Gentoo Archives: gentoo-security

From: "i.t" <gentoo@×××××××××××.org>
To: gentoo-security@l.g.o
Subject: [gentoo-security] Re: Re: cryptoloop
Date: Tue, 18 May 2004 17:53:24
Message-Id: 200405181954.27532.gentoo@it97.dyndns.org
In Reply to: [gentoo-security] Re: cryptoloop by "i.t"
1 > Am Dienstag, 18. Mai 2004 08:07 schrieb Daniel:
2 > > Basically
3 > > any 2.6 kernel will do cryptoloop.
4 >
5 > yes - with XOR
6 >
7 > from man losetup:
8 > RESTRICTION
9 > DES encryption is painfully slow. On the other hand, XOR is terribly
10 > weak.
11 uname -a
12 Linux athlon2.it97.dyndns.org 2.4.25_pre7-gss-r3
13 (example works for _ALL_ newer kernels I've tried without crypto-patches or
14 aes-loop)
15
16 lsmod
17 Module Size Used by Tainted: P
18 blowfish 6860 0 (unused)
19 aes 30752 0 (unused)
20 loop 9944 0
21
22 dd if=/dev/urandom of=blow.fish bs=1k count=1000
23 1000+0 records in
24 1000+0 records out
25
26 losetup -e blowfish /dev/loop0 blow.fish
27 Password:
28 The cipher does not exist, or a cipher module needs to be loaded into the
29 kernel
30 ioctl: LOOP_SET_STATUS: Invalid argument
31 # losetup -e aes /dev/loop0 blow.fish
32 The cipher does not exist, or a cipher module needs to be loaded into the
33 kernel
34 ioctl: LOOP_SET_STATUS: Invalid argument
35 # losetup -e XOR /dev/loop0 blow.fish
36 Password:
37 (works - nice :- )
38
39 I'm absolutely tired by those ughly politics of US-based linux distributions
40 (for Fedora it's the same - whatever kernels).
41
42 There is no real security without encryption.
43 The more I think about it I'm willing to stick with OpenBSD
44 --
45 . ___
46 | | Irmund Thum
47 | |
48
49 --
50 gentoo-security@g.o mailing list

Replies

Subject Author
Re: [gentoo-security] Re: Re: cryptoloop Marc Ballarin <Ballarin.Marc@×××.de>
Re: [gentoo-security] Re: Re: cryptoloop Marc Ballarin <Ballarin.Marc@×××.de>