Re: encrypting with loop-AES-v3.0a and no gpg-key doesn't give 'multi-key-v3'except for swap

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Petersen wrote:
| Jari Ruusu wrote:
|
|> Petersen wrote:
|>
|>> http://www.spinics.net/lists/crypto/msg02628.html states that loop-aes
|>> 2.0f can't use multi-key encryption without using gpg-key also.
|>
|>
|>
|> loop-AES-v3.0a mount and losetup can also read multi-key from file
|> descriptor specified with -p command line option.
|>
|
| But don't I need gpg-keys then? Perhaps I misunderstood the concept of
| multi-key-v3, is the keys actually gpg-keys? Of course I want a secure
| system, but I also would like to avoid kB's of random ascii data for the
| case if they disappear, and only have my memorised password left (and
| the encrypted partition).

See section 7.2 of http://loop-aes.sourceforge.net/loop-AES.README

gpg --symmetric does not use a gpg key pair.

|
|>
|>> I use the latest, loop-AES-v3.0a (README of November 27 2004 ), but only
|>> swap-encryption reports multi-key-v3, losetup -a reports 'AES256' only
|>> for drives created with
|>>
|>>    losetup -e AES256 -itercountk=300 ....
|>
|>
|
| So does the encrypted swap in fact use 65 random/"unknown" gpg-keys?

Yes.

| Venkat gave some good explaining links, thanks. I understand that some
| file (all zeroes for example) will give identical encrypted blocks on
| the disk. Consequently, our all-zero file must give different blocks
| upon encryption(?) But doesn't this give easier corruption; for example,
| zip-files gets easily destroyed because byte N depends of bytes 0 to
| N-1, and if byte N gets altered, N to Nlast are wrong.
|
|
| I found that 'hdparm -W 0 /dev/hdx' is necessary to switch off the
| write-cache (http://lwn.net/Articles/67223/). Perhaps you should add
| this to your README.

Use a UPS and set up the serial cable. You will be able to fsck a system with
encrypted partition so long as you have the keys available.

| Another thing I struggled with a while back, is the confusion around the
| cryptoloop/loop-aes that kernel 2.6.x contains. I thought your loop-AES
| equaled the kernel option, and supposed doing it 'your way' was getting
| obsolete after kernel 2.6.x integrated encryption in the kernel. I never
| got the 2.4.x-cryptoloop kernel patch to work, so I did it your way; it
| seems now that this is the superior method security wise.

Yes, cryptoloop is borked. In fact I have not seen anything like loop-AES on
any other operating system.

When one is paranoid, one has to even take precautions against
attacks that involve examining the disk surface with a scanning
tunnelling electron microscope and even the the silicon oxide in
your RAM. Loop-AES implements key-scrubbing:

http://www.spinics.net/lists/crypto/msg02995.html

So now you can see how paranoid the thought behind the programming
that goes into loop-AES is. Thanks Jari!

Cheers!

- ---Venkat.

- --
- -------------------------------------------------------------------------
Venkat Manakkal           Tel:+1-607-546-7300       Fax: 1-607-546-7387
venkat@xxxxxxxxxxxxxx     http://www.rayservers.com/
rayservers@xxxxxxxxxxxx   Computers. Installed Secure. Wholesale Prices.

PGP/GPG Key: https://www.rayservers.com/keys/0x12430522.asc
Get Windows Privacy Tools for free: http://winpt.sf.net/
- -------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFB5A2OWdkW/RJDBSIRAnWYAJwP2T2vEdHAyk1Au6W/VXDaFtpGNgCgpDok
3ocC/ET3ihYeDpm1625T+HE=
=Ns4F
-----END PGP SIGNATURE-----

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux