Re: [opensuse-factory] cryptsetup, some old, big and fat disks with encryption=twofish256, ...

2007-05-02 Thread Ludwig Nussel
Jochen Hayek wrote:
 I have a few disks with fstab entries like this one:
 
 
 noauto,nocheck,acl,user_xattr,loop=/dev/loop0,encryption=twofish256,phash=sha512,itercountk=100
 
 I would like to mount them under 10.3Alpha3 resp. SUSE Factory.
 
 cryptsetup's manual page says 
 
 COMPATABILITY WITH OLD SUSE TWOFISH PARTITIONS 
 
To read images created with SuSE Linux 9.2's loop_fish2 
 
use --cipher twofish-cbc-null -s 256 -h sha512,
 
for images created with even older SuSE Linux
 
use --cipher twofish-cbc-null -s 192 -h ripemd160:20
 
 but if twofish-cbc-null is not listed in /proc/crypto ,
 there is no way getting this working, right?

That's not the problem. The fstab line means you use losetup to set
up an encrypted loop device. When migrating util-linux to
util-linux-ng the loop-AES patch got dropped. The itercountk option
was part of that patch. As quick workaround to be able to access
your data you can install util-linux (or just mount/losetup) from
10.2. The plan is to not reintroduce the loop-AES patch (yast never
offered to use any of it's options right?) and also to get rid of
the loop_fish2 kernel module for 10.3 though.

 Shall I just forget twofish256 and migrate all my encrypted disks?

If that's an option four you it certainly makes sense to use a more
secure on-disk format. 10.3 should still be able to read old images
though. Therefore cryptsetup/dm-crypt do suppport the loop_fish2
format (twofish-cbc-null) in factory already. What's missing atm is
the ability to generate keys compatible with the loop-AES patch.
Please file a bug and assign it to me, I'll consider implementing
replacements for itercountk and pseed options in cryptsetup.

cu
Ludwig

-- 
 (o_   Ludwig Nussel
 //\   SUSE Labs
 V_/_  http://www.suse.de/
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [opensuse-factory] cryptsetup, some old, big and fat disks with encryption=twofish256, ...

2007-05-02 Thread Jochen Hayek
 Ludwig Nussel writes:

 Jochen Hayek wrote:

 I have a few disks with fstab entries like this one:
 
 
noauto,nocheck,acl,user_xattr,loop=/dev/loop0,encryption=twofish256,phash=sha512,itercountk=100
 
 I would like to mount them under 10.3Alpha3 resp. SUSE Factory.
 
 cryptsetup's manual page says 
 
 COMPATABILITY WITH OLD SUSE TWOFISH PARTITIONS 
 
 To read images created with SuSE Linux 9.2's loop_fish2 
 
 use --cipher twofish-cbc-null -s 256 -h sha512,
 
 for images created with even older SuSE Linux
 
 use --cipher twofish-cbc-null -s 192 -h ripemd160:20
 
 but if twofish-cbc-null is not listed in /proc/crypto ,
 there is no way getting this working, right?

LN That's not the problem. 
LN The fstab line means you use losetup to set up an encrypted loop device.

Understood. In all modesty: I think, I knew that before. But that's not 
important.

LN When migrating util-linux to util-linux-ng the loop-AES patch got 
dropped.

Did anybody at SUSE consider the consequences of that for enterprise users?

But maybe I was the only one making use of that.

LN The itercountk option was part of that patch.

LN As quick workaround to be able to access your data
LN you can install util-linux (or just mount/losetup) from 10.2.

LN The plan is to not reintroduce the loop-AES patch
LN (yast never offered to use any of it's options right?)

You are most probably right in that yast did not explicitly offer those options,
but it *did* generate fstab (resp. crypttab ?!?) entries making use of that.
That's how I got to such encryption schemes.
That was a couple of years ago ...

I did not suspect then, that wasn't a good idea.

If I had had the vague idea then, 
that I depended on a pretty off-road patch resp. encryption scheme,
that SUSE would drop one day around 2007 ...

Excuse me, but is LUKS also such a quite off-road patch,
that I should better not make myself dependent on?!?

You (SUSE!) are really shaking my confidence.

No offense taken, pls!!

LN and also to get rid of the loop_fish2 kernel module for 10.3 though.

 Shall I just forget twofish256 and migrate all my encrypted disks?

LN If that's an option four you 
LN it certainly makes sense to use a more secure on-disk format.
LN 10.3 should still be able to read old images though.
LN Therefore cryptsetup/dm-crypt do suppport the loop_fish2 format 
(twofish-cbc-null) in factory already.
LN What's missing atm is the ability to generate keys compatible with the 
loop-AES patch.

You mean, the ability to cope with such encryption schemes,
is that identical to generating such keys?!?

LN Please file a bug and assign it to me, 

I am not sure, we will really end there, but ... maybe.
(I personally, I am already migrating my encrypted disks ...)

Under http://en.opensuse.org/Submitting_Bug_Reports
I can find a list of How to ... -- which one applies?

LN I'll consider implementing replacements for itercountk and pseed 
options in cryptsetup.

LN cu
LN Ludwig

J.
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]