digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

818
active users

#luks2

0 posts0 participants0 posts today
House Panther :verified_paw:<p>I finally got my <a href="https://goblackcat.social/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> disk encryption upgraded to <a href="https://goblackcat.social/tags/LUKS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS2</span></a>. It certainly was a challenge because <a href="https://goblackcat.social/tags/grub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grub</span></a> does not seem to play nicely with it but I did get it to work. Grub has a bug in it where passphrases entered from the keyboard need to use PBDKF2 and key files need to use Argon2id. Once I figured this out, everything worked smoothly.</p>
🅹🅴🅳🅸🅴 🇺🇦🕊️<p>Mir ist aufgefallen, das bei <a href="https://chaos.social/tags/TuxedoOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TuxedoOS</span></a> das Benutzer Passwort nicht mit dem <a href="https://chaos.social/tags/luks2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>luks2</span></a> Passwort synchronisiert wird.</p><p>z.B. user Passwort in KDE ändern oder einen neuen benutzer anlegen. Ich kann dennoch die Verschlüsselung nur mit dem initialen Passwort, bei der Installation aufschließen.</p><p>Offenbar gibt es auch keine Möglichkeit per GUI ein Passwort hinzuzufügen. Sehe nur die Möglichkeit mit cryptsetup auf Konsole zu arbeiten.</p><p>Übersehe ich was? <span class="h-card" translate="no"><a href="https://linuxrocks.online/@tuxedocomputers" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tuxedocomputers</span></a></span></p>
Jarkko SakkinenFinally HMAC encryption for in-kernel TPM clients is going to a release! Has been hanging there for a long time.<br><br>LUKS2 and distributions starting to support it motivated me to rewrite the buffering code last Spring because that was my main turn-down in the original patch set, and then James took over and cleaned up the functionality and I reviewed it for few rounds until it was good enough.<br><br>With this and TPM2 sealed hard drive encryption there is a somewhat reasonable security model without having to type encryption password to a bootloader prompt (which is tedious). I.e. login and go.<br><br>A rare case of security feature also increasing user experience.<br><br><a class="hashtag" href="https://social.kernel.org/tag/linux" rel="nofollow noopener" target="_blank">#linux</a> <a class="hashtag" href="https://social.kernel.org/tag/kernel" rel="nofollow noopener" target="_blank">#kernel</a> <a class="hashtag" href="https://social.kernel.org/tag/tpm" rel="nofollow noopener" target="_blank">#tpm</a> <a class="hashtag" href="https://social.kernel.org/tag/luks2" rel="nofollow noopener" target="_blank">#luks2</a>
Linux TLDR<p>Linux Weekly Roundup: EndeavourOS Galileo with KDE, Rocky Linux 9.3 Updates, Proxmox VE 8.1 Enhancements, and More!<br><a href="https://noc.social/tags/EndeavourOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndeavourOS</span></a> <a href="https://noc.social/tags/RockyLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RockyLinux</span></a> <a href="https://noc.social/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://noc.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://noc.social/tags/OpenMandriva" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenMandriva</span></a> <a href="https://noc.social/tags/KDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> <a href="https://noc.social/tags/LUKS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS2</span></a> <a href="https://noc.social/tags/Calamares" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Calamares</span></a> <a href="https://noc.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://noc.social/tags/CephReef" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CephReef</span></a> <a href="https://noc.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSH</span></a> <a href="https://noc.social/tags/Plasma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plasma</span></a><br><a href="https://linuxtldr.com/weekly-roundup/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">linuxtldr.com/weekly-roundup/</span><span class="invisible"></span></a></p>
erAck<p><span class="h-card"><a href="https://floss.social/@downey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>downey</span></a></span> </p><p>As you mentioned reencrypt, that's about encrypting existing data? Then maybe this <a href="https://social.tchncs.de/tags/RHEL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RHEL</span></a> guide helps:<br><a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/encrypting-block-devices-using-luks_security-hardening#encrypting-existing-data-on-a-block-device-using-luks2_encrypting-block-devices-using-luks" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">access.redhat.com/documentatio</span><span class="invisible">n/en-us/red_hat_enterprise_linux/9/html/security_hardening/encrypting-block-devices-using-luks_security-hardening#encrypting-existing-data-on-a-block-device-using-luks2_encrypting-block-devices-using-luks</span></a></p><p>Or just have a complete backup (you should anyway), wipe, create a <a href="https://social.tchncs.de/tags/LUKS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS2</span></a> partition and possibly <a href="https://social.tchncs.de/tags/LVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LVM</span></a> on it and restore..</p>
Christian Pietsch (old acct.)<p><span class="h-card" translate="no"><a href="https://nondeterministic.computer/@mjg59" class="u-url mention">@<span>mjg59</span></a></span> </p><p>Thank you for sounding the alert!</p><p>I identified a minor issue with your otherwise nice explanation: According to my sources (man cryptsetup, <a href="https://digitalcourage.social/tags/rfc9106" class="mention hashtag" rel="tag">#<span>rfc9106</span></a>), all <a href="https://digitalcourage.social/tags/argon2" class="mention hashtag" rel="tag">#<span>argon2</span></a> varieties are memory-hard. RFC 9106 is even titled “Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications”.</p><p>However, given that there are known attacks against <a href="https://digitalcourage.social/tags/argon2i" class="mention hashtag" rel="tag">#<span>argon2i</span></a>, it seems wise to use <a href="https://digitalcourage.social/tags/argon2id" class="mention hashtag" rel="tag">#<span>argon2id</span></a> instead. It is also what is recommended in the RFC.</p><p>As a <a href="https://digitalcourage.social/tags/QubesOS" class="mention hashtag" rel="tag">#<span>QubesOS</span></a> user, I just checked the state of affairs there:</p><p>The cryptsetup that comes with QubesOS 3.x used <a href="https://digitalcourage.social/tags/luks1" class="mention hashtag" rel="tag">#<span>luks1</span></a>, and those who did an in-place upgrade to 4.x still have that unless they converted to <a href="https://digitalcourage.social/tags/luks2" class="mention hashtag" rel="tag">#<span>luks2</span></a> manually (as detailed in the migration guide).</p><p>The cryptsetup in QubesOS 4.x uses <a href="https://digitalcourage.social/tags/luks2" class="mention hashtag" rel="tag">#<span>luks2</span></a>, but it still defaults to <a href="https://digitalcourage.social/tags/argon2i" class="mention hashtag" rel="tag">#<span>argon2i</span></a> unfortunately.</p>