Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 294934 - sys-fs/cryptsetup-1.1.0 released
Summary: sys-fs/cryptsetup-1.1.0 released
Status: RESOLVED TEST-REQUEST
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo's Team for Core System packages
URL: http://code.google.com/p/cryptsetup/
Whiteboard:
Keywords:
Depends on:
Blocks: 301627
  Show dependency tree
 
Reported: 2009-11-28 08:36 UTC by ScytheMan
Modified: 2010-03-04 14:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description ScytheMan 2009-11-28 08:36:23 UTC
Opening a new bug for 1.1.x series, as told at #277990.
Please add this to portage tree, too.

Changes compared to 1.0.7:

2009-11-14  Milan Broz  <mbroz@redhat.com>
	* Add CRYPT_ prefix to enum defined in libcryptsetup.h.
	* Fix status call to fail when running as non-root user.
	* Check in configure if selinux libraries are required in static version.
	* Add temporary debug code to find processes locking internal device.
	* Simplify build system, use autopoint and clean gettext processing.
	* Use proper NLS macros and detection (so the message translation works again).
	* Version 1.1.0-rc3.

2009-09-30  Milan Broz  <mbroz@redhat.com>
	* Fix exported symbols and versions in libcryptsetup.
	* Do not use internal lib functions in cryptsetup.
	* Add crypt_log to library.
	* Fix crypt_remove_device (remove, luksClose) implementation.
	* Move dm backend initialisation to library calls.
	* Move duplicate Command failed message to verbose level (error is printed always).
	* Add some password and used algorithms notes to man page.
	* Version 1.1.0-rc2.

2009-09-28  Milan Broz  <mbroz@redhat.com>
	* Add luksHeaderBackup and luksHeaderRestore commands.
	* Fail passphrase read if piped input no longer exists.
	* Version 1.1.0-rc1.

2009-09-15  Milan Broz  <mbroz@redhat.com>
	* Initialize crypto library before LUKS header load.
	* Fix manpage to not require --size which expands to device size by default.

2009-09-10  Milan Broz  <mbroz@redhat.com>
	* Clean up Makefiles and configure script.
	* Version 1.1.0-test0.

2009-09-08  Milan Broz  <mbroz@redhat.com>
	* Use dm-uuid for all crypt devices, contains device type and name now.
	* Try to read first sector from device to properly check that device is ready.

2009-09-02  Milan Broz  <mbroz@redhat.com>
	* Add luksSuspend (freeze device and wipe key) and luksResume (with provided passphrase).

2009-08-30  Milan Broz  <mbroz@redhat.com>
	* Require device device-mapper to build and do not use backend wrapper for dm calls.
	* Move memory locking and dm initialization to command layer.
	* Increase priority of process if memory is locked.
	* Add log macros and make logging modre consitent.
	* Move command successful messages to verbose level.
	* Introduce --debug parameter.
	* Move device utils code and provide context parameter (for log).
	* Keyfile now must be provided by path, only stdin file descriptor is used (api only).
	* Do not call isatty() on closed keyfile descriptor.
	* Run performance check for PBKDF2 from LUKS code, do not mix hash algoritms results.
	* Add ability to provide pre-generated master key and UUID in LUKS header format.
	* Add LUKS function to verify master key digest.
	* Move key slot manuipulation function into LUKS specific code.
	* Replace global options struct with separate parameters in helper functions.
	* Add new libcryptsetup API (documented in libcryptsetup.h).
	* Implement old API calls using new functions.
	* Remove old API code helper functions.
	* Add --master-key-file option for luksFormat and luksAddKey.

2009-08-17  Milan Broz  <mbroz@redhat.com>
	* Fix PBKDF2 speed calculation for large passhrases.
	* Allow using passphrase provided in options struct for LuksOpen.
	* Allow restrict keys size in LuksOpen.

2009-07-30  Milan Broz  <mbroz@redhat.com>
	* Fix errors when compiled with LUKS_DEBUG.
	* Print error when getline fails.
	* Remove po/cryptsetup-luks.pot, it's autogenerated.
	* Return ENOENT for empty keyslots, EINVAL will be used later for other type of error.
	* Switch PBKDF2 from internal SHA1 to libgcrypt, make hash algorithm not hardcoded to SHA1 here.
	* Add required parameters for changing hash used in LUKS key setup scheme.
	* Do not export simple XOR helper now used only inside AF functions.
	* Completely remove internal SHA1 implementanion code, not needed anymore.
	* Enable hash algorithm selection for LUKS through -h luksFormat option.

2009-07-28  Milan Broz  <mbroz@redhat.com>
	* Pad luks header to 512 sector size.
	* Rework read/write blockwise to not split operation to many pieces.
	* Use posix_memalign if available.

2009-07-22  Milan Broz  <mbroz@redhat.com>
	* Fix segfault if provided slot in luksKillslot is invalid.
	* Remove unneeded timeout when remove of temporary device succeeded.
Comment 1 ScytheMan 2010-01-08 10:17:04 UTC
rc4 released

http://code.google.com/p/cryptsetup/wiki/Cryptsetup110rc
Comment 2 ScytheMan 2010-01-18 15:16:11 UTC
Here is the link to the new release of cryptsetup (1.1.0) http://code.google.com/p/cryptsetup/wiki/Cryptsetup110
Comment 3 darkbasic 2010-02-13 14:25:03 UTC
If someone is interested I found one:
https://www.pentoo.ch/pentoo/browser/portage/trunk/sys-fs/cryptsetup/cryptsetup-1.1.0_rc3.ebuild
Comment 4 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2010-02-14 00:11:07 UTC
InCVS, please test.
Comment 5 Michal Terepeta 2010-02-14 21:17:21 UTC
(In reply to comment #4)
> InCVS, please test.

Thanks! Works fine for me.
Comment 6 Sergiy Borodych 2010-03-04 14:16:21 UTC
Please add BIG WARN to ebuild about it:

    * IMPORTANT: the default compiled-in cipher parameters changed
          o plain mode: aes-cbc-essiv:sha256 (default is backward incompatible!).
          o LUKS mode: aes-cbc-essiv:sha256 (only key size increased)
          o In both modes is now default key size 256bits.
          o Default compiled-in parameters are now cofigurable through configure options:

                --with-plain-* / --with-luks1-* (see configure --help) 

          o If you need backward compatible defaults for distribution use 

          configure --with-plain-mode=cbc-plain --with-luks1-keybits=128 

    * Default compiled-in modes are printed in "cryptsetup --help" output.


Hope this helps someone else, not just me