From: Milan Broz Subject: Re: [RFC PATCH v4] IV Generation algorithms for dm-crypt Date: Tue, 28 Feb 2017 22:05:21 +0100 Message-ID: <68f70534-a309-46ba-a84d-8acc1e6620e5@gmail.com> References: <1486463731-6224-1-git-send-email-binoy.jayan@linaro.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: Rajendra , Herbert Xu , Oded , Mike Snitzer , Linux kernel mailing list , Ondrej Mosnacek , linux-raid@vger.kernel.org, Gilad Ben-Yossef , dm-devel@redhat.com, Mark Brown , Arnd Bergmann , linux-crypto@vger.kernel.org, Shaohua Li , "David S. Miller" , Alasdair Kergon , Ofir To: Binoy Jayan Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: dm-devel-bounces@redhat.com Errors-To: dm-devel-bounces@redhat.com List-Id: linux-crypto.vger.kernel.org On 02/22/2017 07:12 AM, Binoy Jayan wrote: > > I was wondering if this is near to be ready for submission (apart from > the testmgr.c > changes) or I need to make some changes to make it similar to the IPSec offload? I just tried this and except it registers the IV for every new device again, it works... (After a while you have many duplicate entries in /proc/crypto.) But I would like to see some summary why such a big patch is needed in the first place. (During an internal discussions seems that people are already lost in mails and patches here, so Ondra promised me to send some summary mail soon here.) IIRC the first initial problem was dmcrypt performance on some embedded crypto processors that are not able to cope with small crypto requests effectively. Do you have some real performance numbers that proves that such a patch is adequate? I would really like to see the performance issue fixed but I am really not sure this approach works for everyone. It would be better to avoid repeating this exercise later. IIRC Ondra's "bulk" mode, despite rejected, shows that there is a potential to speedup things even for crypt drivers that do not support own IV generators. I like the patch is now contained inside dmcrypt, but it still exposes IVs that are designed just for old, insecure, compatibility-only containers. I really do not think every compatible crap must be accessible through crypto API. (I wrote the dmcrypt lrw and tcw compatibility IVs and I would never do that this way if I know it is accessible outside of dmcrypt internals...) Even the ESSIV is something that was born to fix predictive IVs (CBC watermarking attacks) for disk encryption only, no reason to expose it outside of disk encryption. Milan