[Bug 244480] Re: support AES-XTS mode

2012-08-16 Thread Bug Watch Updater
** Changed in: partman-crypto (Debian) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/244480 Title: support AES-XTS mode To manage notifications about this bug go

[Bug 244480] Re: support AES-XTS mode

2012-08-16 Thread Dmitrijs Ledkovs
-54 from Debian has been merged into -54ubuntu1 and released in quantal. ** Changed in: partman-crypto (Ubuntu) Status: Triaged = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 244480] Re: support AES-XTS mode

2011-05-11 Thread Marek Janda
Obviously, fixing this fully requires significant changes to installer, but what about at least including those two modules on alternative installation CD? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 244480] Re: support AES-XTS mode

2010-09-05 Thread David Santamaría Rogado
Don't know why you mention the random all before as is irrelevant for this issue, entire partition should be random filled with all cipher blocks. No, is not a XTS unique problem but is not a problem of using AES, the problem is in all XOR-Encryption(XE)-based tweakable block cipher like XTS. I

[Bug 244480] Re: support AES-XTS mode

2010-09-04 Thread Mårten Thornberg
Well, the paper also says that: Use of a single cryptographic key for more than a few hundred terabytes of data opens possibility of attacks, as described in D.4.3. The limitation on the size of data encrypted with a single key is not unique to this standard. It comes directly from the fact that

[Bug 244480] Re: support AES-XTS mode

2010-07-14 Thread David Santamaría Rogado
There is a comment in wikipedia's discussion about this: http://en.wikipedia.org/wiki/Talk:Disk_encryption_theory#Issues_with_XTS Issues with XTS There is also an issue about the size of the filesystem encrypted with the support of XTS. This is discussed here:

[Bug 244480] Re: support AES-XTS mode

2009-01-27 Thread Colin Watson
It may be worth noting the comment in http://bugs.debian.org/cgi- bin/bugreport.cgi?bug=494584 to the effect that XTS' security guarantees deteriorate over 1TB, so the installer would need to have a warning about this. ** Changed in: partman-crypto (Ubuntu) Importance: Undecided = Wishlist

Re: [Bug 244480] Re: support AES-XTS mode

2009-01-27 Thread jasonwc
Isn't 1 TB an overly conservative estimate? The probability of a successful attack on 1 PB of data is only eight in a trillion. See http://en.wikipedia.org/wiki/XTS#XTS. Truecrypt sets its maximum volume size at 1 PB for this reason. On 1/27/2009 8:37 PM, Colin Watson wrote: It may be worth

[Bug 244480] Re: support AES-XTS mode

2009-01-27 Thread Colin Watson
I'd have thought that depended rather a lot on the cost of the attack, and, since we can usually expect attacks to get faster over time, it's often worth being conservative in advance. In any case, I was only talking about a warning over 1TB, not a hard maximum size of 1TB (which I agree would be

Re: [Bug 244480] Re: support AES-XTS mode

2009-01-27 Thread Marc Bevand
AFAIK the OpenBSD devs who implemented XTS are even more conservative and display a warning for volume sizes over 500GB. -marc -- support AES-XTS mode https://bugs.launchpad.net/bugs/244480 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 244480] Re: support AES-XTS mode

2009-01-02 Thread jasonwc
Note that following installation you'll need to use a live CD to modify /etc/crypttab, /etc/fstab, load the necessary modules and rebuild initrd. It may be easier to just follow this howto if you want LVM+LUKS (https://help.ubuntu.com/community/EncryptedFilesystemLVMHowto). I can confirm that this

[Bug 244480] Re: support AES-XTS mode

2008-12-31 Thread jasonwc
Nevermind, I figured out how to create an LUKS+LVM encrypted Ubuntu install using the https://help.ubuntu.com/community/EncryptedFilesystemLVMHowto instructions. The last step must be slightly modified, and a few more steps are necessary to create the LVM. Instead of cryptsetup luksOpen

[Bug 244480] Re: support AES-XTS mode

2008-12-30 Thread jasonwc
Marc, Your instructions don't appear to work when using LVM as the installer fails to format the LVM volumes. Any idea how to modify your instructions to create an LUKS+LVM encrypted partition so that I can have separate /home, /, and swap? Jason -- support AES-XTS mode

[Bug 244480] Re: support AES-XTS mode

2008-12-29 Thread jasonwc
Thank you for the guide. I was just in the process of installing Ubuntu 8.10 on my laptop via the alternative CD when I realized that XTS wasn't supported. I will be following your instructions to encrypt my system with AES-XTS. -- support AES-XTS mode https://bugs.launchpad.net/bugs/244480 You

[Bug 244480] Re: support AES-XTS mode

2008-10-19 Thread Niklas Hagman
Thanks for the guide. It worked for me. I also want AES-XTS to be supported. Its the next thing in AES encryption. Enable it in the kernel! ** Changed in: partman-crypto (Ubuntu) Status: New = Confirmed -- support AES-XTS mode https://bugs.launchpad.net/bugs/244480 You received this

[Bug 244480] Re: support AES-XTS mode

2008-08-27 Thread Marc Bevand
To give a little bit of background, AES-XTS is a cipher mode that has been recently standardized by the IEEE P1619 working group. It is thought to be currently the most secure narrow-block cipher mode designed for disk encryption. It is possible to install Ubuntu 8.04 on an AES-XTS-encrypted root

[Bug 244480] Re: support AES-XTS mode

2008-07-01 Thread Bug Watch Updater
** Changed in: partman-crypto (Debian) Status: Unknown = New -- support AES-XTS mode https://bugs.launchpad.net/bugs/244480 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com