Re: SSD encryption using cryptsetup

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/10/2020 05:06, KRISHNAJA MENON wrote:
Setup details:
Machine 1: Ubuntu x86_64
Machine 2: Linux-aarch64 (arm)

1. luksFormat an external SDD on x86 using *aes-cbc-plain:ripemd160* on x86 machine

This cipher specification is nonsense, plain IV does not take arguments and it will
be rejected by a recent kernels.
(Moreover, CBC with plain IV mode is insecure due to predictable IV.)

Please *do* *not* change defaults if you do not understand security impact.
If you want CBC mode (XTS mode is default for LUKS), use aes-cbc-essiv:sha256

(It should fail even in luksFormat, but you did not send neither debug output nor version related...)

Milan
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux