmetric block ciphers can't be used as hashing per se.
You nipped away part of code that does hashing.
> Neither seems the
> swapping scheme you're using to be a standard hash construction for ciphers.
Swapping upper half of first block with lower half of second block between
multiple iterations of encryption is correct way to extend block length.
> I suggest to read "Applied Cryptography", Bruce Schneier, "18.11 One-Way
> hash functions using symmetric block algorithms" as an introduction to that
> topic.
May I suggest that you read and understand the code before publishing
incorrect conclusions.
> To avoid this troubles all together, I recommend to use a standard
> MAC instead.
Recommended way of setting up encryption keys in loop-AES, is to use gpg
encrypted key file with random keys. gpg does all that salted+iterated key
setup without any user intervention. That quoted part of code is there for
backward compatibility.
> > > You have been campaigning with FUD
> > > against cryptoloop/dm-crypt for too long now. There are NO exploitable
> > > security holes in neither dm-crypt nor cryptoloop.
> >
> > In the past you, Fruhwirth, have demonstrated that you don't understand what
> > the security holes are. The fact that you still don't seem to undertand,
> > does not mean that the holes are not there.
>
> Everyone attending a rhetoric seminar learns, "If you run out of
> arguments, attack the person itself". The attacks, you're speaking of in
> the next paragraph, apply to the key deduction. That's very different
> from IV deduction.
You said that I was spreading FUD. I said you are wrong. Fortunately
at least some of mainline kernel dudes seem to understand:
http://marc.theaimsgroup.com/?l=linux-kernel&m=107713612713381&w=2
> > Optimized dictionary attack is exploitable. Ok, it requires major government
> > size funding, but what do you think NSA guys get paid for?
> >
> > Watermark attack is exploitable using zero budget.
>
> As I said, not cryptoloop's responsibility.
Optimized dictionary attack can be prevented using better mount and losetup
programs. Mainline util-linux is still backdoored.
Watermark attack is very much cryptoloop's and dm-crypt's responsibility.
> Please read my mails carefully. See the following paragraph:
>
> > > There is room for improving both IV deducation schemes, but it's a
> > > theoretic weakness, one which should be corrected nonetheless.
As long as there are only promises, and unfixed exploitable vulnerabilities
remain in mainline cryptoloop+util-linux and dm-crypt+cryptsetup, people
continue to be scammed to using backdoored crypto.
> > One cryptoloop developer
> > somehow managed to convince util-linux maintaner to drop those
> > countermeasures against optimized dictionary attacks. To protect the guilty,
> > I won't name his name here, but search linux-crypto archives for 14 Mar 2003
> > 11:12:13 -0800 posting if you want know his name.
>
> You are talking about util-linux again. Rusuu, don't try to fool the
> audience by arguing for something totally different. Further if you try to
> provide evidence for something, provide an URL to back your claims. I wasn't
> able to find any mails in the archives dealing with that topic.
Wrong list, sorry. It was CC'd to cryptoapi-devel:
http://www.kerneli.org/pipermail/cryptoapi-devel/2003-March/000506.html
--
Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD
next prev parent reply other threads:[~2004-05-16 17:46 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-05-10 14:40 [PATCH 2/2] Support for VIA PadLock crypto engine Michal Ludvig
2004-05-10 15:55 ` James Morris
2004-05-10 19:23 ` Michal Ludvig
2004-05-11 16:56 ` [PATCH 1/2] " Michal Ludvig
2004-05-12 8:55 ` Michal Ludvig
2004-05-11 16:56 ` [PATCH 2/2] " Michal Ludvig
2004-05-12 13:37 ` James Morris
2004-05-12 14:42 ` Michal Ludvig
2004-05-12 14:52 ` James Morris
2004-05-12 15:25 ` Michal Ludvig
2004-05-13 0:44 ` James Morris
2004-05-14 15:10 ` New list for CryptoAPI development Michal Ludvig
2004-05-17 8:39 ` Arnd Bergmann
2004-05-17 8:53 ` Michal Ludvig
2004-05-13 12:59 ` [PATCH 2/2] Support for VIA PadLock crypto engine Jari Ruusu
2004-05-13 18:30 ` Andrew Morton
2004-05-13 19:02 ` Jari Ruusu
2004-05-13 20:00 ` Michal Ludvig
2004-05-14 13:31 ` Jari Ruusu
2004-05-14 14:09 ` Fruhwirth Clemens
2004-05-14 16:05 ` Jari Ruusu
2004-05-16 15:32 ` Fruhwirth Clemens
2004-05-16 17:46 ` Jari Ruusu [this message]
2004-05-11 17:04 ` [PATCH 3/2 :-] " Michal Ludvig
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=40A7A8F8.16426546@users.sourceforge.net \
--to=jariruusu@users.sourceforge.net \
--cc=akpm@osdl.org \
--cc=clemens-dated-1085585540.2c1d@endorphin.org \
--cc=davem@redhat.com \
--cc=jmorris@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=michal@logix.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox