Re: Result of supplying an incorrect passphrase?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jul 17, 2009 at 08:34:11AM -0400, Eric Grejda wrote:
> Arno Wagner wrote:
> > No to nitpick, but my approach would be to not boot the computer
> > at all, but remove the drive and copy it (e.g. attached by USB)
> > on a different machine.
> 
> Then they start attacking the keys of their copy.  Fair enough; can't do
> anything about that but try to use the strongest keys possible.  If they
> pull it off, I'd love to hear how they did it, assuming that I'm still
> around.

Actually they start attacking you and if you destroy the original,
they just hurt you a bit more and restore from that backup.

Brute-forcing something like LUKS is currently only feasible
for very weak passphrases.

Arno
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux