170 Commits

Author SHA256 Message Date
6c60d3bd12 Accepting request 1330392 from home:pmonrealgonzalez:branches:security
- Update to 2.8.4:
  * Fix integritysetup resize (grow) of the device if integrity bitmap
    mode is used. Increasing the integrity device in bitmap mode did
    not work as integritysetup incorrectly used journal settings that
    were not applicable.
  * Fix device size status reports in cryptsetup and integritysetup.
    If the device uses a sector size larger than 512 bytes, the newly
    reported byte sizes (introduced in 2.8.0) in the status report
    were incorrectly displayed.
  * BITLK: Fix unlocking BitLocker device with recovery passphrase.
    If the recovery passphrase was present in the first keyslot, the
    device failed to unlock. This bug was introduced in 2.8.2 with
    Clear Key support.

OBS-URL: https://build.opensuse.org/request/show/1330392
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=219
2026-02-02 11:35:21 +00:00
75afc7c68f Accepting request 1326304 from home:pmonrealgonzalez:branches:security
- Update to 2.8.3:
  * Stable bug-fix release with minor extensions.
- Update to 2.8.2:
  * BITLK: Fix for BitLocker metadata validation on big-endian systems.

OBS-URL: https://build.opensuse.org/request/show/1326304
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=217
2026-01-09 09:49:50 +00:00
1934221283 Accepting request 1300733 from home:pmonrealgonzalez:branches:security
- Update to 2.8.1:
  * Fix status and deactivation of TCRYPT (VeraCrypt compatible) devices that use chained ciphers.
  * Fix unlocking BITLK (BitLocker compatible) devices with multibyte UTF8 characters in the passphrase.
  * Do not allow activation of the LUKS2 device if the used keyslot is not encrypted (it uses a null cipher).
    - Such a configuration cannot be created by cryptsetup, but can be crafted outside of it.
    - Null cipher is sometimes used to create an empty container for later reencryption.
    - Only an empty passphrase can activate such a container (the same as in LUKS1).
  * Do not silently decrease PBKDF parallel cost (threads) if set by an option.
    - The maximum parallel cost is limited to 4 threads.
  * Fixes to configuration and installation scripts.
    - Meson and autoconf tools now properly support --prefix option for temporary directory installation.
    - Multiple fixes and cleanups to config.h for compatibility between Meson and autoconf.
    - Fix the luks2-external-tokens-path Meson option to work the same as in autoconf.
    - Fix Meson install for tool binaries, install fvault2Open man page and include test/fuzz/meson.build in release.
  * Major update to manual pages.
    - Try to explain the PBKDF hardcoded limits.
    - Add a better explanation for automatic integrity tag recalculation.
    - Mention crypt/verity/integritytab.
    - Remove or reformulate some misleading warnings present only with old and no longer supported kernels.
    - Clarify that some commands do not wipe data and unify OPAL reset wording.
    - Clarify the --label option.
    - There are also many other grammar and stylistic fixes to unify the man-page style.
  * Fixes for false-positive and annoying (optional) warnings added in recent compilers.

OBS-URL: https://build.opensuse.org/request/show/1300733
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=215
2025-08-25 13:08:27 +00:00
c51a02df02 Accepting request 1288645 from home:pmonrealgonzalez:branches:security
- Update to 2.8.0:
  * Full release notes in:
    - https://cdn.kernel.org/pub/linux/utils/cryptsetup/v2.8/v2.8.0-ReleaseNotes
  * Introduce support for inline mode (use HW sectors with additional hardware
    metadata space).
  * Finalize use of keyslot context API.
  * Make all keyslot context types fully self-contained.
  * Add --key-description and --new-key-description cryptsetup options.
  * Support more precise keyslot selection in reencryption initialization.
  * Allow reencryption to resume using token and volume keys.
  * Cryptsetup repair command now tries to check LUKS keyslot areas for corruption.
  * Opal2 SED: PSID keyfile is now expected to be 32 alphanumeric characters.
  * Opal2: Avoid the Erase method and use Secure Erase for locking range.
  * Opal2: Fix some error description (in debug only).
  * Opal2: Do not allow deferred deactivation.
  * Allow --reduce-device-size and --device-size combination for reencryption
    (encrypt) action.
  * Fix the userspace storage backend to support kernel "capi:" cipher specification format.
  * Disallow conversion from LUKS2 to LUKS1 if kernel "capi:" cipher specification is used.
  * Explicitly disallow kernel "capi:" cipher specification format for LUKS2
    keyslot encryption.
  * Do not allow conversion of LUKS2 to LUKS1 if an unbound keyslot is present.
  * cryptsetup: Adjust the XTS key size for kernel "capi:" cipher specification.
  * Remove keyslot warning about possible failure due to low memory.
  * Do not limit Argon2 KDF memory cost on systems with more than 4GB of available memory.
  * Properly report out of memory error for cryptographic backends implementing Argon2.
  * Avoid KDF2 memory cost overflow on 32-bit platforms.
  * Do not use page size as a fallback for device block size.
  * veritysetup: Check hash device size in advance.
  * Print a better error message for unsupported LUKS2 AEAD device resize.

