Re: LUKS2 support for null/plaintext target

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Dec 14, 2019 at 05:28:31 CET, Robert Nichols wrote:
> On 12/13/19 8:59 AM, Milan Broz wrote:
> >Hi,
> >
> >On 07/12/2019 00:10, Chris Murphy wrote:
> >>I'm wondering if it's possible, or LUKS2 could be extended, to support
> >>an non-encrypted target. That is, the virtual device and backing
> >>device would contain the same information.
> >
> >(You are not the first one asking for support for this option.)
> >
> >In fact, the support is already there. But I am reluctant to officially
> >support it for a very long time, because it would be super confusing
> >for users (We have LUKS, but actually no encryption?!)
> 
> How about using real encryption but use /dev/null as the key-file?
> (Just a thought.)

I can see some nice failure modes with that, e.g. with accidentally
empty key files. 

I am also not sure what the use-case of the whole thing is
besides benchmarking and debugging as Milan said.

If you want to put evertyhing in place, but do not encrypt (yet) 
so you can just encrypt data in place later, this may be the wrong 
approach. I reccomend (and I think that is in the FAQ) to do a 
backup, wipe the data and make a LUKS container and then to restore 
that backup. Doing this without backup is dangerous anyways.

I think this may not have a good solution and we should default to
"secure" here. There are far too many security issues today that
come from people having selected "convenient" instead. Having some
way to do this that is not too convenient or obvious is fine.

Regards,
Arno

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@xxxxxxxxxxx
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux