Package: cryptsetup
Version: 2:1.4.3-4
Severity: wishlist

Hi.

Two places where I think one could switch to more secure defaults:
1) /dev/random vs. /dev/urandom
IIRC (please correct me if I'm wrong)... this was only used during
device generation (luksFormat), right?
Apart from devices created in batch mode (and whether this makes sense
from a security POV is questionable anyway)... it shouldn't hurt then
if /dev/random blocks, right?
And the entropy should be much better... especially as this was used
for the master key if I'm not wrong.


2) ciper/modes
I haven't followed the dm-crypt list that closely recently, but I remember
Milan was thinking about chaning defaults aes-xts-plain64, right?
Or has this happened in 1.6?

Anyway... I would suggest this as a "release goal" for jessy... of
course with NEWS and release notes infos...
IIRC the cipher/mode/size defaults were also hardcoded in some of the
initramfs hooks/scripts and would needed to be adapted there, too.


Cheers,
Chris.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to