Re: Some questions/clarifications around the LUKS spec

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





Am 14.03.2016 um 23:27 schrieb Milan Broz:
On 03/14/2016 10:24 PM, Sven Eschenberg wrote:

Updating a spec needs more than just mentioning something. Esp. changes
may not be incompatible to previous revisions. If changes are
incompatible, a new version is needed (instead of a simple revision). A
change to the list of valid values as well as the change in offset
calculation to meet alignment requirements are indeed incompatible to
the original specification for the v1 header, like it or not. Thus, by
introducing these changes, a new version of the on disk format was
introduced and this should have been reflected by reversioning the
header as well. Having multiple possible specs for the same
magic+version is something one really should not go for.

On-disk format should be backward compatible since cryptsetup 1.0.1,
no change in version is needed.
(But there were bugs - so nobody should use such old versions.)

Yes and no. It seems the spec purposefully decided to offer a fixed list (of ciphers/modes) to make alternative implementations possible. AFAIK none really exists (in the public domain) and since the old reference implementation already allowed diverging from the spec it did not really adhere it either. Any other implementationhonoring the spec before the xts updates could legitimately consider all headers with unlisted ciphers invalid and refuse to work (for safety). So there would no real harm be done, yet it would have been better to make this change clear by changing the version - afterall there's a 16-bit value and massive changes could still change the magic string for safety. (in example your plans for v2)

Algorithm support is always dynamic thing (you can blacklist kernel
module, run in FIPS mode that allows only NIST friendly algorithms...)
So "mandatory" list for LUKS does not make sense in reality.

As I read the LUKS spec it is not limited to the stock kernel crypto modules, in practise no alternatives showed up so far though. Example: Imagine the crypto is done externally by a crypto device that is tied to your box by RDMA and offers a cipher which it names rijndael. So an implementation that sets up this device would map the name rijndael to aes and you could still use the encrypted device with any different kernel. I think limiting the list of ciphers and modes was for full portability, which makes sense.


Offset calculation for keyslot is the same as well ... but reading
that pseudo-algorithm in spec - the slot alignment to 4k diverged
in 1.0 -> 1.0.1 (2005). Clemens probably forgot to update spec here,
so this is IMHO bug in spec (and I missed this).

(Cryptsetup can still open old sector-aligned version - despite this version
was never in any distro.)

The question though is, would that still hold true the other way round for old cryptsetup versions (and alternative implementations) prior to the xts spec update?


User data alignment was always read from header, it was never calculated
and I think spec expect it this way.

I think the spec is not clear on this, it suggests the offsets are stored for safety. It does not explicitly state the stored values should take precedence, though this is one (sane) possible interpretation. It's never to late for an errata to clarify this ;-).


Milan

Regards

-Sven
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux