|
--ikeVEW9yuYc//A+q Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello everyone, I noticed last week that the Debian packaged version of cryptsetup has a little limitation, which could be a security issue for people who have to destroy their data forever. It is impossible to destroy a keyslot when you used it to unlock the master key. I reported the bug to debian (etch and lenny are affected as far as I tested): http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513596 and to ubuntu (tested on hardy): https://bugs.launchpad.net/cryptsetup/+bug/324871 It's not a major security problem, but people who were planning to run 'cryptsetup luksDelKey /dev/sda1 0' on their installation when the police comes to wake them up should be adviced that it won't work out of the box. Cheers, Pierre Dinh-van --ikeVEW9yuYc//A+q Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFJlS5UzcMD4MePlUcRAolyAKCIiqWmw2xaOyx4Yef38+7G5H31kgCdFDOE Zh4Evx1AdXD3JRWkjmUqdbA=Aym5 -----END PGP SIGNATURE----- --ikeVEW9yuYc//A+q--