TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

PSA: Upgrade your LUKS key derivation function

16 点作者 sashk大约 2 年前

3 条评论

mjg59大约 2 年前
Archive link for anyone who&#x27;s stuck behind some sort of captcha (sorry, I don&#x27;t make the CDN decisions here) <a href="https:&#x2F;&#x2F;archive.is&#x2F;5hu2x" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;5hu2x</a>
edrxty大约 2 年前
From the article linked in the article, it seems they were able to get into bitlocker as well.<p>My speciation is there&#x27;s a decent probability the password(s) were discovered by law enforcement through some other means, likely reuse.<p>That said, it would be best to maintain a heightened awareness for any advanced attacks or other similar incidents.
flas9sd大约 2 年前
tl;dr check for desirable presence of argon2id as key derivation function in the output of<p><pre><code> lsblk sudo cryptsetup luksDump &#x2F;dev&#x2F;sd[xy] </code></pre> or more terse (not sure if this works for luks1 header format too)<p><pre><code> sudo cryptsetup luksDump &#x2F;dev&#x2F;sd[xy] --dump-json-metadata | jq &#x27;.keyslots | .[].kdf.type&#x27; </code></pre> if you see anything but argon2id, consider migrating. Thanks for the explanation and PSA @mjg59<p><a href="https:&#x2F;&#x2F;anarchistnews.org&#x2F;content&#x2F;update-ivan-alocco" rel="nofollow">https:&#x2F;&#x2F;anarchistnews.org&#x2F;content&#x2F;update-ivan-alocco</a> has the english translation of the letter by comrade arsonist anarchist