[Bug 779912] Re: modprobe: FATAL: Error inserting padlock_sha (/lib/modules/2.6.38-9-generic/kernel/drivers/crypto/padlock-sha.ko): No such device

2011-05-09 Thread asi
Yes this is kernel bug. Kernel tries to autoload drivers for crypt accelerators (here VIA Padlock) but such device is not avalible on that system. The message is benign, sw implementation is used instead. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 719388] Re: semop failed for cookie 0xd4d09ef: incorrect semaphore state during luksOpen

2011-05-06 Thread asi
I am not sure if anyone from Ubuntu will even respond here, but I checked upstream code and provided logs (btw thanks for them, very usefull here). What happens here is: - system is fully udev managed, both userspace and kernel are recent enough - according to logs, something during udev event

[Bug 600179] Re: cryptsetup fails to build from source in linaro

2010-06-30 Thread asi
Please can Ubuntu upgrade to released version of cryptsetup (curently 1.1.2) and do not rely on old beta version here? All these problems should fixed there. See bug 594365. Thanks. -- cryptsetup fails to build from source in linaro https://bugs.launchpad.net/bugs/600179 You received this bug

Re: [Bug 605339] [NEW] cryptsetup 2.1.1.2 is not compatible withs 2.1.1.0

2010-07-14 Thread asi
On 07/14/2010 11:48 AM, Jaanus Rauk wrote: Public bug reported: Binary package hint: cryptsetup I-m mounting a volume with following commands: cryptsetup create crypt /dev/sda3 mount /dev/mapper/crypt /home After cryptsetup upgrade to '2.1.1.2-1ubuntu1 (maverick)' the mount doesn't

Re: [Bug 605339] [NEW] cryptsetup 2.1.1.2 is not compatible withs 2.1.1.0

2010-07-14 Thread asi
Btw if Ubuntu cryptsetup maintainers want to be backward compatible in stable branch, I suggest reading package release notes and build package with configure --with-luks1-keybits=128 --with-plain-mode=cbc-plain which set default to be fully compatible (luks change is not problem here, plain

[Bug 428435] Re: luks encrypted partition not detected

2010-09-14 Thread asi
If blkid reports two signatures for one device (LUKS + ext3/swap) it is bug (introduced when old cryptsetup did not wipe old signature). You cannot solve it updating to new cryptsetup version but you can use new cryptsetup version to fix it. Read

Re: [Bug 631425] Re: cryptsetup no longer working in Maverick Meerkat

2010-09-06 Thread asi
On 09/06/2010 12:49 PM, SabreWolfy wrote: I think has something to do with this via dmesg: [ 479.983093] padlock: VIA PadLock not detected. [ 480.056973] padlock: VIA PadLock Hash Engine not detected. Don't have time to go down this rabbit hole. Downgrading back to Lucid. Nope, this

[Bug 580456] Re: [Lucid] [Regression] crypsetup leaves temporary-cryptsetup-nnnn files lying around in /dev/mapper/

2010-05-14 Thread asi
Just to verify that internal cryptsetup defense against broken udev rules work at least: Can you post here output of dmsetup table of that orphaned temportary-cryptsetup-* device? (It should be already replaced by error segment to prevent keyslot access.) -- [Lucid] [Regression] crypsetup

Re: [Bug 1275380] [NEW] Cryptsetup still using SHA-1 as default hash for Debian Installer

2014-02-01 Thread asi
On 02/02/2014 03:20 AM, Brian Knoll wrote: Public bug reported: The SHA-1 hash has been, for years now, considered undesirable for new installations. In Trusty, a new install using LUKS results in an installation using SHA-1 hashing, as can be demonstrated by using the following command:

Re: [Bug 1292940] [NEW] cryptsetup benchmark freezes on AES based ciphers

2014-03-15 Thread asi
On 03/15/2014 07:30 PM, cacahuatl wrote: Looks like it's when it's trying to read from a socket, from what I can tell? Socket is interface to kernel crypto API so it is just waiting for output. Anyway, we had few problems with benchmark code on fast machines but it should be fixed in 1.6.4.

[Bug 1558079] Re: cryptsetup tcryptOpen doesn't work anymore

2016-05-11 Thread asi
New 3.19 and 3.13 upstream stable kernel should have patches that should allow old cryptsetup to run again, just backport these patches on top of accept fixes (instead of revert). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1703691] Re: Using iter-time doesn't give the desired timeout and security

2017-08-18 Thread asi
Obviously it is wrong repository, upstream is https://gitlab.com/cryptsetup/cryptsetup/ and mirror is https://github.com/mbroz/cryptsetup Please do not link random repos that some people create without any communication with upstream... Anyway, there were several changes to benchmarking, please

[Bug 1703691] Re: Using iter-time doesn't give the desired timeout and security

2017-08-18 Thread asi
Volume (master) key digest is there only to verify validity of the key. The digest iteration count is not relevant for the security of LUKS in normal situation. This iteration (slowdown) for digest will only help if the volume key was generated by a flawed RNG, where brute-force is possible.

[Bug 1713175] Re: fsck should check before running on an encrypted LUKS partition

2017-08-26 Thread asi
One day cryptsetup will link to liblkid, adding two "use friendly" things in luksFormat - warn if it detects something on disk before destroying it - run wipefs to really destroy all the magic strings there (as Teo suggested) So valid feature request also on the cryptsetup side, with the same

[Bug 1713175] Re: Obsolete backup ext2/3/4 superblocks can confuse e2fsck on an encrypted LUKS partition

2017-08-26 Thread asi
FYI libblkid/blkid detects LUKS for years already. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1713175 Title: Obsolete backup ext2/3/4 superblocks can confuse e2fsck on an encrypted LUKS

[Bug 1742436] Re: libcrypt being deprecated in favor of libxcrypt

2018-01-10 Thread asi
Ehm, libcryptsetup in Ubuntu uses libcrypt? I do not think so. (Crypto backend should be libgcrypt or openssl). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1742436 Title: libcrypt being

[Bug 1755322] Re: logging in with luks2 converted encrypted disk only accepts keylsot #1 password

2018-03-13 Thread asi
Could you attach luksDump output? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1755322 Title: logging in with luks2 converted encrypted disk only accepts keylsot #1 password To manage

[Bug 1755322] Re: logging in with luks2 converted encrypted disk only accepts keylsot #1 password

2018-03-14 Thread asi
Thx. So, the keyslot 2 was not converted, but added later once device was already in luks2 mode. Anyway, all offsets and parameters look correct, I was able to recreate the same sized device and it works for me (with upstream git, 2.0.2+). Can you try from command line for each slot and

[Bug 1780332] Re: vaultlocker does not ensure that udev is triggered to create /dev/disk/by-uuid/ symlink and fails

2018-09-14 Thread asi
If you have properly installed device-mapper udev rules, cryptsetup is internally synchronized to all symlinks and nodes creation (it should never return only when udev is finished, that's why libdevmapper internally uses semaphores and cookies per device). Calling udev settle is just workaround

[Bug 1780332] Re: vaultlocker does not ensure that udev is triggered to create /dev/disk/by-uuid/ symlink and fails

2018-09-14 Thread asi
Look for "dmsetup udevcomplete" call in udev rules. This is the sync point when libdevmapper continues. This must be the last call in udev chain rules related to device-mapper devices. (Run cryptsetup with --debug and you will see that sync point.) Sometimes it is hidden by the fact that