Alexander Skwar wrote:

Pupeno schrieb:
On Wednesday 27 July 2005 20:54, Luigi Pinna wrote:

I use the dm-crypt from the kernel....
I've read that it is unsecure

Where? And how is it insecure?

Some history:

The original crypto-loop from 2.4 is very susceptible to watermark attacks, where the attacker can write known data to the disk, and look at the encrypted results, and then calculate the key from the two. Actually, the attacker doesn't even need to write data to the disk if he can make a good guess at what a particular block already contains, such as with filesystem superblocks.

Dm-crypt has some protection against this by using the sector number of the disk as a IV (initial vector) for the hash. This makes the attack more difficult, but not impossible, because the sector number is very predictable.

loop-AES can provide much more secure protection against watermark attacks in 'multi-key mode' by using a set of 64 keys that are rotated for the encryption. So an attacker must crack 64 keys, instead of just 1.

So dm-crypt today provides the same level of security as loop-AES in single key mode, which as I already stated in a previous email, should be sufficient for most people. However, you did ask how it was insecure! :-)

-Richard

--
gentoo-user@gentoo.org mailing list

Reply via email to