TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

PSA: Upgrade your LUKS key derivation function

16 pointsby sashkabout 2 years ago

3 comments

mjg59about 2 years ago
Archive link for anyone who&#x27;s stuck behind some sort of captcha (sorry, I don&#x27;t make the CDN decisions here) <a href="https:&#x2F;&#x2F;archive.is&#x2F;5hu2x" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;5hu2x</a>
edrxtyabout 2 years ago
From the article linked in the article, it seems they were able to get into bitlocker as well.<p>My speciation is there&#x27;s a decent probability the password(s) were discovered by law enforcement through some other means, likely reuse.<p>That said, it would be best to maintain a heightened awareness for any advanced attacks or other similar incidents.
flas9sdabout 2 years ago
tl;dr check for desirable presence of argon2id as key derivation function in the output of<p><pre><code> lsblk sudo cryptsetup luksDump &#x2F;dev&#x2F;sd[xy] </code></pre> or more terse (not sure if this works for luks1 header format too)<p><pre><code> sudo cryptsetup luksDump &#x2F;dev&#x2F;sd[xy] --dump-json-metadata | jq &#x27;.keyslots | .[].kdf.type&#x27; </code></pre> if you see anything but argon2id, consider migrating. Thanks for the explanation and PSA @mjg59<p><a href="https:&#x2F;&#x2F;anarchistnews.org&#x2F;content&#x2F;update-ivan-alocco" rel="nofollow">https:&#x2F;&#x2F;anarchistnews.org&#x2F;content&#x2F;update-ivan-alocco</a> has the english translation of the letter by comrade arsonist anarchist