OBS-URL: https://build.opensuse.org/request/show/1288645
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=213
2025-06-28 06:12:06 +00:00
35bb9e51bc Accepting request 1281107 from home:pmonrealgonzalez:branches:security
- Add a dependency on device-mapper to libcryptsetup12 to install
  the required device-mapper udev rules. [bsc#1241612]

OBS-URL: https://build.opensuse.org/request/show/1281107
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=211
2025-05-29 10:27:47 +00:00
52fc9c1de7 Accepting request 1253108 from home:pmonrealgonzalez:branches:security
* Remove the dependency on libargon2 as is now provided by openssl.

OBS-URL: https://build.opensuse.org/request/show/1253108
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=209
2025-03-14 14:48:40 +00:00
f99cd330ef Accepting request 1253039 from home:pmonrealgonzalez:branches:security
- Set pbkdf2 as the default PBKDF algorithm in LUKS2 format.
  [bsc#1236375, bsc#1236164]
  * The default PBKDF algorithm in the LUKS2 format is now Argon2id
    but its not FIPS compliant. A system would be unbootable if using
    Argon2id or Argon2i for disk encryption and then switching to
    kernel FIPS mode. This can be avoided by setting pbkdf2 as default.
  * Build using the configure option --with-luks2-pbkdf=pbkdf2.

OBS-URL: https://build.opensuse.org/request/show/1253039
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=208
2025-03-14 14:18:28 +00:00
0a05ac33b3 Accepting request 1227947 from home:pmonrealgonzalez:branches:security
- cryptsetup-fips140-3.patch: extend the password for PBKDF2 benchmarking
  to be more than 20 chars to meet FIPS 140-3 requirements (bsc#1229975)

OBS-URL: https://build.opensuse.org/request/show/1227947
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=206
2024-12-03 09:35:06 +00:00
48feeb2c62 Accepting request 1200764 from home:pmonrealgonzalez:branches:security
- Update to 2.7.5:
  * Fix possible online reencryption data corruption (only in 2.7.x).
    In some situations (initializing a suspended device-mapper device),
    cryptsetup disabled direct-io device access. This caused unsafe
    online reencryption operations that could lead to data corruption.
    The code now adds strict checks (and aborts the operation) and
    changes direct-io detection code to prevent data corruption.
  * Fix a clang compilation error in SSH token plugin.
    As clang linker treats missing symbols as errors, the linker phase
    for the SSH token failed as the optional cryptsetup_token_buffer_free
    was not defined.
  * Fix crypto backend initialization in crypt_format_luks2_opal API call.

OBS-URL: https://build.opensuse.org/request/show/1200764
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=204
2024-09-13 07:39:51 +00:00
1ecd208401 back out x86-64-v3 change
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=203
2024-08-20 11:27:24 +00:00
9f23ec4642 Accepting request 1194754 from home:RN:cryptsetup
- Added optimization macros in .spec file for x86-64-v3 package

OBS-URL: https://build.opensuse.org/request/show/1194754
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=202
2024-08-19 19:51:29 +00:00
a54dbf7646 Accepting request 1190586 from home:mschreiner:branches:security
- Update to 2.7.4:
  * Detect device busy failure for device-mapper table-referenced
    devices.
  * Fix shared activation for dm-verity devices.
  * Add --shared option for veritysetup open action.
  * Do not use exclusive flag for the allocated backing loop files.
  * Fixes for problems found by static analyzers and Valgrind.
  * Fixes to tests and CI scripts.
- Use fdupes to link identical man pages.

