How does having it zeroed rather than randomized make it easier for an
attacker to find the encryption key? Let's keep in mind this is "just"
swap, too: if I'm not mistaken the key is different every boot.

Marc Deslauriers already put this Wishlist, and I've asked some input
from the Ubuntu Security Team about this; but I think Wishlist is
correct for now, so we'll keep this as a nice to have for the next
ubiquity upload (soonish anyway, really), unless I get some information
to point to this being a major issue to address right now.

** Changed in: ubiquity (Ubuntu)
     Assignee: (unassigned) => Mathieu Trudel-Lapierre (mathieu-tl)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1506995

Title:
  Ubiquity facilitate attack on crypto LUKS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1506995/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to