|
--ikeVEW9yuYc//A+q
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hello everyone,
I noticed last week that the Debian packaged version of cryptsetup has a
little limitation, which could be a security issue for people who have to
destroy their data forever.
It is impossible to destroy a keyslot when you used it to unlock the master
key.
I reported the bug to debian (etch and lenny are affected as far as I tested):
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513596
and to ubuntu (tested on hardy):
https://bugs.launchpad.net/cryptsetup/+bug/324871
It's not a major security problem, but people who were planning to run
'cryptsetup luksDelKey /dev/sda1 0' on their installation when the police
comes to wake them up should be adviced that it won't work out of the box.
Cheers,
Pierre Dinh-van
--ikeVEW9yuYc//A+q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFJlS5UzcMD4MePlUcRAolyAKCIiqWmw2xaOyx4Yef38+7G5H31kgCdFDOE
Zh4Evx1AdXD3JRWkjmUqdbA=Aym5
-----END PGP SIGNATURE-----
--ikeVEW9yuYc//A+q--