OBS-URL: https://build.opensuse.org/request/show/1190586
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=200
2024-07-31 06:37:09 +00:00
460f5efd33 Accepting request 1190462 from home:pmonrealgonzalez:branches:security
- Update to 2.7.3:
  * Do not allow formatting LUKS2 with Opal SED (hardware encryption)
    if the reported logical sector size for the block device and Opal
    encryption logical block differs.
  * Fixes to wiping LUKS2 headers after Opal locking area erase.
  * Mention the need for possible PSID revert before Opal format for some
    drives (man page).
  * Fix Bitlocker-compatible code to ignore newly seen metadata entries.
  * Fix interactive query retry if LUKS2 unbound keyslot is present.
  * Detect unsupported zoned devices for LUKS header devices.
  * Allow "capi" cipher format for benchmark command and fix parsing
    of plain IV in "capi" format.
  * Add support for HCTR2 encryption mode.
  * Source code now uses SPDX license identifiers instead of full
    license preambles.
  * Fix missing includes for cryptographic backend that could cause
    compilation errors for some systems.
  * Fix tests to work correctly in FIPS mode with recent OpenSSL 3.2.
  * Fix various (mostly false positive) issues detected by Coverity.

OBS-URL: https://build.opensuse.org/request/show/1190462
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=199
2024-07-30 11:55:40 +00:00
9239dc4824 Accepting request 1187073 from home:pevik:branches:security
- License: Replace legacy 'AND SUSE-GPL-2.0-with-openssl-exception' with
  'WITH cryptsetup-OpenSSL-exception' (the official SPDX exception).

OBS-URL: https://build.opensuse.org/request/show/1187073
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=198
2024-07-30 11:52:06 +00:00
9192c0ec66 Accepting request 1166516 from home:AndreasStieger:branches:security
cryptsetup 2.7.2

OBS-URL: https://build.opensuse.org/request/show/1166516
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=196
2024-04-10 07:32:59 +00:00
26078bfb02 Accepting request 1157608 from home:pmonrealgonzalez:branches:security
- Update to 2.7.1:
 * Fix interrupted LUKS1 decryption resume.
   With the replacement of the cryptsetup-reencrypt tool by the cryptsetup
   reencrypt command, resuming the interrupted LUKS1 decryption operation
   could fail. LUKS2 was not affected.
 * Allow --link-vk-to-keyring with --test-passphrase option.
   This option allows uploading the volume key in a user-specified kernel
   keyring without activating the device.
 * Fix crash when --active-name was used in decryption initialization.
 * Updates and changes to man pages, including indentation, sorting options
   alphabetically, fixing mistakes in crypt_set_keyring_to_link, and fixing
   some typos.
 * Fix compilation with libargon2 when --disable-internal-argon2 was used.
 * Do not require installed argon2.h header and never compile internal
   libargon2 code if the crypto library directly supports Argon2.
 * Fixes to regression tests to support older Linux distributions.

OBS-URL: https://build.opensuse.org/request/show/1157608
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=194
2024-03-15 11:46:26 +00:00
ad949ba349 Accepting request 1142596 from home:pmonrealgonzalez:branches:security
- Update to 2.7.0:
  * Full changelog in:
    mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.7/v2.7.0-ReleaseNotes
  * Introduce support for hardware OPAL disk encryption.
  * plain mode: Set default cipher to aes-xts-plain64 and password hashing
    to sha256.
  * Allow activation (open), luksResume, and luksAddKey to use the volume
    key stored in a keyring.
  * Allow to store volume key to a user-specified keyring in open and
    luksResume commands.
  * Do not flush IO operations if resize grows the device.
    This can help performance in specific cases where the encrypted device
    is extended automatically while running many IO operations.
  * Use only half of detected free memory for Argon2 PBKDF on systems
    without swap (for LUKS2 new keyslot or format operations).
  * Add the possibility to specify a directory for external LUKS2 token
    handlers (plugins).
  * Do not allow reencryption/decryption on LUKS2 devices with
    authenticated encryption or hardware (OPAL) encryption.
  * Do not fail LUKS format if the operation was interrupted on subsequent
    device wipe.
  * Fix the LUKS2 keyslot option to be used while activating the device
    by a token.
  * Properly report if the dm-verity device cannot be activated due to
    the inability to verify the signed root hash (ENOKEY).
  * Fix to check passphrase for selected keyslot only when adding
    new keyslot.
  * Fix to not wipe the keyslot area before in-place overwrite.
  * bitlk: Fix segfaults when attempting to verify the volume key.
  * Add --disable-blkid command line option to avoid blkid device check.

