[ANNOUNCE] cryptsetup 1.6.3

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

The stable cryptsetup 1.6.3 release is available at

    http://code.google.com/p/cryptsetup/

Feedback and bug reports are welcomed.

Cryptsetup 1.6.3 Release Notes
==============================

Changes since version 1.6.2

* Fix cryptsetup reencryption tool to work properly
  with devices using 4kB sectors.

* Always use page size if running through loop device,
  this fixes failures for external LUKS header and
  filesystem requiring 4kB block size.

* Fix TCRYPT system encryption mapping for multiple partitions.
  Since this commit, one can use partition directly as device parameter.
  If you need to activate such partition from image in file,
  please first use map partitioned loop device (losetup -P)
  on image.
  (Cryptsetup requires partition offsets visible in kernel sysfs
  in this mode.)

* Support activation of old TrueCrypt containers using CBC mode
  and whitening (created in TrueCrypt version < 4.1).
  This requires Linux kernel 3.13 or later.
  (Containers with cascade CBC ciphers are not supported.)

* Properly display keys in dump --dump-master-key command
  for TrueCrypt CBC containers.

* Rewrite cipher benchmark loop which was unreliable
  on very fast machines.

* Add warning if LUKS device was activated using non-cryptsetup
  library which did not set UUID properly (e.g. cryptmount).
  (Some commands, like luksSuspend, are not available then.)

* Support length limitation also for plain (no hash) length.
  This can be used for mapping problematic cryptosystems which
  wipes some parts of key (losetup sometimes set last 32 byte to zero,
  which can be now configured as --hash plain:31 parameter).

* Fix hash limit if parameter is not a number.
  (The whole key was set to zero instead of command failure.)

* Unify --key-slot behavior in cryptsetup_reencrypt tool.

* Update dracut example scripts for system reencryption on first boot.

* Add command line option --tcrypt-backup to access TCRYPT backup header.

* Fix static compilation with OpenSSL.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=4O2A
-----END PGP SIGNATURE-----
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux