Date: Fri, 13 Feb 2009 09:24:52 +0100
From: Pierre Dinh-van <pierre@qsdf.org.>
To: [email protected], [email protected]Subject: cryptsetup can't destroy last key of a LUKS partition under Ubuntu/Debian
Message-ID: <20090213082452.GA19392@qsdf.org.>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="ikeVEW9yuYc//A+q"
Content-Disposition: inline
User-Agent: Mutt/1.5.13 (2006-08-11)
X-Virus-Scanned: antivirus-gw at tyumen.ru
--ikeVEW9yuYc//A+q
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hello everyone,
I noticed last week that the Debian packaged version of cryptsetup has a
little limitation, which could be a security issue for people who have to
destroy their data forever.=20
It is impossible to destroy a keyslot when you used it to unlock the master
key.
I reported the bug to debian (etch and lenny are affected as far as I teste=
d):
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=3D513596
and to ubuntu (tested on hardy):
https://bugs.launchpad.net/cryptsetup/+bug/324871
It's not a major security problem, but people who were planning to run=20
'cryptsetup luksDelKey /dev/sda1 0' on their installation when the police=
=20
comes to wake them up should be adviced that it won't work out of the box.
Cheers,
Pierre Dinh-van
--ikeVEW9yuYc//A+q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFJlS5UzcMD4MePlUcRAolyAKCIiqWmw2xaOyx4Yef38+7G5H31kgCdFDOE
Zh4Evx1AdXD3JRWkjmUqdbA=
=Aym5
-----END PGP SIGNATURE-----
--ikeVEW9yuYc//A+q--