OBS-URL: https://build.opensuse.org/request/show/1142596
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=192
2024-01-29 17:02:57 +00:00
9be144db60 Accepting request 1098511 from home:pmonrealgonzalez:branches:security
- luksFormat: Handle system with low memory and no swap space [bsc#1211079]
  * Check for physical memory available also in PBKDF benchmark.
  * Try to avoid OOM killer on low-memory systems without swap.
  * Use only half of detected free memory on systems without swap.
  * Add patches:
    - cryptsetup-Check-for-physical-memory-available-also-in-PBKDF-be.patch
    - cryptsetup-Try-to-avoid-OOM-killer-on-low-memory-systems-withou.patch
    - cryptsetup-Use-only-half-of-detected-free-memory-on-systems-wit.patch

OBS-URL: https://build.opensuse.org/request/show/1098511
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=190
2023-07-13 11:20:07 +00:00
e38e78bf3a Accepting request 1093121 from home:pmonrealgonzalez:branches:security
- Enable running the regression test suite.
- Force a regeneration of the man pages from AsciiDoc.
- Add LUKS1 and LUKS2 On-Disk Format Specification pdfs to doc.

- FIPS: Remove not needed libcryptsetup12-hmac package that contains
  the HMAC checksums for integrity checking for FIPS. [bsc#1185116]
  * Remove the cryptsetup-rpmlintrc file.
  * Remove not needed fipscheck dependency.

OBS-URL: https://build.opensuse.org/request/show/1093121
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=188
2023-06-15 12:05:44 +00:00
d1bbcdc3a5 Accepting request 1064729 from home:AndreasStieger:branches:security
cryptsetup 2.6.1

OBS-URL: https://build.opensuse.org/request/show/1064729
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=186
2023-02-12 21:21:51 +00:00
ec41ae252e Accepting request 1052843 from home:lnussel:usrmerge
Replace transitional %usrmerged macro with regular version check (boo#1206798)

OBS-URL: https://build.opensuse.org/request/show/1052843
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=184
2023-01-04 16:08:29 +00:00
18d9c1df91 Accepting request 1038690 from home:polslinux:branches:security
- cryptsetup 2.6.0:
  * Introduce support for handling macOS FileVault2 devices (FVAULT2).
  * libcryptsetup: no longer use global memory locking through mlockall()
  * libcryptsetup: process priority is increased only for key derivation
    (PBKDF) calls.
  * Add new LUKS keyslot context handling functions and API.
  * The volume key may now be extracted using a passphrase, keyfile, or
    token. For LUKS devices, it also returns the volume key after
    a successful crypt_format call.
  * Fix --disable-luks2-reencryption configuration option.
  * cryptsetup: Print a better error message and warning if the format
    produces an image without space available for data.
  * Print error if anti-forensic LUKS2 hash setting is not available.
    If the specified hash was not available, activation quietly failed.
  * Fix internal crypt segment compare routine if the user
    specified cipher in kernel format (capi: prefix).
  * cryptsetup: Add token unassign action.
    This action allows removing token binding on specific keyslot.
  * veritysetup: add support for --use-tasklets option.
    This option sets try_verify_in_tasklet kernel dm-verity option
    (available since Linux kernel 6.0) to allow some performance
    improvement on specific systems.
  * Provide pkgconfig Require.private settings.
    While we do not completely provide static build on udev systems,
    it helps produce statically linked binaries in certain situations.
  * Always update automake library files if autogen.sh is run.
    For several releases, we distributed older automake scripts by mistake.
  * reencryption: Fix user defined moved segment size in LUKS2 decryption.
    The --hotzone-size argument was ignored in cases where the actual data
    size was less than the original LUKS2 data offset.
  * Delegate FIPS mode detection to configured crypto backend.
    System FIPS mode check no longer depends on /etc/system-fips file.
  * Update documentation, including FAQ and man pages.

OBS-URL: https://build.opensuse.org/request/show/1038690
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=182
2022-11-29 07:29:17 +00:00
680d3223dd Accepting request 1003354 from home:bluca:branches:security
- Add virtual provides for 'integritysetup' and 'veritysetup' to match
  package names provided by Fedora/RHEL, to allow the same set of
  dependencies to be used across all RPM distributions.

