Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262872AbVAQU3G (ORCPT ); Mon, 17 Jan 2005 15:29:06 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262873AbVAQU3G (ORCPT ); Mon, 17 Jan 2005 15:29:06 -0500 Received: from quechua.inka.de ([193.197.184.2]:28548 "EHLO mail.inka.de") by vger.kernel.org with ESMTP id S262872AbVAQU2A (ORCPT ); Mon, 17 Jan 2005 15:28:00 -0500 From: Andreas Jellinghaus Subject: Re: Announce loop-AES-v3.0b file/swap crypto package Date: Mon, 17 Jan 2005 21:28:26 +0100 User-Agent: Pan/0.14.2.91 (As She Crawled Across the Table (Debian GNU/Linux)) Message-Id: References: <41EAE36F.35354DDF@users.sourceforge.net> <41EB3E7E.7070100@tmr.com> <41EBD4D4.882B94D@users.sourceforge.net> To: linux-kernel@vger.kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 808 Lines: 22 On Mon, 17 Jan 2005 15:11:18 +0000, Jari Ruusu wrote: > Mainline folks are just too much in love with their backdoored device > crypto implementations [1]. If you want strong device crypto in mainline > kernel, maybe you should take a look at FreeBSD gbde. what about dm-crypt? I lost track, whether it is fixed or not. (Or rather: whether secure modes where added, and which modes are considered secure). also my key is 32 random bytes and not a hash. will I have any issue? dictionary attacks will not work with that. Thanks for your help. Regards, Andreas - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/