Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-25 Thread Andrew Pimlott
On Sun, Jun 25, 2006 at 04:13:20PM +0200, Jonas Meurer wrote: > On 21/06/2006 Andrew Pimlott wrote: > > True, but this can't be configured in crypttab, which makes it > > effectively unavailable. Moreover, it wouldn't provide much additional > > safety. Presumably, a hypothetical "luksrandom" key

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-25 Thread Jonas Meurer
On 21/06/2006 Andrew Pimlott wrote: > > first, LUKS devices with random key are possible, you just need to store > > the random key after luksFormat, to reuse it for luksOpen. afterwards > > you can shred/wipe the key. > > True, but this can't be configured in crypttab, which makes it > effectivel

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-25 Thread Jonas Meurer
On 23/06/2006 Florian Weimer wrote: > > the only cases that are known to me, where data loss may still occur > > are encrypted devices without an identifying header, like plain dm-crypt > > devices. > > Logical volumes are in this category, too. how? if they don't contain any data? i don't talk a

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-23 Thread Florian Weimer
* Jonas Meurer: > On 22/06/2006 Florian Weimer wrote: >> * Jonas Meurer: >> >> > why do you see any problems? it does nothing else than checking for a >> > known filesystem before destroying any data on the source device. >> >> The current setup doesn't work with volume managers and things like

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-23 Thread Jonas Meurer
On 22/06/2006 Florian Weimer wrote: > * Jonas Meurer: > > > why do you see any problems? it does nothing else than checking for a > > known filesystem before destroying any data on the source device. > > The current setup doesn't work with volume managers and things like > that. These don't have

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-21 Thread Andrew Pimlott
On Tue, Jun 20, 2006 at 11:28:57PM +0200, Jonas Meurer wrote: > On 20/06/2006 Andrew Pimlott wrote: > > On Tue, Jun 20, 2006 at 10:10:24PM +0200, Jonas Meurer wrote: > > But as I understand, a randomly keyed partition can't be done with Luks > > (or can it?). > > first, LUKS devices with random ke

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-21 Thread Florian Weimer
* Jonas Meurer: > why do you see any problems? it does nothing else than checking for a > known filesystem before destroying any data on the source device. The current setup doesn't work with volume managers and things like that. These don't have any partition types AFAIK. Most people will call

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Jonas Meurer
On 20/06/2006 Andrew Pimlott wrote: > On Tue, Jun 20, 2006 at 10:10:24PM +0200, Jonas Meurer wrote: > > On 20/06/2006 Andrew Pimlott wrote: > > > I mean _if I explicitly promise so_, we should expect that. So give me > > > some configuration directive like LuksOnly that I can set. > > > > looks l

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Andrew Pimlott
On Tue, Jun 20, 2006 at 10:10:24PM +0200, Jonas Meurer wrote: > On 20/06/2006 Andrew Pimlott wrote: > > I mean _if I explicitly promise so_, we should expect that. So give me > > some configuration directive like LuksOnly that I can set. > > looks like overkill for me. users who use only luks don

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Jonas Meurer
On 20/06/2006 Andrew Pimlott wrote: > > there may exist situations > > where you don't want your device to be marked as 'contains encrypted > > data'. > > Right, however most users would be happy to put such a mark if it > increased safety. So it would be a nice option. yes, that's exactly what

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Andrew Pimlott
On Tue, Jun 20, 2006 at 06:40:56PM +0200, Jonas Meurer wrote: > On 19/06/2006 Andrew Pimlott wrote: > > 1. Create a marking for partitions to be encrypted with a random key, > > allowing for the positive identification above. Perhaps this should > > be part of LUKS. > > i see this more a

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Jonas Meurer
On 20/06/2006 Dick Middleton wrote: > What I don't understand is why it's doing any checks at all when not > requested. It seems to me that checking for the existence of a > filesystem on an arbitrary partition is a bold assumption. That is > properly the business of mount. why do you see any

Bug#371135: [Pkg-cryptsetup-devel] Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Jonas Meurer
On 19/06/2006 Andrew Pimlott wrote: > Automatically formatting a swap partition is a destructive operation, so > all reasonable checks should be made before doing it. It is currently > not possible to positively identify a swap partition encrypted with a > random key; nor is it possible to negativ

Bug#371135: encrypted swap with variable key fails

2006-06-20 Thread Dick Middleton
What I don't understand is why it's doing any checks at all when not requested. It seems to me that checking for the existence of a filesystem on an arbitrary partition is a bold assumption. That is properly the business of mount. But if having a default is generally deemed desirable then the

Bug#371135: encrypted swap with variable key fails

2006-06-19 Thread Andrew Pimlott
As a non-expect in cryptsetup who just wants his swap space back, let me see if I understand the problem. Automatically formatting a swap partition is a destructive operation, so all reasonable checks should be made before doing it. It is currently not possible to positively identify a swap parti

Bug#371135: encrypted swap with variable key fails

2006-06-07 Thread Mika Bostrom
Package: cryptsetup Version: 2:1.0.3-2 Severity: normal Using a variable (boot-time generated and unknown) key for encrypting swap space triggers a failure. The net effect is that swap space is never used. Below are included the relevant snippets and/or files and the annotation for what I believ