-
ProblemAs a user I am interested in protecting my arch linux install with disk encryption. Looking at the luks python file i can see you are using argon2i as cypher while most other distribution use the well tested AES. What is the reason for choosing argon2i? Potential vulnerability?Looking at wikipedia RequestThis worries me. Is it possible to use ConclusionCould you consider changing the luks cypher on the reason described above? Or at least clarify why you used argon? Thank you! |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
I don't mind considering changing the default parameters, I'm also looking in to how these arguments could be made available via parameters some how (without adding complexity for "most users"). But to answer your argument: Regarding AES, without checking I'm going to make a bold claim that might backfire, in which case, keep it civil and just mention that this is wrong :P But LUKS2 uses Reading that wiki article, one of those attacks were on the old implementation of Argoni2 and not the latest reference implementation. And I think it's more important to have a good hash size in this case and a good iteration count, and trust the default implementations. tl;dr: I'm looking in to ways of enabling more complicated and dynamic setups of generally the entire partitioning setup (this includes encryption). But you'll have to hang tight for the next release :) Edit: found a decent write-up on what I was rambling on about: https://security.stackexchange.com/questions/229553/what-is-the-digests-section-in-cryptsetup |
Beta Was this translation helpful? Give feedback.
-
@Torxed already explained the difference between --cipher and --pbkdf, cyptsetup currently supports 3 different pbkdfs:
The current defaults in Arch Linux at the time of writing:
|
Beta Was this translation helpful? Give feedback.
I don't mind considering changing the default parameters, I'm also looking in to how these arguments could be made available via parameters some how (without adding complexity for "most users").
But to answer your argument:
The reason behind this was that at the time of writing this part of code, way back. LUKS2 that "had just come out" had argoni2i as the default algorithm and was resistant to side channel attacks. However, it was susceptible to GPU attacks.
Regarding AES, without checking I'm going to make a bold claim that might backfire, in which case, keep it civil and just mention that this is wrong :P But LUKS2 uses
aes-xts-plain64
by default as it's cipher mechanism, and it's just…