From: "Daniel P. Berrange" <berrange@redhat.com>
To: Eric Blake <eblake@redhat.com>
Cc: Kevin Wolf <kwolf@redhat.com>,
Paolo Bonzini <pbonzini@redhat.com>,
qemu-devel@nongnu.org, Stefan Hajnoczi <stefanha@redhat.com>,
Peter Maydell <peter.maydell@linaro.org>
Subject: Re: [Qemu-devel] [PATCH v2] Describe flaws in qcow/qcow2 encryption in the docs
Date: Wed, 22 Jan 2014 15:48:19 +0000 [thread overview]
Message-ID: <20140122154819.GY9434@redhat.com> (raw)
In-Reply-To: <52DFE290.5080401@redhat.com>
On Wed, Jan 22, 2014 at 08:24:00AM -0700, Eric Blake wrote:
> On 01/22/2014 05:28 AM, Daniel P. Berrange wrote:
>
> >
> > Recommend against any use of QCow/QCow2 encryption, directing
> > users to dm-crypt / LUKS which can meet modern cryptography
> > best practices.
> >
> > Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
> > ---
> > qemu-doc.texi | 23 ++++++++++++++++++++---
> > qemu-img.texi | 23 ++++++++++++++++++++---
> > 2 files changed, 40 insertions(+), 6 deletions(-)
>
> > +
> > +@itemize @minus
> > +@item The AES-CBC cipher is used with predictable initialization vectors based
> > +on the sector number. This makes it vulnerable to chosen plaintext attacks
> > +which can reveal the existence of encrypted data.
> > +@item The user passphrase is directly used as the encryption key. A poorly
> > +choosen or short passphrase will compromise the security of the encryption.
>
> s/choosen/chosen/ (both files)
>
> > +In the event of the passphrase being compromised there is no way to change
>
> and still my question whether this deserves a third @item.
I was considering this to be a result of using the passphrase as the
key. It does however read better if split out, so I've made that change.
Daniel
--
|: http://berrange.com -o- http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org -o- http://virt-manager.org :|
|: http://autobuild.org -o- http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org -o- http://live.gnome.org/gtk-vnc :|
next prev parent reply other threads:[~2014-01-22 15:48 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-01-22 12:28 [Qemu-devel] [PATCH v2] Describe flaws in qcow/qcow2 encryption in the docs Daniel P. Berrange
2014-01-22 15:24 ` Eric Blake
2014-01-22 15:48 ` Daniel P. Berrange [this message]
2014-01-22 15:32 ` Markus Armbruster
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140122154819.GY9434@redhat.com \
--to=berrange@redhat.com \
--cc=eblake@redhat.com \
--cc=kwolf@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).