Package: loop-aes-utils Version: 2.13.1-4 Severity: normal Tags: patch *** Please type your report below this line ***
Hi, the loop-aes.readme suggests to use the option --s2k-count 8388608 for generating gpg keys. In short this improves the resitance to dictionary attacks. The attached patch adds this option to the gpg call. This commandline option is available in gpg 1.4.6 or later. Thanks for your time, Thomas -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages loop-aes-utils depends on: ii gnupg 1.4.9-3+lenny1 GNU privacy guard - a free PGP rep ii libblkid1 1.41.3-1 block device id library ii libc6 2.7-18 GNU C Library: Shared libraries ii libselinux1 2.0.65-5 SELinux shared libraries ii libuuid1 1.41.3-1 universally unique id library ii mount 2.13.1.1-1 Tools for mounting and manipulatin Versions of packages loop-aes-utils recommends: ii sharutils 1:4.6.3-1 shar, unshar, uuencode, uudecode loop-aes-utils suggests no packages. -- no debconf information
--- loop-aes-keygen 2009-10-18 00:57:56.640026751 +0200 +++ loop-aes-keygen.modified 2009-10-18 01:06:16.576326458 +0200 @@ -157,7 +157,7 @@ { version=$1 keyfile=$2 - gpgargs=$3 + gpgargs="--s2k-count 8388608 $3" # These are the known loop-AES key formats: # v1.x 1 45 bytes AES key