OBS-URL: https://build.opensuse.org/request/show/1003354
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=180
2022-09-14 07:18:13 +00:00
7096638fa6 Accepting request 999046 from home:lnussel:branches:security
- cryptsetup 2.5.0:
  * Split manual pages into per-action pages and use AsciiDoc format. 
  * Remove cryptsetup-reencrypt tool from the project and move reencryption
    to already existing "cryptsetup reencrypt" command.
    If you need to emulate the old cryptsetup-reencrypt binary, use simple
    wrappers script running "exec cryptsetup reencrypt $@".
  * LUKS2: implement --decryption option that allows LUKS removal.
  * Fix decryption operation with --active-name option and restrict
    it to be used only with LUKS2.
  * Do not refresh reencryption digest when not needed.
    This should speed up the reencryption resume process.
  * Store proper resilience data in LUKS2 reencrypt initialization.
    Resuming reencryption now does not require specification of resilience
    type parameters if these are the same as during initialization.
  * Properly wipe the unused area after reencryption with datashift in
    the forward direction.
  * Check datashift value against larger sector size.
    For example, it could cause an issue if misaligned 4K sector appears
    during decryption.
  * Do not allow sector size increase reencryption in offline mode.
  * Do not allow dangerous sector size change during reencryption.
  * Ask the user for confirmation before resuming reencryption.
  * Do not resume reencryption with conflicting parameters.
  * Add --force-offline-reencrypt option.
  * Do not allow nested encryption in LUKS reencrypt.
  * Support all options allowed with luksFormat with encrypt action.
  * Add resize action to integritysetup.
  * Remove obsolete dracut plugin reencryption example.
  * Fix possible keyslot area size overflow during conversion to LUKS2.
  * Allow use of --header option for cryptsetup close.

OBS-URL: https://build.opensuse.org/request/show/999046
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=178
2022-08-24 11:32:11 +00:00
c1513500b9 Accepting request 946498 from home:AndreasStieger:branches:security
cryptsetup 2.4.3
    CVE-2021-4122, boo#1194469

OBS-URL: https://build.opensuse.org/request/show/946498
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=177
2022-01-17 09:00:02 +00:00
d50fe3a20b - cryptsetup 2.4.1
* Fix compilation for libc implementations without dlvsym().
  * Fix compilation and tests on systems with non-standard libraries
  * Try to workaround some issues on systems without udev support.
  * Fixes for OpenSSL3 crypto backend (including FIPS mode).
  * Print error message when assigning a token to an inactive keyslot.
  * Fix offset bug in LUKS2 encryption code if --offset option was used.
  * Do not allow LUKS2 decryption for devices with data offset.
  * Fix LUKS1 cryptsetup repair command for some specific problems.
- cryptsetup 2.4.0 (jsc#SLE-20275)

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=176
2021-09-16 15:25:13 +00:00
08914ca36a - As YaST passes necessary parameters to cryptsetup anyway, we do
not necessarily need to take grub into consideration. So back to
  Argon2 to see how it goes.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=175
2021-08-25 13:47:31 +00:00
0bcd0cd3ca update
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=174
2021-08-23 05:09:18 +00:00
b0f1e566b3 add feature reference
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=173
2021-08-12 13:00:47 +00:00
82c892b805 - need to use PBKDF2 by default for LUKS2 as grub can't decrypt when
using Argon.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=172
2021-08-03 13:44:07 +00:00
f4aaac2569 merge
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=171
2021-08-02 15:43:50 +00:00
0248560949 - crypsetup 2.4.0~rc1
* External LUKS token plugins
  * Experimental SSH token
  * Default LUKS2 PBKDF is now Argon2id
  * Increase minimal memory cost for Argon2 benchmark to 64MiB.
  * Autodetect optimal encryption sector size on LUKS2 format.
  * Use VeraCrypt option by default and add --disable-veracrypt option.
  * Support --hash and --cipher to limit opening time for TCRYPT type
  * Fixed default OpenSSL crypt backend support for OpenSSL3.
  * integritysetup: add integrity-recalculate-reset flag.
  * cryptsetup: retains keyslot number in luksChangeKey for LUKS2.
  * Fix cryptsetup resize using LUKS2 tokens.
  * Add close --deferred and --cancel-deferred options.
  * Rewritten command-line option parsing to avoid libpopt arguments
    memory leaks.
  * Add --test-args option.
- switch to LUKS2 default format

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=170
2021-08-02 15:10:27 +00:00
e2130168b1 - cryptsetup 2.3.6:
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=169
2021-07-01 12:55:11 +00:00
e15a650423 Accepting request 878732 from home:AndreasStieger:branches:security
cryptsetup 2.3.5

OBS-URL: https://build.opensuse.org/request/show/878732
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=167
2021-03-15 07:59:10 +00:00
ff75309beb typo
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=165
2020-12-08 12:03:55 +00:00
16ded7468a - SLE marker: implements jsc#SLE-5911, bsc#116558, jsc#SLE-145149
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=164
2020-12-08 08:53:32 +00:00
3e138d5980 Accepting request 849583 from home:lnussel:usrmove
- prepare usrmerge (boo#1029961)

OBS-URL: https://build.opensuse.org/request/show/849583
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=162
2020-11-20 09:26:02 +00:00
285a825e71 Accepting request 832026 from home:lnussel:branches:security
- Update to 2.3.4:
  * Fix a possible out-of-bounds memory write while validating LUKS2 data
    segments metadata (CVE-2020-14382, boo#1176128).
  * Ignore reported optimal IO size if not aligned to minimal page size.
  * Added support for new no_read/write_wrokqueue dm-crypt options (kernel 5.9).
  * Added support panic_on_corruption option for dm-verity devices (kernel 5.9).
  * Support --master-key-file option for online LUKS2 reencryption
  * Always return EEXIST error code if a device already exists.
  * Fix a problem in integritysetup if a hash algorithm has dash in the name.
  * Fix crypto backend to properly handle ECB mode.
  * TrueCrypt/VeraCrypt compatible mode now supports the activation of devices
    with a larger sector.
  * LUKS2: Do not create excessively large headers.
  * Fix unspecified sector size for BitLocker compatible mode.
  * Fix reading key data size in metadata for BitLocker compatible mode.

OBS-URL: https://build.opensuse.org/request/show/832026
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=160
2020-09-04 08:13:03 +00:00
0df09459ad Accepting request 810023 from home:AndreasStieger:branches:security
cryptsetup 2.3.3

