[Bug 1263740] Re: 12.04.4 alternate installer encryption should default to aes-xts-plain64
Dimitri John Ledkov
launchpad at surgut.co.uk
Wed Jan 22 13:32:37 UTC 2014
** Description changed:
[Impact]
- * Default LUKS encryption settings in the installer are proven to be susceptible to a malleability attack (targeted manipulation of encrypted data).
- * Thus it is proposed to bump defaults to aes-xts-plain64 which is believe to not be affected by above attack.
+ * Default LUKS encryption settings in the installer are proven to be susceptible to a malleability attack (targeted manipulation of encrypted data).
+ * Thus it is proposed to bump defaults to aes-xts-plain64 which is believe to not be affected by above attack.
[Test Case]
- * Perform LUKS encrypted installation using d-i (text) based interface
- * After installation verity that XTS has been used, and not CBC.
+ * Perform LUKS encrypted installation using d-i (text) based interface
+ * After installation verity that XTS has been used, and not CBC.
+
+ # cryptsetup luksDump /dev/sda5|grep Cipher
Here is the sample of _bad_ (CBC) output:
- # cryptsetup luksDump /dev/sda5|grep Cipher
Cipher name: aes
Cipher mode: cbc-essiv:sha256
- [Regression Potential]
+ Here is the sample of _good_ (XTS) output:
- *
+ Cipher name: aes
+ Cipher mode: xts-plain64
[Other Info]
12.04 LUKS encryption in the installer defaulted to CBC. We should
switch 12.04.4 to aes-xts-plain64 as in 12.10 and above.
See:
http://www.jakoblell.com/blog/2013/12/22/practical-malleability-attack-against-cbc-encrypted-luks-partitions/
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to partman-crypto in Ubuntu.
https://bugs.launchpad.net/bugs/1263740
Title:
12.04.4 alternate installer encryption should default to aes-xts-
plain64
Status in “partman-crypto” package in Ubuntu:
Fix Released
Status in “partman-crypto” source package in Precise:
In Progress
Status in “partman-crypto” package in Debian:
Unknown
Bug description:
[Impact]
* Default LUKS encryption settings in the installer are proven to be susceptible to a malleability attack (targeted manipulation of encrypted data).
* Thus it is proposed to bump defaults to aes-xts-plain64 which is believe to not be affected by above attack.
[Test Case]
* Perform LUKS encrypted installation using d-i (text) based interface
* After installation verity that XTS has been used, and not CBC.
# cryptsetup luksDump /dev/sda5|grep Cipher
Here is the sample of _bad_ (CBC) output:
Cipher name: aes
Cipher mode: cbc-essiv:sha256
Here is the sample of _good_ (XTS) output:
Cipher name: aes
Cipher mode: xts-plain64
[Other Info]
12.04 LUKS encryption in the installer defaulted to CBC. We should
switch 12.04.4 to aes-xts-plain64 as in 12.10 and above.
See:
http://www.jakoblell.com/blog/2013/12/22/practical-malleability-attack-against-cbc-encrypted-luks-partitions/
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/partman-crypto/+bug/1263740/+subscriptions
More information about the foundations-bugs
mailing list