qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Daniel P. Berrange" <berrange@redhat.com>
To: Eric Blake <eblake@redhat.com>
Cc: Kevin Wolf <kwolf@redhat.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	qemu-devel@nongnu.org, Stefan Hajnoczi <stefanha@redhat.com>,
	Peter Maydell <peter.maydell@linaro.org>
Subject: Re: [Qemu-devel] [PATCH v2] Describe flaws in qcow/qcow2 encryption in the docs
Date: Wed, 22 Jan 2014 15:48:19 +0000	[thread overview]
Message-ID: <20140122154819.GY9434@redhat.com> (raw)
In-Reply-To: <52DFE290.5080401@redhat.com>

On Wed, Jan 22, 2014 at 08:24:00AM -0700, Eric Blake wrote:
> On 01/22/2014 05:28 AM, Daniel P. Berrange wrote:
> 
> > 
> > Recommend against any use of QCow/QCow2 encryption, directing
> > users to dm-crypt / LUKS which can meet modern cryptography
> > best practices.
> > 
> > Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
> > ---
> >  qemu-doc.texi | 23 ++++++++++++++++++++---
> >  qemu-img.texi | 23 ++++++++++++++++++++---
> >  2 files changed, 40 insertions(+), 6 deletions(-)
> 
> > +
> > +@itemize @minus
> > +@item The AES-CBC cipher is used with predictable initialization vectors based
> > +on the sector number. This makes it vulnerable to chosen plaintext attacks
> > +which can reveal the existence of encrypted data.
> > +@item The user passphrase is directly used as the encryption key. A poorly
> > +choosen or short passphrase will compromise the security of the encryption.
> 
> s/choosen/chosen/ (both files)
> 
> > +In the event of the passphrase being compromised there is no way to change
> 
> and still my question whether this deserves a third @item.

I was considering this to be a result of using the passphrase as the
key. It does however read better if split out, so I've made that change.

Daniel
-- 
|: http://berrange.com      -o-    http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org              -o-             http://virt-manager.org :|
|: http://autobuild.org       -o-         http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org       -o-       http://live.gnome.org/gtk-vnc :|

  reply	other threads:[~2014-01-22 15:48 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-01-22 12:28 [Qemu-devel] [PATCH v2] Describe flaws in qcow/qcow2 encryption in the docs Daniel P. Berrange
2014-01-22 15:24 ` Eric Blake
2014-01-22 15:48   ` Daniel P. Berrange [this message]
2014-01-22 15:32 ` Markus Armbruster

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140122154819.GY9434@redhat.com \
    --to=berrange@redhat.com \
    --cc=eblake@redhat.com \
    --cc=kwolf@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=peter.maydell@linaro.org \
    --cc=qemu-devel@nongnu.org \
    --cc=stefanha@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).