LUKS keys are not randomly generated during boot; they are fixed at LUKS
creation time.  As time passes, more and more of the swap space will be
filled with randomish data, reducing the surface area of this attack,
but at least after a fresh install, if you can assume that all or most
of swap is filled with zeros in the plain text, then it makes
crptanalysis of the cihphertext to obtain the key easier.  It still
isn't easy, but it is at least easier than it would be if we did *not*
zero the swap device.  Since it makes crtyptanalysis easier, and also is
a waste of time, we should at least simply not zero the swap device and
leave its contents as is.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1506995

Title:
  Ubiquity facilitate attack on crypto LUKS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1506995/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to