Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LUKS header detaching #254

Open
parazyd opened this issue Mar 26, 2017 · 4 comments
Open

LUKS header detaching #254

parazyd opened this issue Mar 26, 2017 · 4 comments
Assignees
Labels
discussion enhancement An issue to improve current behavior feat

Comments

@parazyd
Copy link
Member

parazyd commented Mar 26, 2017

Should we implement LUKS header detaching from freshly locked tombs? Should it be a default?

An option for storing the header could be keeping it in the tomb key itself.

@jaromil
Copy link
Member

jaromil commented Mar 27, 2017

I am in favor of this as it would improve tomb's security and resilience, since one can more easily backup keys instead of the tomb and the integrity of headers is vital to access the tomb.

It is a rather delicate change that should be 100% retrocompatible with older tombs.

There will be the need to extend the range of information embedded "key header", which is right now sometimes present to specify pbkdf2 configuration. It will make keys bigger (up to 5Kb) which may impact qrcode generation and image steganography, while I'm not sure we should consider a compression algo for the 4Kb LUKS header (which alone is 4 times bigger than a key right now).

These are just some initial considerations for now, will follow up with more or organise this section better on a new edit. This change will go into Tomb 3, for which I'm creating a milestone.

@jaromil jaromil self-assigned this Mar 27, 2017
@jaromil jaromil added this to the 3.0 milestone Mar 27, 2017
@jaromil
Copy link
Member

jaromil commented Apr 16, 2017

can you post a link here on that cryptsetup with deniable patch?

@parazyd
Copy link
Member Author

parazyd commented Apr 17, 2017

It's this one: https://github.com/kriswebdev/cryptsetup-deluks

Keep in mind it's probably not been reviewed by anyone yet.

@jaromil jaromil modified the milestones: 3.0, portable Nov 14, 2022
@rekahsoft
Copy link

I was about to create an issue for this. fwiw, I have used detached luks header (via the --header argument) which is available in modern version of luks these days. It definitely would be slick to be able to store a detached luks header in the keyfile itself. This would make it impossible to know that a tomb is even a tomb (deniable encryption).

@jaromil jaromil added the enhancement An issue to improve current behavior label May 11, 2024
@jaromil jaromil removed this from the portable milestone May 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discussion enhancement An issue to improve current behavior feat
Projects
None yet
Development

No branches or pull requests

3 participants