All of lore.kernel.org
 help / color / mirror / Atom feed
From: Christoph Anton Mitterer <christoph.anton.mitterer@physik.uni-muenchen.de>
To: dm-crypt@saout.de
Cc: Milan Broz <mbroz@redhat.com>
Subject: Re: [dm-crypt] XTS cipher mode limitations
Date: Fri, 20 Aug 2010 23:11:48 +0200	[thread overview]
Message-ID: <1282338708.3231.53.camel@fermat.scientia.net> (raw)
In-Reply-To: <4C4FED84.3040201@redhat.com>

Hi.

Sorry for re-visiting this issue one (hopefully) last time... but at
least to me not everything was fully clear yet.
And I guess having a final conclusion which we could also put in the FAQ
would be not to bad.

With respect to XTS:

1) I guess we've already concluded that it's one of the securest modes
available (if not the securest),... also protecting against certain
attacks for which the others are vulnerable.


2) There was this IV boundary issue when using just "plain",... but this
is effectively none, if one uses "plain64"... as this is enough for
2^64*512byte volumes.
Right?


3) There was a limitation on the block size, used with XTS, right? But
as we _always_ use 512 byte (even if the device below uses larger
sectors), we're fine anyway.
Right?


4) There was the (general issue) that if an attacker can make
snapshots,... you can only write some amount of data (with the same key)
until probability increases that attacks are possible, right?

Is this only the case when he can make snapshots?

In XTS, this starts to get a problem after about 100TB (IIRC) of data
have been written, right?
So the "solution" to this is: periodic re-encoding


5) Not sure whether I just didn't understand this,... but was'n there
another limit with respect to about 1TB? And what was that about?



So in the end we could put in the FAQ, that with XTS:
- users should use plain64
- periodically re-encode before about 100TB
- 1TB thingy?!


Are there any other general things one should consider?
(Of course I assume, that attackers have no easier way, e.g. via
internet/software exploits or via physical force)



Thanks,
Chris.


btw:
On Wed, 2010-07-28 at 10:42 +0200, Milan Broz wrote:
> Maybe one day it will be there but probably as part of LVM
> (which will use libcryptsetup for key management for encrypted
> logical volumes).
> 
> It is possible to encode some simple function to reencode disk
> in-place. But I would like to have something better, LVM
> already provides most of infrastructure for such block device
> operations. (beware: I am also lvm developer:)
And? Already started coding? ;)


btw2: Point (3) leads me to a different question.
Imagin I have a disk with 4k sectors, put dm-crypt on it,... then the
logical ones are 512 byte sectors, right?
Now I put another layer or a filesystem on top.
What happen's to the alignment now? Will it use 4k or 512 bytes?

  reply	other threads:[~2010-08-20 21:11 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-07-22 14:57 [dm-crypt] Efficacy of xts over 1TB David Santamaría Rogado
2010-07-25 10:34 ` Arno Wagner
2010-07-25 11:18   ` Christoph Anton Mitterer
2010-07-25 12:29     ` Heinz Diehl
2010-07-25 12:25   ` Milan Broz
2010-07-25 13:14     ` Christoph Anton Mitterer
2010-07-25 13:52       ` Milan Broz
2010-07-25 22:37         ` Christoph Anton Mitterer
2010-07-26  0:14           ` Milan Broz
2010-07-26 20:38             ` Christoph Anton Mitterer
2010-07-27  8:46               ` [dm-crypt] Using plain64/plain IV (initialisation vector) in dm-crypt Milan Broz
2010-07-27 10:47                 ` Arno Wagner
2010-07-27 14:17                   ` Christoph Anton Mitterer
2010-07-27 16:08                     ` Arno Wagner
2010-07-27 14:15                 ` Christoph Anton Mitterer
2010-07-27 15:45                   ` Mario 'BitKoenig' Holbe
2010-07-27 15:55                     ` Milan Broz
2010-07-27 18:59                       ` Christoph Anton Mitterer
2010-07-27 19:37                         ` Arno Wagner
2010-07-27 18:58                     ` Christoph Anton Mitterer
2010-07-27 19:35                       ` Mario 'BitKoenig' Holbe
2010-07-28  8:42                     ` Milan Broz
2010-08-20 21:11                       ` Christoph Anton Mitterer [this message]
2010-08-21  0:22                         ` [dm-crypt] XTS cipher mode limitations Arno Wagner
2010-08-22 12:50                           ` [dm-crypt] XTS cipher mode limitations (FAQ additions) Christoph Anton Mitterer
2010-08-23  0:46                             ` Arno Wagner
2010-08-25  9:36                               ` Christoph Anton Mitterer
2010-08-22 12:56                           ` [dm-crypt] tool to account the written number of bytes to a block device (was: XTS cipher mode limitations) Christoph Anton Mitterer
2010-08-22 16:01                             ` Arno Wagner
2010-08-22 21:57                               ` Christoph Anton Mitterer
2010-08-23  7:14                                 ` [dm-crypt] tool to account the written number of bytes to a block device Milan Broz
2010-08-25  9:27                                   ` Christoph Anton Mitterer
2010-08-24 16:19                           ` [dm-crypt] XTS cipher mode limitations Ramius
2010-07-26  8:53           ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-26 20:47             ` Christoph Anton Mitterer
2010-07-26 21:01               ` Arno Wagner
2010-07-26 21:28                 ` Christoph Anton Mitterer
2010-07-26 21:35                   ` Arno Wagner
2010-07-25 22:52         ` Christoph Anton Mitterer
2010-07-26  9:42           ` Mario 'BitKoenig' Holbe
2010-07-26 18:09             ` Arno Wagner
2010-07-27 18:16               ` [dm-crypt] Including the FAQ in the tarball? Christoph Anton Mitterer
2010-07-27 18:23                 ` Arno Wagner
2010-07-29  8:17                 ` Heinz Diehl
2010-07-25 15:32       ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-25 22:48         ` Christoph Anton Mitterer
2010-07-25 23:42           ` Milan Broz
2010-07-26 18:35             ` Christoph Anton Mitterer
2010-07-25 15:28     ` Arno Wagner
2010-07-25 18:11       ` Milan Broz
2010-07-26  9:04   ` Mario 'BitKoenig' Holbe
2010-07-27 18:21     ` Christoph Anton Mitterer
2010-07-27 21:02       ` Mario 'BitKoenig' Holbe
2010-07-26  9:17 ` Mario 'BitKoenig' Holbe
2010-07-27 18:42 ` David Santamaría Rogado

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1282338708.3231.53.camel@fermat.scientia.net \
    --to=christoph.anton.mitterer@physik.uni-muenchen.de \
    --cc=dm-crypt@saout.de \
    --cc=mbroz@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.