mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-05 16:00:05 +01:00
Reported by `git ls-tree -rz --name-only | grep -Evz -e '\.(pdf|xz)$' -e ^po/ | xargs -r0 spellintian --`. All changes are documentation-related (comments, manuals, etc.) except for s/fial/fail/ in tests/unit-wipe-test. The remaining entry are AFAICT all false positives, mostly annotations such as `@param name name of xyz` or `struct foo foo`: $ git ls-tree -rz HEAD --name-only | grep -Evz -e '\.(pdf|xz)$' -e ^po/ | xargs -r0 spellintian -- COPYING.LGPL: "GNU Library Public License" -> "GNU Library General Public License" autogen.sh: echo echo (duplicate word) -> echo configure.ac: fi fi (duplicate word) -> fi docs/v1.7.2-ReleaseNotes: option option (duplicate word) -> option lib/crypto_backend/cipher_check.c: block block (duplicate word) -> block lib/libcryptsetup.h: name name (duplicate word) -> name lib/libcryptsetup.h: type type (duplicate word) -> type lib/libcryptsetup.h: passphrase passphrase (duplicate word) -> passphrase lib/libcryptsetup.h: flags flags (duplicate word) -> flags lib/libcryptsetup.h: password password (duplicate word) -> password lib/libcryptsetup.h: salt salt (duplicate word) -> salt lib/libcryptsetup.h: keyslot keyslot (duplicate word) -> keyslot lib/libcryptsetup.h: priority priority (duplicate word) -> priority lib/libcryptsetup.h: offset offset (duplicate word) -> offset lib/libcryptsetup.h: length length (duplicate word) -> length lib/libcryptsetup.h: keyfile keyfile (duplicate word) -> keyfile lib/libcryptsetup.h: token token (duplicate word) -> token lib/libcryptsetup.h: cipher cipher (duplicate word) -> cipher lib/libcryptsetup.h: size size (duplicate word) -> size lib/luks2/luks2_json_metadata.c: long long (duplicate word) -> long lib/luks2/luks2_keyslot_luks2.c: AFEKSize AFEKSize (duplicate word) -> AFEKSize lib/luks2/luks2_reencrypt.c: alignment alignment (duplicate word) -> alignment lib/luks2/luks2_reencrypt_digest.c: ptr ptr (duplicate word) -> ptr lib/luks2/luks2_reencrypt_digest.c: buffer buffer (duplicate word) -> buffer lib/luks2/luks2_segment.c: min min (duplicate word) -> min lib/verity/verity_fec.c: blocks blocks (duplicate word) -> blocks man/cryptsetup.8.adoc: LUKS LUKS (duplicate word) -> LUKS scripts/cryptsetup.conf.in: root root (duplicate word) -> root src/Makemodule.am: endif endif (duplicate word) -> endif src/cryptsetup.c: long long (duplicate word) -> long src/utils_args.c: long long (duplicate word) -> long tests/compat-test2: fi fi (duplicate word) -> fi tests/device-test: echo echo (duplicate word) -> echo tests/differ.c: long long (duplicate word) -> long tests/loopaes-test: done done (duplicate word) -> done tests/luks2-integrity-test: aead aead (duplicate word) -> aead tests/luks2-reencryption-test: fi fi (duplicate word) -> fi tests/mode-test: done done (duplicate word) -> done tests/password-hash-test: cat cat (duplicate word) -> cat tests/password-hash-test: fi fi (duplicate word) -> fi tests/unit-wipe.c: long long (duplicate word) -> long tests/verity-compat-test: done done (duplicate word) -> done tests/verity-compat-test: fi fi (duplicate word) -> fi tokens/ssh/cryptsetup-ssh.c: argp argp (duplicate word) -> argp tokens/ssh/cryptsetup-ssh.c: arguments arguments (duplicate word) -> arguments (Treated COPYING.LGPL as a false positive too since it's the exact text from https://www.gnu.org/licenses/old-licenses/lgpl-2.1.html .)
48 lines
2.0 KiB
Plaintext
48 lines
2.0 KiB
Plaintext
Cryptsetup 1.6.8 Release Notes
|
|
==============================
|
|
|
|
Changes since version 1.6.7
|
|
|
|
* If the null cipher (no encryption) is used, allow only empty password for LUKS.
|
|
(Previously cryptsetup accepted any password in this case.)
|
|
|
|
The null cipher can be used only for testing and it is used temporarily during
|
|
offline encrypting not yet encrypted device (cryptsetup-reencrypt tool).
|
|
|
|
Accepting only empty password prevents situation when someone adds another
|
|
LUKS device using the same UUID (UUID of existing LUKS device) with faked
|
|
header containing null cipher.
|
|
This could force user to use different LUKS device (with no encryption)
|
|
without noticing.
|
|
(IOW it prevents situation when attacker intentionally forces
|
|
user to boot into different system just by LUKS header manipulation.)
|
|
|
|
Properly configured systems should have an additional integrity protection
|
|
in place here (LUKS here provides only confidentiality) but it is better
|
|
to not allow this situation in the first place.
|
|
|
|
(For more info see QubesOS Security Bulletin QSB-019-2015.)
|
|
|
|
* Properly support stdin "-" handling for luksAddKey for both new and old
|
|
keyfile parameters.
|
|
|
|
* If encrypted device is file-backed (it uses underlying loop device),
|
|
cryptsetup resize will try to resize underlying loop device as well.
|
|
(It can be used to grow up file-backed device in one step.)
|
|
|
|
* Cryptsetup now allows one to use empty password through stdin pipe.
|
|
(Intended only for testing in scripts.)
|
|
|
|
Cryptsetup API NOTE:
|
|
|
|
Direct terminal handling and password calling callback for passphrase
|
|
entry will be removed from libcryptsetup in next major (2.x) version
|
|
(application should handle it itself).
|
|
It means that application have to always provide password in API calls.
|
|
|
|
Functions returning last error will be removed in next major version (2.x).
|
|
These functions did not work properly for early initialization errors
|
|
and application can implement better function easily using own error callback.
|
|
|
|
See comments in libcryptsetup.h for more info about deprecated functions.
|