OBS-URL: https://build.opensuse.org/request/show/810023
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=158
2020-05-29 15:01:56 +00:00
ccab5c38dc - Split translations to -lang package
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=156
2020-04-02 14:37:41 +00:00
08ab226288 - New version to 2.3.1
* Support VeraCrypt 128 bytes passwords.
    VeraCrypt now allows passwords of maximal length 128 bytes
    (compared to legacy TrueCrypt where it was limited by 64 bytes).
  * Strip extra newline from BitLocker recovery keys
    There might be a trailing newline added by the text editor when
    the recovery passphrase was passed using the --key-file option.
  * Detect separate libiconv library.
    It should fix compilation issues on distributions with iconv
    implemented in a separate library.
  * Various fixes and workarounds to build on old Linux distributions.
  * Split lines with hexadecimal digest printing for large key-sizes.
  * Do not wipe the device with no integrity profile.
    With --integrity none we performed useless full device wipe.
  * Workaround for dm-integrity kernel table bug.
    Some kernels show an invalid dm-integrity mapping table
    if superblock contains the "recalculate" bit. This causes
    integritysetup to not recognize the dm-integrity device.
    Integritysetup now specifies kernel options such a way that
    even on unpatched kernels mapping table is correct.
  * Print error message if LUKS1 keyslot cannot be processed.
    If the crypto backend is missing support for hash algorithms
    used in PBKDF2, the error message was not visible.
  * Properly align LUKS2 keyslots area on conversion.
    If the LUKS1 payload offset (data offset) is not aligned
    to 4 KiB boundary, new LUKS2 keyslots area in now aligned properly.
  * Validate LUKS2 earlier on conversion to not corrupt the device
    if binary keyslots areas metadata are not correct.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=155
2020-04-02 14:27:54 +00:00
ec9a2ca121 Accepting request 769866 from home:polslinux:branches:security
- Update to 2.3.0 (include release notes for 2.2.0)
  * BITLK (Windows BitLocker compatible) device access
  * Veritysetup now supports activation with additional PKCS7 signature
    of root hash through --root-hash-signature option.
  * Integritysetup now calculates hash integrity size according to algorithm
    instead of requiring an explicit tag size.
  * Integritysetup now supports fixed padding for dm-integrity devices.
  * A lot of fixes to online LUKS2 reecryption.
  * Add crypt_resume_by_volume_key() function to libcryptsetup.
    If a user has a volume key available, the LUKS device can be resumed
    directly using the provided volume key.
    No keyslot derivation is needed, only the key digest is checked.
  * Implement active device suspend info.
    Add CRYPT_ACTIVATE_SUSPENDED bit to crypt_get_active_device() flags
    that informs the caller that device is suspended (luksSuspend).
  * Allow --test-passphrase for a detached header.
    Before this fix, we required a data device specified on the command
    line even though it was not necessary for the passphrase check.
  * Allow --key-file option in legacy offline encryption.
    The option was ignored for LUKS1 encryption initialization.
  * Export memory safe functions.
    To make developing of some extensions simpler, we now export
    functions to handle memory with proper wipe on deallocation.
  * Fail crypt_keyslot_get_pbkdf for inactive LUKS1 keyslot.
  * Add optional global serialization lock for memory hard PBKDF.
  * Abort conversion to LUKS1 with incompatible sector size that is
    not supported in LUKS1.
  * Report error (-ENOENT) if no LUKS keyslots are available. User can now
    distinguish between a wrong passphrase and no keyslot available.
  * Fix a possible segfault in detached header handling (double free).
  * Add integritysetup support for bitmap mode introduced in Linux kernel 5.2.
  * The libcryptsetup now keeps all file descriptors to underlying device
    open during the whole lifetime of crypt device context to avoid excessive
    scanning in udev (udev run scan on every descriptor close).
  * The luksDump command now prints more info for reencryption keyslot
    (when a device is in-reencryption).
  * New --device-size parameter is supported for LUKS2 reencryption.
  * New --resume-only parameter is supported for LUKS2 reencryption.
  * The repair command now tries LUKS2 reencryption recovery if needed.
  * If reencryption device is a file image, an interactive dialog now
    asks if reencryption should be run safely in offline mode
    (if autodetection of active devices failed).
  * Fix activation through a token where dm-crypt volume key was not
    set through keyring (but using old device-mapper table parameter mode).
  * Online reencryption can now retain all keyslots (if all passphrases
    are provided). Note that keyslot numbers will change in this case.
  * Allow volume key file to be used if no LUKS2 keyslots are present.
  * Print a warning if online reencrypt is called over LUKS1 (not supported).
  * Fix TCRYPT KDF failure in FIPS mode.
  * Remove FIPS mode restriction for crypt_volume_key_get.
  * Reduce keyslots area size in luksFormat when the header device is too small.
  * Make resize action accept --device-size parameter (supports units suffix).

OBS-URL: https://build.opensuse.org/request/show/769866
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=153
2020-02-04 16:53:39 +00:00
8118a35bbf Accepting request 739355 from home:vitezslav_cizek:branches:security
- Create a weak dependency cycle between libcryptsetup and
  libcryptsetup-hmac to make sure they are installed together
  (bsc#1090768)

OBS-URL: https://build.opensuse.org/request/show/739355
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=151
2019-12-11 15:11:37 +00:00
2e47eabd89 retrofit bug number for sle
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=149
2019-05-09 11:56:46 +00:00
5c5885b6c9 Accepting request 676570 from home:jengelh:branches:security
- Use noun phrase in summary.

OBS-URL: https://build.opensuse.org/request/show/676570
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=147
2019-02-18 12:27:45 +00:00
45bd6d8937 - New version 2.1.0
* The default size of the LUKS2 header is increased to 16 MB.
    It includes metadata and the area used for binary keyslots;
    it means that LUKS header backup is now 16MB in size.
  * Cryptsetup now doubles LUKS default key size if XTS mode is used
    (XTS mode uses two internal keys). This does not apply if key size
    is explicitly specified on the command line and it does not apply
    for the plain mode.
    This fixes a confusion with AES and 256bit key in XTS mode where
    code used AES128 and not AES256 as often expected.
  * Default cryptographic backend used for LUKS header processing is now
    OpenSSL. For years, OpenSSL provided better performance for PBKDF.
  * The Python bindings are no longer supported and the code was removed
    from cryptsetup distribution. Please use the libblockdev project
    that already covers most of the libcryptsetup functionality
    including LUKS2.
  * Cryptsetup now allows using --offset option also for luksFormat.
  * Cryptsetup now supports new refresh action (that is the alias for
    "open --refresh").
  * Integritysetup now supports mode with detached data device through
    new --data-device option.
- 2.1.0 would use LUKS2 as default, we stay with LUKS1 for now until
  someone has time to evaluate the fallout from switching to LUKS2.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=146
2019-02-15 14:36:10 +00:00
605e4f2027 Accepting request 645498 from home:lnussel:branches:security
- Suggest hmac package (boo#1090768)
- remove old upgrade hack for upgrades from 12.1
- New version 2.0.5
  Changes since version 2.0.4
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  * Wipe full header areas (including unused) during LUKS format.
    Since this version, the whole area up to the data offset is zeroed,
    and subsequently, all keyslots areas are wiped with random data.
    This ensures that no remaining old data remains in the LUKS header
    areas, but it could slow down format operation on some devices.
    Previously only first 4k (or 32k for LUKS2) and the used keyslot
    was overwritten in the format operation.
  * Several fixes to error messages that were unintentionally replaced
    in previous versions with a silent exit code.
    More descriptive error messages were added, including error
    messages if
     - a device is unusable (not a block device, no access, etc.),
     - a LUKS device is not detected,
     - LUKS header load code detects unsupported version,
     - a keyslot decryption fails (also happens in the cipher check),
     - converting an inactive keyslot.
  * Device activation fails if data area overlaps with LUKS header.
  * Code now uses explicit_bzero to wipe memory if available
    (instead of own implementation).
  * Additional VeraCrypt modes are now supported, including Camellia
    and Kuznyechik symmetric ciphers (and cipher chains) and Streebog
    hash function. These were introduced in a recent VeraCrypt upstream.
    Note that Kuznyechik requires out-of-tree kernel module and
    Streebog hash function is available only with the gcrypt cryptographic
    backend for now.

OBS-URL: https://build.opensuse.org/request/show/645498
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=144
2018-10-31 08:59:56 +00:00
e0a149af87 - New version 2.0.4
Changes since version 2.0.3
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  * Use the libblkid (blockid) library to detect foreign signatures
    on a device before LUKS format and LUKS2 auto-recovery.
    This change fixes an unexpected recovery using the secondary
    LUKS2 header after a device was already overwritten with
    another format (filesystem or LVM physical volume).
    LUKS2 will not recreate a primary header if it detects a valid
    foreign signature. In this situation, a user must always
    use cryptsetup repair command for the recovery.
    Note that libcryptsetup and utilities are now linked to libblkid
    as a new dependence.
    To compile code without blockid support (strongly discouraged),
    use --disable-blkid configure switch.
  * Add prompt for format and repair actions in cryptsetup and
    integritysetup if foreign signatures are detected on the device
    through the blockid library.
    After the confirmation, all known signatures are then wiped as
    part of the format or repair procedure.
  * Print consistent verbose message about keyslot and token numbers.
    For keyslot actions: Key slot <number> unlocked/created/removed.
    For token actions: Token <number> created/removed.
  * Print error, if a non-existent token is tried to be removed.
  * Add support for LUKS2 token definition export and import.
    The token command now can export/import customized token JSON file
    directly from command line. See the man page for more details.
  * Add support for new dm-integrity superblock version 2.
  * Add an error message when nothing was read from a key file.
  * Update cryptsetup man pages, including --type option usage.

OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=141
2018-08-21 07:44:40 +00:00
82d2d65ee8 Accepting request 574741 from home:AndreasStieger:branches:security
untested 2.0.1

OBS-URL: https://build.opensuse.org/request/show/574741
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=139
2018-02-09 15:48:12 +00:00
17dad30bc1 Accepting request 561151 from home:archie172:branches:security
- Update to version 2.0.0:
  * Add support for new on-disk LUKS2 format
  * Enable to use system libargon2 instead of bundled version
  * Install tmpfiles.d configuration for LUKS2 locking directory
  * New command integritysetup: support for the new dm-integrity kernel target
  * Support for larger sector sizes for crypt devices
  * Miscellaneous fixes and improvements

OBS-URL: https://build.opensuse.org/request/show/561151
OBS-URL: https://build.opensuse.org/package/show/security/cryptsetup?expand=0&rev=136
2018-01-09 08:52:58 +00:00