[ANNOUNCE] cryptsetup 1.6.8

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

The stable cryptsetup 1.6.8 release is available at

    https://gitlab.com/cryptsetup/cryptsetup

Please note that release packages are located on kernel.org

    https://www.kernel.org/pub/linux/utils/cryptsetup/v1.6/

Feedback and bug reports are welcomed.

Cryptsetup 1.6.8 Release Notes
==============================

Changes since version 1.6.7

* If the null cipher (no encryption) is used, allow only empty password for LUKS.
  (Previously cryptsetup accepted any password in this case.)

  The null cipher can be used only for testing and it is used temporarily during
  offline encrypting not yet encrypted device (cryptsetup-reencrypt tool).

  Accepting only empty password prevents situation when someone adds another
  LUKS device using the same UUID (UUID of existing LUKS device) with faked
  header containing null cipher.
  This could force user to use different LUKS device (with no encryption)
  without noticing.
  (IOW it prevents situation when attacker intentionally forces
  user to boot into different system just by LUKS header manipulation.)

  Properly configured systems should have an additional integrity protection
  in place here (LUKS here provides only confidentiality) but it is better
  to not allow this situation in the first place.

  (For more info see QubesOS Security Bulletin QSB-019-2015.)

* Properly support stdin "-" handling for luksAddKey for both new and old
  keyfile parameters.

* If encrypted device is file-backed (it uses underlying loop device),
  cryptsetup resize will try to resize underlying loop device as well.
  (It can be used to grow up file-backed device in one step.)

* Cryptsetup now allows to use empty password through stdin pipe.
  (Intended only for testing in scripts.)

Cryptsetup API NOTE:

Direct terminal handling and password calling callback for passphrase
entry will be removed from libcryptsetup in next major (2.x) version
(application should handle it itself).
It means that application have to always provide password in API calls.

Functions returning last error will be removed in next major version (2.x).
These functions did not work properly for early initialization errors
and application can implement better function easily using own error callback.

See comments in libcryptsetup.h for more info about deprecated functions.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=4ZSC
-----END PGP SIGNATURE-----
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux