From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:43247) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cbUCs-0002ks-DT for qemu-devel@nongnu.org; Wed, 08 Feb 2017 10:30:55 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cbUCn-0000BV-GV for qemu-devel@nongnu.org; Wed, 08 Feb 2017 10:30:54 -0500 From: Alberto Garcia In-Reply-To: <20170126101827.22378-4-berrange@redhat.com> References: <20170126101827.22378-1-berrange@redhat.com> <20170126101827.22378-4-berrange@redhat.com> Date: Wed, 08 Feb 2017 16:30:47 +0100 Message-ID: MIME-Version: 1.0 Content-Type: text/plain Subject: Re: [Qemu-devel] [Qemu-block] [PATCH v3 03/18] qcow: document another weakness of qcow AES encryption List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Daniel P. Berrange" , qemu-devel@nongnu.org Cc: Kevin Wolf , qemu-block@nongnu.org, Max Reitz On Thu 26 Jan 2017 11:18:12 AM CET, Daniel P. Berrange wrote: > Document that use of guest virtual sector numbers as the basis for > the initialization vectors is a potential weakness, when combined > with internal snapshots or multiple images using the same passphrase. > This fixes the formatting of the itemized list too. > > Signed-off-by: Daniel P. Berrange Reviewed-by: Alberto Garcia Berto