Bug#910249: Bumping up encryption to AES-256 by default

2019-03-06 Thread procmem


On 3/5/19 11:49 PM, Jeremy Bicha wrote:
> On Tue, Mar 5, 2019 at 12:35 PM procmem  wrote:
>> I stand corrected its in your version  since you cherry picked the patch.
> Yes. Could you verify whether that version fixes your issue?
>
> Thanks,
> Jeremy Bicha

It does indeed. Thanks.



Bug#910249: Bumping up encryption to AES-256 by default

2019-03-05 Thread procmem
I stand corrected its in your versionĀ  since you cherry picked the patch.



Bug#910249: Bumping up encryption to AES-256 by default

2019-03-05 Thread procmem


On 3/5/19 6:16 AM, Jeremy Bicha wrote:
> I just uploaded libblockdev 2.20-7. Please check if it fixes your issue.
>
> If it does, would you be interested in filing the unblock bug to get
> the fix in to Debian Buster?
>
> https://release.debian.org/buster/freeze_policy.html
>
> Thanks,
> Jeremy Bicha

Thanks a lot for following up on this. I had reported it upstream and am
happy to see they fixed it. Looks like it made it into v 2.21 [0]. I
would very much like to see it in Buster, but I'm clueless about how to
do the unblock request despite reading about it now :(

[0] https://github.com/storaged-project/libblockdev/blob/master/NEWS.rst



Bug#910249: Bumping up encryption to AES-256 by default

2018-10-03 Thread procmem



Jeremy Bicha:
> On Wed, Oct 3, 2018 at 6:36 PM procmem  wrote:
>> Package: gnome-disk-utility
>> Version: all
>> Severity: serious
>>
>> Hi. I noticed Gnome Disks uses AES-128 by default instead of AES-256
>> like Debian does out of the box. Having 256 bit symmetric keys is good
>> practice for long term security especially in a coming era of quantum
>> computers. (Whether they materialize or not is deabatble but why not
>> have a sufficient margin if it's easy enough?) It is also the
>> recommended level by NIST.
> 
> Please report this issue to the GNOME Disks developers:
> https://gitlab.gnome.org/GNOME/gnome-disk-utility/issues
> 
> From what I can tell, Disks uses udisks2 which uses libblockdev. The
> libblockdev default is 256 bits.
> 
> https://github.com/storaged-project/libblockdev/blob/master/src/plugins/crypto.h#L39
> 
> So I'm not sure if the libblockdev default should be changed or if
> that's something that GNOME Disks is supposed to handle itself.
> 
> Thanks,
> Jeremy Bicha
> 

Thanks for pointing me to the code and upstream bugtracker :) I've
opened a ticket on GNOME here:

https://gitlab.gnome.org/GNOME/gnome-disk-utility/issues/103

Feel free to close the ticket here because it's not related to you guys.



Bug#910249: Bumping up encryption to AES-256 by default

2018-10-03 Thread procmem
Package: gnome-disk-utility
Version: all
Severity: serious

Hi. I noticed Gnome Disks uses AES-128 by default instead of AES-256
like Debian does out of the box. Having 256 bit symmetric keys is good
practice for long term security especially in a coming era of quantum
computers. (Whether they materialize or not is deabatble but why not
have a sufficient margin if it's easy enough?) It is also the
recommended level by NIST.


This is verified by running:

# cryptsetup luksDump --debug 

AES in XTS mode uses a keysize double its bit size (512 in this case)
since with XTS the key is split in 2 so you actually get AES with
256-bit keys.

A partition created by Gnome Disks shows it's only using MK size 256
instead of the expected 512. Please modify the source to pass 512 bit
size to cryptsetup.


For more details and original research by me see:

https://www.whonix.org/wiki/Full_Disk_Encryption_and_Encrypted_Images#Protection_Against_Powerful_Adversaries



Bug#908917: corrections

2018-09-24 Thread procmem
Please disregard what I said in the background section of my original
post. I will correct a few factual errors.

Qunatum computing has nothing to do with using Argon2id.

Argon2id promises up to a quadratic increase in mitgating GPUs vs the
linear protection of PBKDF2-HMAC-SHA*. PBKDF2-HMAC-SHA* is not "totally
useless" as stated earler, but rather less effective against GPU
parallelization.



Bug#908917: (no subject)

2018-09-16 Thread procmem
Good to see you guys here. Debian packaging is in good hands. Thanks for
explaining the roadmap and for the support on the dm-crypt ML.

@Milan Broz
Apologies. I am not an expert by any means and did not know all the
implications of the command posted. So are you saying that using forced
iterations for my purposes is OK? Is 50 a recommended value or just an
example placeholder?



Bug#908917: cryptsetup: argon2id as default PBKDF setting for new installs - Buster+

2018-09-15 Thread procmem
Package: cryptsetup
Version: 2:2.0.4-2
Severity: important


Dear Maintainer,

As part of my work on a downstream privacy distro I asked the cryptsetup
team on how to transition current LUKS1 systems to use the improved
argon2id algo for the PBKDF implementation when using LUKS2.

Background:
While quantum computing does not have any advantage in speeding up
bruteforcing of PBKDF hashes they have a direct impact on passphrase
length. Using a 20 word diceware passphrase will be needed for
post-quantum passphase entropy of 256 bits. This is excessive and very
difficult for most users to manage hence the importance of PBKDF for
anti-bruteforcing.

The current sha256 PBKDF used in LUKS1 is trivial to parallelize by
adversaries who have large GPU computational power, making it  a useless
countermeasure and leading users to rely on passphrase lenth for only
protection.



***

It would be great if all newly installed systems running Buster and
beyond used LUKS2 and argon2id out of the box instead of having users
optionally opt for a safer configuration.

The recommended config paramters by Milan Broz:

  # cryptsetup luksConvertKey --key-slot 1 --pbkdf argon2id
--pbkdf-force-iterations 50 --pbkdf-memory 1048576 --pbkdf-parallel 4



Original full reply:
[0] https://www.saout.de/pipermail/dm-crypt/2018-September/005968.html


Thanks



Bug#902237: Feature Request: Package plugin installer separately

2018-06-24 Thread procmem



W. Martin Borgert:
> On 2018-06-23 17:21, procmem wrote:
>> Package: gajim
>> Version: all
>> Severity: serious
>>
>> Please consider packaging the plugin installer separately (to make its
>> install optional) as it prompts users to update and install additional
>> code from untrusted sources which violates Debian's package security
>> assumptions.
>>
>> (/usr/share/gajim/plugins/plugin_installer/)
> 
> This is already done since some time. gajim-plugininstaller is
> a separate package and not even suggested by the package gajim.
> 
> Please try an up-to-date version of Gajim, e.g. 1.0.3-1 (Debian
> unstable and testing) or 1.0.3-1~bpo9+1 (Debian stable with
> official backports enabled).
> 

Thanks. I just realized this after opening the report.



Bug#902237: Feature Request: Package plugin installer separately

2018-06-23 Thread procmem
Package: gajim
Version: all
Severity: serious

Please consider packaging the plugin installer separately (to make its
install optional) as it prompts users to update and install additional
code from untrusted sources which violates Debian's package security
assumptions.

(/usr/share/gajim/plugins/plugin_installer/)