Re: Brute force against LUKS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Arno Wagner wrote:
> On Wed, Oct 04, 2006 at 01:03:50AM +0200, Christophe wrote:
>   
>> Hi,
>>
>> I read through the mailling-list and still have a question about LUKS
>> and brute force attacks :
>> is there a way to have LUKS block any further trial at accessing the
>> encrypted partition after (for instance) 10 identification failure
>> when trying to open the encrypted partition ?
>> This way, brute force attack would not be possible...
>> thanks for your answer !
>>     
>
> Would not help, since an attacker does not need to use the
> LUKS code, but can simulate the attack.
>
> Arno
>   
Thx for you answer,
Still, I don't understand how he could simulate the attack, since I
thought the partition was encoded with a cipher-key.
I thought the cipher key was acessible only when you get the password
right, then acces it from the partition table.
I am sorry I dod not get deep enough into the implemantation of luks,
but still I would like to understand.

Do you pls have a hint for me of a link I could read, not about the
implementation precisely but why an attacker could / could not attack ?

thank you

-- 
Envoyez vous vos lettres postales sans fermer l'enveloppe ? Non !
Alors pensez à utiliser crypter vos email et envoyez moi votre clé publique !
plus d'info @ : http://openpgp.vie-privee.org/openpgp.html
Par exemple : WinPt sous window$ ! http://winpt.sourceforge.net/fr/download.php


---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux