To give a little bit of background, AES-XTS is a cipher mode that has been recently standardized by the IEEE P1619 working group. It is thought to be currently the most secure narrow-block cipher mode designed for disk encryption.
It is possible to install Ubuntu 8.04 on an AES-XTS-encrypted root partition. Here are the steps to do it. Before starting the installation, obtain the kernel modules gf128mul.ko and xts.ko matching the installer's kernel version. They can be found in the kernel package which, depending on the architecture, can be downloaded from: http://packages.ubuntu.com/hardy/amd64/linux-image-2.6.24-16-generic/download http://packages.ubuntu.com/hardy/i386/linux-image-2.6.24-16-generic/download Extract the .deb package under a temporary directory and locate the modules: $ dpkg -x $NAME_OF_THE_DEB_PACKAGE tmpdir $ find tmpdir -name gf128mul.ko -o -name xts.ko Copy the 2 modules somewhere, on a USB drive, or on a machine that will be accessible via the network during the Ubuntu installation. Now proceed with the installation itself: o Boot using the alternate ISO image (ubuntu-8.04-alternate-$ARCH.iso). o When asked about the partitioning options, choose to create them manually. o Define an *unencrypted* /boot partition (necessary so the system can at least boot) o Define a partition to use as a "physical volume for encryption" (this will be the root partition). You can keep the default encryption params (aes-cbc-essiv:sha256), they will be changed later. Select "Done setting up the partition". o Select "Configure encrypted volumes". o Select "Write the changes to disk and configure encrypted volumes". o When asked about an encryption passphrase choose anything, it will be changed later. o When back at the main "partition disks" screen, press ctrl-alt-f2 to switch to the 2nd console. o Now get your hands on the files gf128mul.ko and xts.ko that you put aside earlier. If they are on a USB drive, mount it, copy them to /tmp, and unmount the key. If they are located on a remote machine, use netcat. From the remote machine's console, run: $ nc -q 0 -l -p 1234 < gf128mul.ko This command listens on port 1234/tcp and serves the file to the first client that will establish a connection. Now on the machine running the Ubuntu installer, run (replace x.x.x.x with the IP of the remote machine): $ nc x.x.x.x 1234 > /tmp/gf128mul.ko Repeat the same steps to transfer xts.ko. o Now load the modules in this order: $ insmod /tmp/gf128mul.ko $ insmod /tmp/xts.ko o Remove the dm-crypt device created by the installer earlier and recreate it using AES-XTS. Example assuming /dev/sda5: $ dmsetup ls sda5_crypt (254, 0) $ cryptsetup remove sda5_crypt $ cryptsetup luksFormat -c aes-xts-plain -s 512 /dev/sda5 $ cryptsetup luksOpen /dev/sda5 sda5_crypt (When using aes-xts-plain, you have to use either -s 256 or -s 512, to create respectively the two 128-bit or two 256-bit AES keys required by the XTS-PLAIN mode). o Then press ctrl-alt-f1 to go back to the installer screen. Select the encrypted volume. Select a file system and select the mount point "/". o Select "Finish partitioning and write changes to disk". o Proceed with the usual installation steps. VoilĂ ! -marc -- support AES-XTS mode https://bugs.launchpad.net/bugs/244480 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs