-54 from Debian has been merged into -54ubuntu1 and released in quantal.
** Changed in: partman-crypto (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/244
** Changed in: partman-crypto (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/244480
Title:
support AES-XTS mode
To manage notifications about this bug go
Obviously, fixing this fully requires significant changes to installer,
but what about at least including those two modules on alternative
installation CD?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
Don't know why you mention the random all before as is irrelevant for
this "issue", entire partition should be random filled with all cipher
blocks.
No, is not a XTS unique problem but is not a problem of using AES, the
problem is in "all XOR-Encryption(XE)-based tweakable block cipher" like
XTS.
Well, the paper also says that:
"Use of a single cryptographic key for more than a few hundred terabytes
of data opens possibility of attacks, as described in D.4.3. The
limitation on the size of data encrypted with a single key is not unique
to this standard. It comes directly from the fact that
There is a comment in wikipedia's discussion about this:
http://en.wikipedia.org/wiki/Talk:Disk_encryption_theory#Issues_with_XTS
"Issues with XTS
There is also an issue about the size of the filesystem encrypted with
the support of XTS. This is discussed here:
http://lists.alioth.debian.org/pipe
AFAIK the OpenBSD devs who implemented XTS are even more conservative
and display a warning for volume sizes over 500GB.
-marc
--
support AES-XTS mode
https://bugs.launchpad.net/bugs/244480
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I'd have thought that depended rather a lot on the cost of the attack,
and, since we can usually expect attacks to get faster over time, it's
often worth being conservative in advance. In any case, I was only
talking about a warning over 1TB, not a hard maximum size of 1TB (which
I agree would be o
Isn't 1 TB an overly conservative estimate? The probability of a
successful attack on 1 PB of data is only eight in a trillion. See
http://en.wikipedia.org/wiki/XTS#XTS. Truecrypt sets its maximum volume
size at 1 PB for this reason.
On 1/27/2009 8:37 PM, Colin Watson wrote:
> It may be worth noti
It may be worth noting the comment in http://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=494584 to the effect that XTS' security guarantees
deteriorate over 1TB, so the installer would need to have a warning
about this.
** Changed in: partman-crypto (Ubuntu)
Importance: Undecided => Wishlist
Note that following installation you'll need to use a live CD to modify
/etc/crypttab, /etc/fstab, load the necessary modules and rebuild
initrd. It may be easier to just follow this howto if you want LVM+LUKS
(https://help.ubuntu.com/community/EncryptedFilesystemLVMHowto). I can
confirm that this
Nevermind, I figured out how to create an LUKS+LVM encrypted Ubuntu
install using the
https://help.ubuntu.com/community/EncryptedFilesystemLVMHowto
instructions.
The last step must be slightly modified, and a few more steps are
necessary to create the LVM.
Instead of "cryptsetup luksOpen /dev/sda
Marc,
Your instructions don't appear to work when using LVM as the installer
fails to format the LVM volumes. Any idea how to modify your
instructions to create an LUKS+LVM encrypted partition so that I can
have separate /home, /, and swap?
Jason
--
support AES-XTS mode
https://bugs.launchpad.n
Thank you for the guide. I was just in the process of installing Ubuntu
8.10 on my laptop via the alternative CD when I realized that XTS wasn't
supported. I will be following your instructions to encrypt my system
with AES-XTS.
--
support AES-XTS mode
https://bugs.launchpad.net/bugs/244480
You r
Thanks for the guide. It worked for me.
I also want AES-XTS to be supported. Its the next thing in AES encryption.
Enable it in the kernel!
** Changed in: partman-crypto (Ubuntu)
Status: New => Confirmed
--
support AES-XTS mode
https://bugs.launchpad.net/bugs/244480
You received this bu
To give a little bit of background, AES-XTS is a cipher mode that has
been recently standardized by the IEEE P1619 working group. It is
thought to be currently the most secure narrow-block cipher mode
designed for disk encryption.
It is possible to install Ubuntu 8.04 on an AES-XTS-encrypted root
** Changed in: partman-crypto (Debian)
Status: Unknown => New
--
support AES-XTS mode
https://bugs.launchpad.net/bugs/244480
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
17 matches
Mail list logo