Hello.

I had a peculiar experience with a password (forgot it). It is the
password for an AES-encrypted partition on my HDD. I am using the loop
device and the international kernel patch. I wrote a brute-forcer
(didn't find docs and stole a lot of code from mount and losetup).

The problem is that when I leave the brute-forcer working for a longer
time (about 5 seconds on my 750 MHz Duron) when I press Ctrl-C (the
brute-forcer catches the signal and tries to save the session) the
kernel seems to deadlock. It is most probably the loop device driver.
There are about 3304 proceses with sequential PIDs and names of
"[loop7 <defunct>]", and are all zombies. If I try to start an app. as
root I get something like "fork: resource temporarily unavailable", or
"INIT: cannot fork; retrying...". Also, I can't `losetup /dev/loop7`,
since it pauses, issuing nothing. As a normal user I seem to be able to
work as usual. After a short period of time `init` seems to start
functioning and switch the run-level. The brute-forcer works as follows:
        1. Generate billions of passwords.
        For each of them:
                1. Setup a loop device.
                2. Read the block after the 1024-th byte and check it
                for Ext2/Ext3's magic ID.
                If the ID matches:
                        1. Print the password.
                3. Deconfigure the loop device.
The brute-forcer works fine for short periods of time.

I've tried this on kernels 2.4.15 and 2.4.17, it's all the same
(although the 2.4.17 Changelog says about a number of bug-fixes in the
loop-back driver).

I was wondering if you could tell me about any known or unknown problems
with the kernel crypto, or help me realise my stupidity.

Comment: Sorry if this is too off-topic, I could post it to the Linux
kernel mailing list if you prefer.

-- 
Pav


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to