- Original Message -
From: "Moritz Muehlenhoff"
To:
Sent: Wednesday, February 25, 2009 9:31 PM
Subject: [SECURITY] [DSA 1726-1] New python-crypto packages fix denial of
service
-BEGIN PGP SIGNED MESSAGE-
On 6/9/05, Bernd Eckenfels <[EMAIL PROTECTED]> wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> > losetup -e aes-256 /dev/loop0 /dev/hda10
>
> What do you have defined in modules?
>
> alias cipher-16 rijndael
>
> You also need the cryptoloop module in order to name ciphers by name. T
In article <[EMAIL PROTECTED]> you wrote:
> losetup -e aes-256 /dev/loop0 /dev/hda10
What do you have defined in modules?
alias cipher-16 rijndael
You also need the cryptoloop module in order to name ciphers by name. Try -E
16 instead.
Greetings
Bernd
--
To UNSUBSCRIBE, email to [EMA
On Mon, 06 Jun 2005 at 06:40:36AM -0400, nuno romano wrote:
> I got the following warning trying to create a
> crypto file system in hda10 partition of my
> hard disk: I did ->
>
> losetup -e aes-256 /dev/loop0 /dev/hda10
> loop: loaded (max 8 devices)
> Pa
* nuno romano <[EMAIL PROTECTED]>:
> losetup -e aes-256 /dev/loop0 /dev/hda10
> loop: loaded (max 8 devices)
> Password:
> ioctl: LOOP_SET_STATUS: Invalid argument
Did you check that the corresponding crypto module was correctly loaded?
Do you have the same problems
I got the following warning trying to create a
crypto file system in hda10 partition of my
hard disk: I did ->
losetup -e aes-256 /dev/loop0 /dev/hda10
loop: loaded (max 8 devices)
Password:
ioctl: LOOP_SET_STATUS: Invalid argument
I have a PowerPC kernel 2.6.8,util-linux 2.12,
On Tue, Jan 20, 2004 at 10:53:10PM -0800, Johannes Graumann wrote:
> Is the encryptionloop significantly slower than
> diskwrite/read speed?
No, but it uses CPU, and disk I/O doesn't (when using dma: with IDE, use
hdparm -v /dev/hda to check. With SCSI, well, you bought it so you
wouldn't have
On Tue, Jan 20, 2004 at 10:53:10PM -0800, Johannes Graumann wrote:
> Is the encryptionloop significantly slower than
> diskwrite/read speed?
No, but it uses CPU, and disk I/O doesn't (when using dma: with IDE, use
hdparm -v /dev/hda to check. With SCSI, well, you bought it so you
wouldn't have
Hello,
Following loosely this document:
http://www.sdc.org/~leila/usb-dongle/readme.html
I have set up (or tried) to encrypt my swap partition (/dev/hda2).
Here is what I did:
* create /usr/local/sbin/crypto-swap (modified!)
#!/bin/sh
# Run this script somewhere in your startup scripts _after_
Hello,
Following loosely this document:
http://www.sdc.org/~leila/usb-dongle/readme.html
I have set up (or tried) to encrypt my swap partition (/dev/hda2).
Here is what I did:
* create /usr/local/sbin/crypto-swap (modified!)
#!/bin/sh
# Run this script somewhere in your startup scripts _after_
Dale Amon wrote:
You should probably go over to linux-crypto. If it's loop-aes, ask Jaari;
otherwise one of the others might.
yes, i've done so and Jari was as helpful as you said :-)
Thanks,
Christian.
--
BOFH excuse #413:
Cow-tippers tipped a cow onto the server.
Dale Amon wrote:
You should probably go over to linux-crypto. If it's loop-aes, ask Jaari;
otherwise one of the others might.
yes, i've done so and Jari was as helpful as you said :-)
Thanks,
Christian.
--
BOFH excuse #413:
Cow-tippers tipped a cow onto the server.
--
To UNSUBSCRIBE
On Fri, Jun 27, 2003 at 03:58:14AM +0200, Christian Kujau wrote:
> hi,
>
> recently i set up a crypted filesystem and use it already successfully.
> 'cause i'm lazy, i've always used the option "-p" when initializing the
> loop-device via losetup:
You sho
On Fri, Jun 27, 2003 at 03:58:14AM +0200, Christian Kujau wrote:
> hi,
>
> recently i set up a crypted filesystem and use it already successfully.
> 'cause i'm lazy, i've always used the option "-p" when initializing the
> loop-device via losetup:
You sho
hi,
recently i set up a crypted filesystem and use it already successfully.
'cause i'm lazy, i've always used the option "-p" when initializing the
loop-device via losetup:
losetup -k 128 -p 12 -e serpent /dev/loop6 /dev/sdb2
that way, i don't have to type in the passphrase manually (instead,
hi,
recently i set up a crypted filesystem and use it already successfully.
'cause i'm lazy, i've always used the option "-p" when initializing the
loop-device via losetup:
losetup -k 128 -p 12 -e serpent /dev/loop6 /dev/sdb2
that way, i don't have to type in the passphrase manually (instead, t
>
> > I've tried this on kernels 2.4.15 and 2.4.17, it's all the same
> > (although the 2.4.17 Changelog says about a number of bug-fixes in the
> > loop-back driver).
> >
> > I was wondering if you could tell me about any known or unknown problems
> >
On Mon, Jan 07, 2002 at 07:59:35AM -0500, Anthony DeRobertis wrote:
>
> On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
>
> >There are about 3304 proceses with sequential PIDs and names of
> >"[loop7 ]", and are all zombies.
>
> Are you calling fork in your code? Are you calling
.
> > The brute-forcer works fine for short periods of time.
> >
> > I've tried this on kernels 2.4.15 and 2.4.17, it's all the same
> > (although the 2.4.17 Changelog says about a number of bug-fixes in the
> > loop-back driver).
> >
> > I was wond
>
> > I've tried this on kernels 2.4.15 and 2.4.17, it's all the same
> > (although the 2.4.17 Changelog says about a number of bug-fixes in the
> > loop-back driver).
> >
> > I was wondering if you could tell me about any known or unknown problems
> >
On Mon, Jan 07, 2002 at 07:59:35AM -0500, Anthony DeRobertis wrote:
>
> On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
>
> >There are about 3304 proceses with sequential PIDs and names of
> >"[loop7 ]", and are all zombies.
>
> Are you calling fork in your code? Are you calling
.
> > The brute-forcer works fine for short periods of time.
> >
> > I've tried this on kernels 2.4.15 and 2.4.17, it's all the same
> > (although the 2.4.17 Changelog says about a number of bug-fixes in the
> > loop-back driver).
> >
> > I was wond
angelog says about a number of bug-fixes in the
> loop-back driver).
>
> I was wondering if you could tell me about any known or unknown problems
> with the kernel crypto, or help me realise my stupidity.
>
there are only 8 loop devicesdo you know this?
Another thing (which
angelog says about a number of bug-fixes in the
> loop-back driver).
>
> I was wondering if you could tell me about any known or unknown problems
> with the kernel crypto, or help me realise my stupidity.
>
there are only 8 loop devicesdo you know this?
Another thing (which
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
There are about 3304 proceses with sequential PIDs and names of
"[loop7 ]", and are all zombies.
Are you calling fork in your code? Are you calling waitpid or friends?
Who's children are those? (try ps fxa)
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote:
> There are about 3304 proceses with sequential PIDs and names of
> "[loop7 ]", and are all zombies.
Are you calling fork in your code? Are you calling waitpid or friends?
Who's children are those? (try ps fxa)
--
To UNSUBSCRIB
out a number of bug-fixes in the
> loop-back driver).
>
> I was wonder
> ing if you could tell me about any known or unknown problems
> with the kernel crypto, or help me realise my stupidity.
>
> Comment: Sorry if this is too off-topic, I could post it to the Linux
> kerne
tried this on kernels 2.4.15 and 2.4.17, it's all the same
(although the 2.4.17 Changelog says about a number of bug-fixes in the
loop-back driver).
I was wondering if you could tell me about any known or unknown problems
with the kernel crypto, or help me realise my stupidity.
Comment: Sorry
out a number of bug-fixes in the
> loop-back driver).
>
> I was wonder
> ing if you could tell me about any known or unknown problems
> with the kernel crypto, or help me realise my stupidity.
>
> Comment: Sorry if this is too off-topic, I could post it to the Linux
> kerne
tried this on kernels 2.4.15 and 2.4.17, it's all the same
(although the 2.4.17 Changelog says about a number of bug-fixes in the
loop-back driver).
I was wondering if you could tell me about any known or unknown problems
with the kernel crypto, or help me realise my stupidity.
Comment: Sorry
ook at http://www.kerneli.org
The patches at kerneli have known problems (and haven't been updated for
a while). There's been quite a lot of discussion about this on the
linux-crypto list (archived at http://mail.nl.linux.org/linux-crypto/).
I would suggest using the LoopAES package
gt; Take a look at http://www.kerneli.org
The patches at kerneli have known problems (and haven't been updated for
a while). There's been quite a lot of discussion about this on the
linux-crypto list (archived at http://mail.nl.linux.org/linux-crypto/).
I would suggest using the LoopAES pack
John DOE <[EMAIL PROTECTED]> writes:
> Hello everybody,
> I want to have some information about what kind of cryptological benefits
> does my linux server offer to me . I searched linuxdoc.org but could not find
> a howo about linux cryptology. Could you please guide me to a web site or to
> a
John DOE <[EMAIL PROTECTED]> wrote:
> Hello everybody,
> I want to have some information about what kind of cryptological
> benefits does my linux server offer to me . I searched
> linuxdoc.org but could not find a howo about linux cryptology.
> Could you please guide me to a web site
Hello everybody,
I want to have some information about what kind of cryptological benefits does
my linux server offer to me . I searched linuxdoc.org but could not find a howo
about linux cryptology. Could you please guide me to a web site or to a
documentation site where I can start from the no
John DOE <[EMAIL PROTECTED]> writes:
> Hello everybody,
> I want to have some information about what kind of cryptological benefits does my
>linux server offer to me . I searched linuxdoc.org but could not find a howo about
>linux cryptology. Could you please guide me to a web site or to a docu
John DOE <[EMAIL PROTECTED]> wrote:
> Hello everybody,
> I want to have some information about what kind of cryptological
> benefits does my linux server offer to me . I searched
> linuxdoc.org but could not find a howo about linux cryptology.
> Could you please guide me to a web site
Hello everybody,
I want to have some information about what kind of cryptological benefits does my
linux server offer to me . I searched linuxdoc.org but could not find a howo about
linux cryptology. Could you please guide me to a web site or to a documentation site
where I can start from the n
On Mon, 6 Nov 2000, Mike Furr wrote:
> I've been using the loopback crypto stuff for a while and I'm looking
> for a secure way of doing this from my user account instead of having to
> su to call losetup.
> Does anyone have suggestions / experience with doing this?
Add an
On Mon, 6 Nov 2000, Mike Furr wrote:
> I've been using the loopback crypto stuff for a while and I'm looking
> for a secure way of doing this from my user account instead of having to
> su to call losetup.
> Does anyone have suggestions / experience with doing this?
Add an
hi all,
I've been using the loopback crypto stuff for a while and I'm looking
for a secure way of doing this from my user account instead of having to
su to call losetup.
Does anyone have suggestions / experience with doing this?
I see that you can't just run /sbin/losetu
hi all,
I've been using the loopback crypto stuff for a while and I'm looking
for a secure way of doing this from my user account instead of having to
su to call losetup.
Does anyone have suggestions / experience with doing this?
I see that you can't just run /sbin/losetu
42 matches
Mail list logo