On Saturday, April 18, 2015 9:35:27 PM Fernando Rodriguez wrote:
> On Saturday, April 18, 2015 12:27:15 PM Marko Weber | 8000 wrote:
> > 
> > hello list,
> > 
> > i try to crypt a partition with cryptsetup.
> > Yes, in Kernel i had all need things i think.
> > 
> > CONFIG_CRYPTO=y
> > CONFIG_CRYPTO_ALGAPI=y
> > CONFIG_CRYPTO_ALGAPI2=y
> > CONFIG_CRYPTO_AEAD=m
> > CONFIG_CRYPTO_AEAD2=y
> > CONFIG_CRYPTO_BLKCIPHER=y
> > CONFIG_CRYPTO_BLKCIPHER2=y
> > CONFIG_CRYPTO_HASH=y
> > CONFIG_CRYPTO_HASH2=y
> > CONFIG_CRYPTO_RNG=m
> > CONFIG_CRYPTO_RNG2=y
> > CONFIG_CRYPTO_PCOMP=m
> > CONFIG_CRYPTO_PCOMP2=y
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_MANAGER2=y
> > CONFIG_CRYPTO_USER=m
> > # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> > CONFIG_CRYPTO_GF128MUL=m
> > CONFIG_CRYPTO_NULL=m
> > CONFIG_CRYPTO_PCRYPT=m
> > CONFIG_CRYPTO_WORKQUEUE=y
> > CONFIG_CRYPTO_CRYPTD=m
> > CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_AUTHENC=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_ABLK_HELPER=m
> > CONFIG_CRYPTO_GLUE_HELPER_X86=m
> > CONFIG_CRYPTO_CCM=m
> > CONFIG_CRYPTO_GCM=m
> > CONFIG_CRYPTO_SEQIV=m
> > CONFIG_CRYPTO_CBC=y
> > CONFIG_CRYPTO_CTR=m
> > CONFIG_CRYPTO_CTS=m
> > CONFIG_CRYPTO_ECB=m
> > CONFIG_CRYPTO_LRW=m
> > CONFIG_CRYPTO_PCBC=m
> > CONFIG_CRYPTO_XTS=m
> > CONFIG_CRYPTO_CMAC=m
> > CONFIG_CRYPTO_HMAC=m
> > CONFIG_CRYPTO_XCBC=m
> > CONFIG_CRYPTO_VMAC=m
> > CONFIG_CRYPTO_CRC32C=y
> > CONFIG_CRYPTO_CRC32C_INTEL=m
> > CONFIG_CRYPTO_CRC32=m
> > CONFIG_CRYPTO_CRC32_PCLMUL=m
> > CONFIG_CRYPTO_CRCT10DIF=y
> > CONFIG_CRYPTO_CRCT10DIF_PCLMUL=m
> > CONFIG_CRYPTO_GHASH=m
> > CONFIG_CRYPTO_MD4=m
> > CONFIG_CRYPTO_MD5=y
> > CONFIG_CRYPTO_MICHAEL_MIC=m
> > CONFIG_CRYPTO_RMD128=m
> > CONFIG_CRYPTO_RMD160=m
> > CONFIG_CRYPTO_RMD256=m
> > CONFIG_CRYPTO_RMD320=m
> > CONFIG_CRYPTO_SHA1=m
> > CONFIG_CRYPTO_SHA1_SSSE3=m
> > CONFIG_CRYPTO_SHA256_SSSE3=m
> > CONFIG_CRYPTO_SHA512_SSSE3=m
> > CONFIG_CRYPTO_SHA1_MB=m
> > CONFIG_CRYPTO_SHA256=m
> > CONFIG_CRYPTO_SHA512=m
> > CONFIG_CRYPTO_TGR192=m
> > CONFIG_CRYPTO_WP512=m
> > CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL=m
> > CONFIG_CRYPTO_AES=y
> > CONFIG_CRYPTO_AES_X86_64=m
> > CONFIG_CRYPTO_AES_NI_INTEL=m
> > CONFIG_CRYPTO_ANUBIS=m
> > CONFIG_CRYPTO_ARC4=m
> > CONFIG_CRYPTO_BLOWFISH=m
> > CONFIG_CRYPTO_BLOWFISH_COMMON=m
> > CONFIG_CRYPTO_BLOWFISH_X86_64=m
> > CONFIG_CRYPTO_CAMELLIA=m
> > CONFIG_CRYPTO_CAMELLIA_X86_64=m
> > CONFIG_CRYPTO_CAMELLIA_AESNI_AVX_X86_64=m
> > CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64=m
> > CONFIG_CRYPTO_CAST_COMMON=m
> > CONFIG_CRYPTO_CAST5=m
> > CONFIG_CRYPTO_CAST5_AVX_X86_64=m
> > CONFIG_CRYPTO_CAST6=m
> > CONFIG_CRYPTO_CAST6_AVX_X86_64=m
> > CONFIG_CRYPTO_DES=m
> > CONFIG_CRYPTO_DES3_EDE_X86_64=m
> > CONFIG_CRYPTO_FCRYPT=m
> > CONFIG_CRYPTO_KHAZAD=m
> > CONFIG_CRYPTO_SALSA20=m
> > CONFIG_CRYPTO_SALSA20_X86_64=m
> > CONFIG_CRYPTO_SEED=m
> > CONFIG_CRYPTO_SERPENT=m
> > CONFIG_CRYPTO_SERPENT_SSE2_X86_64=m
> > CONFIG_CRYPTO_SERPENT_AVX_X86_64=m
> > CONFIG_CRYPTO_SERPENT_AVX2_X86_64=m
> > CONFIG_CRYPTO_TEA=m
> > CONFIG_CRYPTO_TWOFISH=m
> > CONFIG_CRYPTO_TWOFISH_COMMON=m
> > CONFIG_CRYPTO_TWOFISH_X86_64=m
> > CONFIG_CRYPTO_TWOFISH_X86_64_3WAY=m
> > CONFIG_CRYPTO_TWOFISH_AVX_X86_64=m
> > CONFIG_CRYPTO_DEFLATE=m
> > CONFIG_CRYPTO_ZLIB=m
> > CONFIG_CRYPTO_LZO=m
> > CONFIG_CRYPTO_LZ4=m
> > CONFIG_CRYPTO_LZ4HC=m
> > CONFIG_CRYPTO_ANSI_CPRNG=m
> > CONFIG_CRYPTO_DRBG_MENU=m
> > CONFIG_CRYPTO_DRBG_HMAC=y
> > # CONFIG_CRYPTO_DRBG_HASH is not set
> > # CONFIG_CRYPTO_DRBG_CTR is not set
> > CONFIG_CRYPTO_DRBG=m
> > CONFIG_CRYPTO_USER_API=m
> > CONFIG_CRYPTO_USER_API_HASH=m
> > CONFIG_CRYPTO_USER_API_SKCIPHER=m
> > CONFIG_CRYPTO_HASH_INFO=y
> > # CONFIG_CRYPTO_HW is not set
> > 
> > 
> > but when i try to use cryptsetup i get this:
> > 
> > # cryptsetup -c aes-xts:plain64 -y -s 256 luksFormat 
> > /dev/mapper/VolGroup01-media2
> > 
> > WARNING!
> > ========
> > This will overwrite data on /dev/mapper/VolGroup01-media2 irrevocably.
> > 
> > Are you sure? (Type uppercase yes): YES
> > Enter passphrase:
> > Verify passphrase:
> > device-mapper: reload ioctl on  failed: Invalid argument
> > Failed to setup dm-crypt key mapping for device 
> > /dev/mapper/VolGroup01-media2.
> > Check that kernel supports aes-xts:plain64 cipher (check syslog for more 
> > info).
> > 
> > 
> > 
> > Any ideas?
> > 
> > i built cryptsetup with this useflags:
> > 
> > nls openssl python udev urandom
> > 
> > 
> > 
> > cryptsetup --help shows me i am able to use the options
> > 
> > Default compiled-in device cipher parameters:
> >          loop-AES: aes, Key 256 bits
> >          plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: 
> > ripemd160
> >          LUKS1: aes-xts-plain64, Key: 256 bits, LUKS header hashing: 
> > sha1, RNG: /dev/random
> > 
> > 
> > any help / ideas or knowledge welcome.
> > 
> > best regards
> > 
> > marko
> 
> That message is incorrectly shown if something's wrong with the way you 
> specified the cipher and key size. It threw me off for a while too. This is 
what 
> I ended up using:
> 
> cryptsetup -i 30000 -c twofish-xts-essiv:sha256 -s 512 -h sha512 luksFormat 
> file.img
> 
> I don't remember where I was getting it wrong, I think I was using -s 256 
but 
> xts uses half the key for every other block so the key needs to be twice the 
> size. I found a site with a table that list what you can use with which 
> options but unfortunately I can't find it now. So try using -s 512 (since 
> cryptsetup is telling you that you can use a 256 bit key).

btw. it's not telling you that you can use those. It's telling you that those 
are the compiled-in defaults (what it will select for you if you don't specify 
anything). It shows the same for me and I'm not using either.

-- 
Fernando Rodriguez

Reply via email to