Re: Stealth crypto

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Michael Garibaldi <michaelgari@xxxxxxxxx> wrote:

> First of all - I'm a bit confused about the options. As far as I can
> gather, there are
> 1.Kernel's cryptoloop
> 2. Kernel's dm-crypt
> 3. Jari Ruusu's (or documented by him?) cryptoloop
> 
> Out of these, 1 is clearly bad (documentation of all three say that it
> is). However, dm-crypt's documentation does not mention #3 and #3's
> documentation does not mention dm-crypt. So, what's the deal between
> these?

cryptoloop, dm-crypt, and loop-AES are three different crypto
implementations on linux systems: 

Cryptographic API is built-in in modern 2.6 mainline kernels; vendor
kernels are derived from these. Cryptoloop stands for using the
Cryptographic API via the loop-device, hence it's often referred to
as "mainline cryptoloop".

dm-crypt is a so-called device-mapper target that provides
transparent de/encryption of block devices using the Cryptographic
API.

Both cryptoloop and dm-crypt in kernels prior to 2.6.10 are
vulnerable, and even recent dm-crypt still suffers from a weak crypto
implementation.

loop-AES is a package that provides loadable linux kernel modules
that allow you to safely de/encrypt disk partitions. It does not
modify the kernel in any way.

-- 
left blank, right bald

Attachment: pgp5OBfmCfBpX.pgp
Description: PGP signature


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux