TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Decryption through LUKS2 reencryption crash recovery

143 pointsby beermonsterover 3 years ago

9 comments

formerly_provenover 3 years ago
Generally speaking hard drive encryption protects against theft and not tampering. I.e. the idea is that if your laptop or NAS is &quot;lost and found&quot;, then you wipe the drive and restore from backup, not continue to use the drive.<p>-<p>Since the protocol used here is broken the fix is to change the protocol - so keep in mind that...<p>&gt; The former reencryption operation (without the additional digest) is no longer supported (reencryption with the digest is not backward compatible). <i>You need to finish in-progress reencryption before updating to new packages.</i> The alternative approach is to perform a repair command from the updated package to recalculate reencryption digest and fix metadata.<p>Just in case you were thinking about upgrading the software during re-encryption - don&#x27;t.
评论 #30108022 未加载
评论 #30108790 未加载
chopinover 3 years ago
What&#x27;s still unclear to me: can you just grab an encrypted device (cold) and decrypt it? Or does the attack require a &quot;live&quot; device i.e one where the passphrase already have been given and the device is online?
评论 #30102085 未加载
评论 #30102160 未加载
评论 #30101976 未加载
评论 #30102766 未加载
评论 #30107630 未加载
josephcsibleover 3 years ago
What does this let an attacker do exactly that they couldn&#x27;t already do with a regular evil maid attack?
评论 #30102103 未加载
评论 #30102352 未加载
Aardwolfover 3 years ago
&gt; LUKS2 online reencryption is an optional extension to allow a user to change the data reencryption key while the data device is available for use during the whole reencryption process.<p>Since it&#x27;s optional, is it possible to see if this is enabled or disabled, and how to disable it?
akeckover 3 years ago
Some people keep the LUKS2 volume header in a separate file that&#x27;s encrypted (e.g., with gpg). Would someone still be able to attack a cold volume using this vulnerability in that case?
lvassover 3 years ago
I still don&#x27;t get how the fix works. If I just mount an external LUKS2 device in an updated system, It&#x27;s good to go?
评论 #30102284 未加载
gray_-_wolfover 3 years ago
&gt; The attack is not applicable to LUKS1 format, but the attacker can update metadata in place to LUKS2 format as an additional step.<p>First time I&#x27;m glad grub cannot boot LUKS2.
评论 #30108623 未加载
aborsyover 3 years ago
Could then NSA crack any LUKS encrypted container held on cloud storage such as Dropbox or GDrive (opened with a key on client side, never entered on server)?
评论 #30103506 未加载
FeistySkinkover 3 years ago
Does this affect LUKS1?
评论 #30101759 未加载