Re: instead of wiping the data, filling an encrypted volume with zeros

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



after wiping with zeros you can luksFormat the partition again (only the
header will change, this section should be wiped with dd before)
with this method you should be really on the safe side?
cu
Jan

Roscoe schrieb:
> Sounds reasonable to me, AFAIK AES is not vunerable to known plaintext
> attacks, which is essentially what this would come down to.
>
> On 9/1/06, Andreas Grassl <andog@xxxxxxx> wrote:
> hi, i have a question:
>
> i encrypted a partition with
>
> cryptsetup -c aes-cbc-essiv:sha256 -y -s 256 luksFormat /dev/sda6
>
> but forgot to wipe the data first :-)
>
> now i thought to write simply a zero-file on the encrypted partition to
> fill the whole space.
>
> is this stupid and opens the door to brake the cipher, or is there no
> problem??
>
> grüsse
>
> ando
>
>
> --
>  /"\
>  \ /    ASCII Ribbon Campaign
>   X      against HTML email
>  / \
>
> >>
> >>
> ---------------------------------------------------------------------
> dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
> To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
> For additional commands, e-mail: dm-crypt-help@xxxxxxxx
> >>
> >>
>
> > ---------------------------------------------------------------------
> > dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
> > To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
> > For additional commands, e-mail: dm-crypt-help@xxxxxxxx
>
>
>
>


---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux