after wiping with zeros you can luksFormat the partition again (only the header will change, this section should be wiped with dd before) with this method you should be really on the safe side? cu Jan Roscoe schrieb: > Sounds reasonable to me, AFAIK AES is not vunerable to known plaintext > attacks, which is essentially what this would come down to. > > On 9/1/06, Andreas Grassl <andog@xxxxxxx> wrote: > hi, i have a question: > > i encrypted a partition with > > cryptsetup -c aes-cbc-essiv:sha256 -y -s 256 luksFormat /dev/sda6 > > but forgot to wipe the data first :-) > > now i thought to write simply a zero-file on the encrypted partition to > fill the whole space. > > is this stupid and opens the door to brake the cipher, or is there no > problem?? > > grüsse > > ando > > > -- > /"\ > \ / ASCII Ribbon Campaign > X against HTML email > / \ > > >> > >> > --------------------------------------------------------------------- > dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ > To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx > For additional commands, e-mail: dm-crypt-help@xxxxxxxx > >> > >> > > > --------------------------------------------------------------------- > > dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ > > To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx > > For additional commands, e-mail: dm-crypt-help@xxxxxxxx > > > > --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx