Package: cryptsetup
Version: 2:2.1.0-1
Severity: important

Dear Maintainer,

Currently the new cryptsetup defaults to LUKS2 format with the
following parameters:

Default PBKDF for LUKS2: argon2i
Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4

Meaning that 1GB of RAM is required at luksOpen. This is a significant
RAM increase compared to the previous defaults used in LUKS1. Meaning
that many devices will no longer be able to installs afresh, using
full-disk encryption.

For example many IoT and Pi devices have 1GB of ram in total, and thus
would OOM kill when trying to luksOpen.

Please consider reducing the default memory requirement of the argon2i
in luks2 by default, or switching to pbkdf2 for LUKS2 as well.

If there are multiple encrypted datavolumes, unlocked automatically
with crypttab, under systemd, they would be unlocked in parallel,
meaning peak memory requirement would be 1GB*N on boot for those

I think it is unfortunate to not support default encryption on 1GB big
devices and VMs.

I have filed a similar bug report in Ubuntu as well just now:



Reply via email to