Re: XTS cipher mode limitations (FAQ additions)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Aug 22, 2010 at 02:50:32PM +0200, Christoph Anton Mitterer wrote:
> Hi Arno.
> 
> Thanks for that =)
> 
> On Sat, 2010-08-21 at 02:22 +0200, Arno Wagner wrote:
> > > 1) I guess we've already concluded that it's one of the securest modes
> > > available (if not the securest),... also protecting against certain
> > > attacks for which the others are vulnerable.
> > Yes.
> 
> I know this will probably lead to some discussion ;) ... but should we
> perhaps suggest this in the FAQ?
> E.g. something like a section "Which mode should one use?", and then XTS
> withstands currently most known attacks, it has been standardised by
> IEEE (1619 IIRC). etc. pp.
> Perhaps also than one should use plain64 in all kernels supporting it,
> and at least when device > 2TB.


I think the item "What about XTS mode?" already covers that.

 
> btw: In the question "Can I resize a dm-crypt or LUKS partition?", you
> say one should not use it with > 2TB.
> May I suggest to add a (see <link to Are there any problems with "plain"
> IV? What is "plain64"?>)? Other wise people may miss that it's ok to use
> it with > 2TB when plain 64 is used.


Added.

 
> May I suggest that all occurrences of e.g. 2 TB are replaced by e.g. 2
> TiB?

Since I typically insist on that, I should have done this in 
the first place. Diexed also for MB and kB. (No GB in there)

 
> 
> May I further suggest, that in all references to 2TB, we add "(= 2^32 *
> 512 bytes)"?
> There's always that problem that one never knows whether TB really means
> TB or TiB.

Instead changed all 2TB to 2TiB. 

 
> > > 3) There was a limitation on the block size, used with XTS, right? But
> > > as we _always_ use 512 byte (even if the device below uses larger
> > > sectors), we're fine anyway.
> > > Right?
> > Yes.
> Perhap we can add this to the FAQ, too.
> People may have read about it,... but don't know whether it's a problem
> or not. So telling them "no everything's fine as long as our blocky are
> smaller than xxxx bytes) can be a good idea.
> Especially as the wikipedia article contains some FUD about this.

Added.
 
 
> > > - periodically re-encode before about 100TB
> > > - 1TB thingy?!
> > 
> > No sure it makes sense. But I can put it in there.
> 
> I'd suggest so,... for people with the highest paranoia ;)
> Perhaps with a note, that this is probably not such a big problem for
> many scenarios.
> 
> Also adding that this is a general problem, what one can do against it,
> and the rough values when it is estimated to become a problem (e.g. for
> XTS).
> 
> 
> 
> > Was there a literature reference for the attack? 
> > If I out this into the FAQ, then I need to 
> > get it right as it is something more complicated and the
> > data exposure is low enough that most people rightfully 
> > will not care and most attackers will not be able to do it
> > anyways due to the high anount of storage needed.
> Uhm... no idea unfortunately...

Well, if it comes up again, I can look at it.  I will 
however not start to distribute my own FUD and I am 
not a good enough cryptographer for a really thorough
analysis of the issue. I am willing to read a paper on
it if somebody else provides the link ;-)

Arno
 
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux