Hi there,
The question I was asking myself is: Let's assume an adversary has the
knowledge, that a) you just grew a volume, b), you used the method with
dummyfiles fed from /dev/zero.
Now if the Adversary arbitarily reads a set of sectors from the freshly
added area, does the knowledge, that all the blocks actually equal zeros
in cleartext, give the adversary an opportunity to break the key more
easily?
Would it be better to fill those dummyfiles from /dev/urandom as usual?
Regards
-Sven
Wolfgang Sailer schrieb:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Sven and Hendrik!
Another simple way: enlarge the volume normally and then fill it up
with dummy files (in the simplest case, use dd if=/dev/zero
of=dummyfile) until it is absolutely full.
That sounds great! Didn't think of that one. Simple and it must be pretty
fast, too.
This could even become the recommended way to initialize a LUKS partition
after creation, instead of filling it with urandom beforehand.
kind regards for your solutions,
Wolfgang
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFJ6MMMR6b2EdogPFsRAg5+AJ9Cum+pwL0t96DFqcjBn90GOS6UfgCfVtrw
UcDeRx9rlwbiztUUKL8guVs=
=njF1
-----END PGP SIGNATURE-----
---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx
---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx