Re: Recreation of LUKS header when the master key is known

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



It may also be a good idea to go with the defaults, unless there is
a very good way not to.

Regards,
Arno

On Mon, Aug 06, 2018 at 00:33:59 CEST, Michael Kjörling wrote:
> On 5 Aug 2018 23:53 +0200, from mmorfikov@xxxxxxxxx (Mikhail Morfikov):
> > # cryptsetup luksFormat -v -y -c aes-xts-plain64
> > --master-key-file=/tmp/master_key /dev/sdd1
> > 
> > But he was unable to decrypt the data (I know the ext4 superblock is damaged,
> > but the volume can be tested whether it is decrypted or not, and in this case it
> > wasn't).
> > 
> > He said that the original container was created (probably) using this command:
> > 
> > # cryptsetup -v -y -c aes-xts-plain64 -s 512 -h sha512 -i 5000 --use-random
> > luksFormat /dev/sdd1
> > 
> > He ultimately found the header backup and everything went well, but I have a
> > question -- what parameters are needed in order to recreate the header when the
> > master key is known?
> 
> Well, the cipher spec for one would obviously need to match exactly
> for the newly created header to be useful for decrypting the existing
> data. So depending on the defaults, the missing `-s 512` absolutely
> could make a difference.
> 
> My cryptsetup says the default for LUKS1 is aes-xts-plain64 with 256
> bits of key. So if your friend's system is similar to mine, chances
> are good that the missing key length specifier had something to do
> with it. The man page doesn't seem to say anything about what happens
> if the provided master key file has a length different from the key
> length that ends up being used by the selected cipher.
> 
> Keep in mind that with XTS you're effectively running the cipher
> itself in half the key length mode (so if you specify AES-XTS and 256
> bits of key, then the actual key used by AES is a 128 bit one). Thus,
> the difference between specifying 512 bits and 256 bits means running
> AES with a 256 bit key or a 128 bit key, respectively. Specifically
> for AES, this also means running a different number of rounds; IIRC,
> with a 256 bit key, AES uses 14 rounds, whereas with a 128 bit key, it
> uses 10 rounds. So it's effectively a _very_ different cipher if you
> use a different key length.
> 
> Personally, I have written down the exact commands used to create the
> LUKS containers, just in case.
> 
> At least in this case your friend _had_ a header backup.
> 
> -- 
> Michael Kjörling • https://michael.kjorling.se • michael@xxxxxxxxxxx
>   “The most dangerous thought that you can have as a creative person
>               is to think you know what you’re doing.” (Bret Victor)
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> https://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@xxxxxxxxxxx
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux