On Thu, Oct 17, 2013 at 07:50:43AM +0200, frantisek holop wrote:
> hi there,
> 
> if i have a usb key, that is softraid encrypted,
> it has 2 DUID's. the first one (before bioctl)
> can be used to script bioctl when the key is inserted.
> when the SR CRYPTO drive is attached, it has another
> DUID.  this can be used for mounting/unmounting.
> 
> my question is, is that a security threat to have this
> 2nd DUID in /etc/fstab?  could it be used as "cleartext"
> for brute forcing the SR CRYPTO drive?

There are many other known plaintext bits in a filesystem, starting with
the FFS magic marker. I don't think DUID matters at all in this context.
Now whether it's possible to mount a known plaintext attack on AES-XTS,
I leave that to the cryptographers.

> 
> i also noticed that bioctl -c C -l accepts DUID's,
> but bioctl -d does not.  it this by design?

I would love a fix for this...

> 
> -f
> -- 
> i'm weird, but i'm saving up to be eccentric.

Reply via email to