growing a luks volume: how to fill it with random data

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



    > Date: Fri, 17 Apr 2009 16:49:14 +0200
    > From: Henrik Theiling <theiling@xxxxxxxxxx>

    > Hi!

    > Wolfgang Sailer writes:
    > >...
    > > But how to do it in the following situation:
    > > When I enlarge a LUKS volume, say by expanding the RAID or enlarging the
    > > logvol (LVM partition) that hosts the LUKS volume, how can I then fill the
    > > additional space with random data before enlarging the LUKS volume?
    > >...

    > Another simple way: enlarge the volume normally and then fill it up
    > with dummy files (in the simplest case, use dd if=/dev/zero
    > of=dummyfile) until it is absolutely full.  Be root for this so no
    > reserved space will be spared.  (After than, you can simply remove the
    > dummy files, of course.)

I am not sure this would be a 100% solution, but it may be good
enough, depending on your threat model.  The problem is that many
filesystems reserve certain blocks for FS metadata, and filling up
the "available" filesystem space might not touch more than a tiny
fraction of those blocks.  You might have to create millions of files
to guarantee you've walked all over all the metadata, but exactly what
to do would be highly dependent upon internal details of the filesystem.

It seems far safer, if you're going to do this, to create the crypto
mapping and then write to the crypto partition (not a filesystem
that's built on top of it) to randomize the device.  -Then- you can
create a filesystem on top of the randomized partition.

P.S.  If you have to worry that encrypting blocks of zeroes might
weaken the cipher, you have the wrong cipher.  No reasonable cipher
is vulnerable to any sort of chosen-plaintext attack---and any such
cipher would be unsuitable even if you weren't only writing zeroes,
because many filesystems and many types of files have -very-
predictable contents in certain locations.

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux