Ludwig Nussel writes:
Jochen Hayek wrote:
I have a few disks with fstab entries like this one:
noauto,nocheck,acl,user_xattr,loop=/dev/loop0,encryption=twofish256,phash=sha512,itercountk=100
I would like to mount them under 10.3Alpha3 resp. SUSE Factory.
cryptsetup's manual page says
COMPATABILITY WITH OLD SUSE TWOFISH PARTITIONS
To read images created with SuSE Linux 9.2's loop_fish2
use --cipher twofish-cbc-null -s 256 -h sha512,
for images created with even older SuSE Linux
use --cipher twofish-cbc-null -s 192 -h ripemd160:20
but if twofish-cbc-null is not listed in /proc/crypto ,
there is no way getting this working, right?
LN That's not the problem.
LN The fstab line means you use losetup to set up an encrypted loop device.
Understood. In all modesty: I think, I knew that before. But that's not
important.
LN When migrating util-linux to util-linux-ng the loop-AES patch got
dropped.
Did anybody at SUSE consider the consequences of that for enterprise users?
But maybe I was the only one making use of that.
LN The itercountk option was part of that patch.
LN As quick workaround to be able to access your data
LN you can install util-linux (or just mount/losetup) from 10.2.
LN The plan is to not reintroduce the loop-AES patch
LN (yast never offered to use any of it's options right?)
You are most probably right in that yast did not explicitly offer those options,
but it *did* generate fstab (resp. crypttab ?!?) entries making use of that.
That's how I got to such encryption schemes.
That was a couple of years ago ...
I did not suspect then, that wasn't a good idea.
If I had had the vague idea then,
that I depended on a pretty off-road patch resp. encryption scheme,
that SUSE would drop one day around 2007 ...
Excuse me, but is LUKS also such a quite off-road patch,
that I should better not make myself dependent on?!?
You (SUSE!) are really shaking my confidence.
No offense taken, pls!!
LN and also to get rid of the loop_fish2 kernel module for 10.3 though.
Shall I just forget twofish256 and migrate all my encrypted disks?
LN If that's an option four you
LN it certainly makes sense to use a more secure on-disk format.
LN 10.3 should still be able to read old images though.
LN Therefore cryptsetup/dm-crypt do suppport the loop_fish2 format
(twofish-cbc-null) in factory already.
LN What's missing atm is the ability to generate keys compatible with the
loop-AES patch.
You mean, the ability to cope with such encryption schemes,
is that identical to generating such keys?!?
LN Please file a bug and assign it to me,
I am not sure, we will really end there, but ... maybe.
(I personally, I am already migrating my encrypted disks ...)
Under http://en.opensuse.org/Submitting_Bug_Reports
I can find a list of How to ... -- which one applies?
LN I'll consider implementing replacements for itercountk and pseed
options in cryptsetup.
LN cu
LN Ludwig
J.
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]