From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:40521) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QmRPr-0001Wx-Op for qemu-devel@nongnu.org; Thu, 28 Jul 2011 10:18:24 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1QmRPn-0008NE-Pe for qemu-devel@nongnu.org; Thu, 28 Jul 2011 10:18:23 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56453) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QmRPn-0008Ms-65 for qemu-devel@nongnu.org; Thu, 28 Jul 2011 10:18:19 -0400 Message-ID: <4E317059.1050107@redhat.com> Date: Thu, 28 Jul 2011 16:21:13 +0200 From: Kevin Wolf MIME-Version: 1.0 References: In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] Volume key in qcow3? List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Frediano Ziglio Cc: qemu-devel@nongnu.org Am 28.07.2011 10:05, schrieb Frediano Ziglio: > Hi, > I noted that AES encryption using qcow2 just use the password given > as as key (and also truncating it to 16 bytes == 128 bits). > This is prone to brute force attacks and is not also easy to change > password (you have to decrypt and encrypt again the entire image). > LUKS and EncFS use another way. They generate a random key (the > "volume key") then use the password you give to encrypt N times (where > N is decided by security level or automatically based on time to > decrypt the volume key. To change the password just give the old one, > get the volume key and encrypt again using the new one. LUKS support > also multiple "slots" to allow multiple password and even using an > external key file. > Obviously this require an additional extension to qcow2 so I think it > require a new qcow3 format. Yes, once we have qcow3, adding things like this should be easy enough. I think the idea makes sense. Another thing to consider with encryption is that we don't encrypt metadata currently. I'm not entirely sure if this is a good or a bad thing. Metadata is relatively predictable and I think that might hurt the encryption? Though I'm really not an expert in this area. Kevin