Stefan Hajnoczi <[email protected]> writes:
> On Mon, Feb 16, 2015 at 06:19:04PM +0100, Henry Noack wrote:
>> it is possible to decrypt a kvm volume only by using the command line after
>> starting it?
>
> Encryption can be done at 3 levels:
[...]
> 2. In QEMU with qcow2, although this feature is not widely used and not
> up to modern disk encryption standards.
Quoting the fine manual:
The use of encryption in qcow and qcow2 images is considered
to be flawed by modern cryptography standards, suffering from
a number of design problems:
− The AES-CBC cipher is used with predictable
initialization vectors based on the sector number. This
makes it vulnerable to chosen plaintext attacks which can
reveal the existence of encrypted data.
− The user passphrase is directly used as the encryption
key. A poorly chosen or short passphrase will compromise
the security of the encryption.
− In the event of the passphrase being compromised there is
no way to change the passphrase to protect data in any
qcow images. The files must be cloned, using a different
encryption passphrase in the new file. The original file
must then be securely erased using a program like shred,
though even this is ineffective with many modern storage
technologies.
Use of qcow / qcow2 encryption is thus strongly discouraged.
Users are recommended to use an alternative encryption
technology such as the Linux dm-crypt / LUKS system.
[...]
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html