Re: [ANNOUNCE] cryptsetup 1.3.0-rc1 (test release candidate)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/15/2011 01:09 PM, Arno Wagner wrote:

>> I will also limit LUKS keyfile in next version, mistake will cause problems
>> (reading the whole device in locked memory -> OOPS or something like that).
> 
> Indeed. What you could do is have it default to error instead of
> to cut-down and proceed. That would make more sense, since
> cutting it is almost always not going to work.

yup. This is common problem for all supported types, so I will probably
remove per-type limits, and add one maximal keyfile limit configurable
during compile time.

Exceeding this limit will cause fail.

Limiting keyfile read (if needed - like /dev/urandom or when stored
in the beginning of device) should be always possible using --keyfile-size
parameter (or --new-keyfile-size for new keyfile option).

(This commadline limit option should possibly override maximal compiled-in
limit if specified number is larger.)

Is it better approach? 

Milan
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux