Summary: | sys-fs/cryptsetup-1.0.6-r2 (also 1.1.0) fails to create encrypted device when ESSIV is requested | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | aabugher |
Component: | Current packages | Assignee: | Gentoo's Team for Core System packages <base-system> |
Status: | CONFIRMED --- | ||
Severity: | normal | CC: | bugs, weigt.mathias |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | x86 | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Attachments: | kernel configuration (.config) |
Description
aabugher
2010-03-13 05:03:56 UTC
Created attachment 223367 [details]
kernel configuration (.config)
I confirm this behavior: cryptsetup -c aes-xts-essiv --debug -y -s 512 luksFormat /dev/sda8 # cryptsetup 1.1.0 processing "cryptsetup -c aes-xts-essiv --debug -y -s 512 luksFormat /dev/sda8" # Locking memory. WARNING! ======== This will overwrite data on /dev/sda8 irrevocably. Are you sure? (Type uppercase yes): YES # Allocating crypt device /dev/sda8 context. # Trying to open and read device /dev/sda8. # Initialising device-mapper backend. # Timeout set to 0 miliseconds. # Password retry count set to 0. # Iteration time set to 1000 miliseconds. # Password verification enabled. Enter LUKS passphrase: Verify passphrase: # Formatting device /dev/sda8 as type LUKS1. # Generating LUKS header version 1 using hash sha1, aes, xts-essiv, MK 64 bytes # PBKDF2: 392001 iterations per second using hash sha1. # Data offset 4040, UUID xxxxxxxxxxxxxx, digest iterations 47750 # Updating LUKS header of size 1024 on device /dev/sda8 # Reading LUKS header of size 1024 from device /dev/sda8 # Adding new keyslot -1 using volume key. # Calculating data for key slot 0 # Key slot 0 use 191406 password iterations. # Using hash sha1 for AF in key slot 0, 4000 stripes # Updating key slot 0 [0x1000] area on device /dev/sda8. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-2644 # dm create temporary-cryptsetup-2644 CRYPT-TEMP-temporary-cryptsetup-2644 OF [16384] # temporary-cryptsetup-2644: Stacking NODE_ADD (254,0) 0:0 0600 # dm reload temporary-cryptsetup-2644 OF [16384] device-mapper: reload ioctl failed: Invalid argument # dm remove temporary-cryptsetup-2644 OF [16384] # temporary-cryptsetup-2644: Stacking NODE_DEL (replaces other stacked ops) Failed to setup dm-crypt key mapping for device /dev/sda8. Check that kernel supports aes-xts-essiv cipher (check syslog for more info). # Releasing crypt device /dev/sda8 context. # Releasing device-mapper backend. # Unlocking memory. Command failed with code 5: Failed to setup dm-crypt key mapping for device /dev/sda8. Check that kernel supports aes-xts-essiv cipher (check syslog for more info). Using the latest cryptsetup version. All crypto related stuff is compiled as modules for the kernel. the same here with cryptsetup-1.0.6-r2 and aes-xts-plain or twofish-xts-plain Kernel: 2.6.32-r7 and all crypt-stuff as modules... Updating to cryptsetup-1.1.1 helped. aes-xts-plain is working now. |