"Fossies" - the Fresh Open Source Software Archive

Member "cryptsetup-2.4.3/docs/v1.1.0-ReleaseNotes" (7 Feb 2012, 5037 Bytes) of package /linux/misc/cryptsetup-2.4.3.tar.xz:

As a special service "Fossies" has tried to format the requested text file into HTML format (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 Cryptsetup 1.1.0 Release Notes
    2 ==============================
    4 Changes since version 1.0.7
    5 ----------------------------
    7 Important changes:
    8 ~~~~~~~~~~~~~~~~~~
   10  * IMPORTANT: the default compiled-in cipher parameters changed
   11 	plain mode: aes-cbc-essiv:sha256 (default is backward incompatible!).
   12 	LUKS mode: aes-cbc-essiv:sha256 (only key size increased)
   13 	In both modes is now default key size 256bits.
   15 	 * Default compiled-in parameters are now configurable through configure options:
   16 	   --with-plain-* / --with-luks1-* (see configure --help)
   18 	 * If you need backward compatible defaults for distribution use
   19 	   configure --with-plain-mode=cbc-plain --with-luks1-keybits=128
   21 	 Default compiled-in modes are printed in "cryptsetup --help" output.
   23  * Change in iterations count (LUKS):
   24 	The slot and key digest iteration minimum count is now 1000.
   25 	The key digest iteration count is calculated from iteration time (approx 1/8 of req. time).
   26 	For more info about above items see discussion here: http://tinyurl.com/yaug97y
   28  * New libcryptsetup API (documented in libcryptsetup.h).
   30 	The old API (using crypt_options struct) is still available but will remain
   31 	frozen and not used for new functions.
   32 	Soname of library changed to libcryptsetup.so.1.0.0.
   33 	(But only recompilation should be needed for old programs.)
   35 	The new API provides much more flexible operation over LUKS device for
   36 	applications, it is preferred that new applications will use libcryptsetup
   37 	and not wrapper around cryptsetup binary.
   39  * New luksHeaderBackup and luksHeaderRestore commands.
   41 	These commands allows binary backup of LUKS header.
   42 	Please read man page about possible security issues with backup files.
   44  * New luksSuspend (freeze device and wipe key) and luksResume (with provided passphrase).
   46 	luksSuspend wipe encryption key in kernel memory and set device to suspend
   47 	(blocking all IO) state. This option can be used for situations when you need
   48 	temporary wipe encryption key (like suspend to RAM etc.)
   49 	Please read man page for more information.
   51  * New --master-key-file option for luksFormat and luksAddKey.
   53 	User can now specify pre-generated master key in file, which allows regenerating
   54 	LUKS header or add key with only master key knowledge.
   56  * Uses libgcrypt and enables all gcrypt hash algorithms for LUKS through -h luksFormat option.
   58 	Please note that using different hash for LUKS header make device incompatible with
   59 	old cryptsetup releases.
   61  * Introduces --debug parameter.
   63 	Use when reporting bugs (just run cryptsetup with --debug and attach output
   64 	to issue report.) Sensitive data are never printed to this log.
   66  * Moves command successful messages to verbose level.
   68  * Requires device-mapper library and libgcrypt to build.
   70  * Uses dm-uuid for all crypt devices, contains device type and name now.
   72  * Removes support for dangerous non-exclusive option
   73 	(it is ignored now, LUKS device must be always opened exclusive)
   75 Other changes:
   76 ~~~~~~~~~~~~~~
   77  * Fixed localization to work again. Also cryptsetup is now translated by translationproject.org.
   78  * Fix some libcryptsetup problems, including
   79     * exported symbols and versions in libcryptsetup (properly use versioned symbols)
   80     * Add crypt_log library function.
   81     * Add CRYPT_ prefix to enum defined in libcryptsetup.h.
   82  * Move duplicate Command failed message to verbose level (error is printed always).
   83  * Fix several problems in build system
   84     * use autopoint and clean gettext processing.
   85     * Check in configure if selinux libraries are required in static version.
   86     * Fix build for non-standard location of gcrypt library.
   87  * Add temporary debug code to find processes locking internal device.
   88  * Fix error handling during reading passphrase.
   89  * Fail passphrase read if piped input no longer exists.
   90  * Fix man page to not require --size which expands to device size by default.
   91  * Clean up Makefiles and configure script.
   92  * Try to read first sector from device to properly check that device is ready.
   93  * Move memory locking and dm initialization to command layer.
   94  * Increase priority of process if memory is locked.
   95  * Add log macros and make logging more consistent.
   96  * Keyfile now must be provided by path, only stdin file descriptor is used (api only).
   97  * Do not call isatty() on closed keyfile descriptor.
   98  * Move key slot manipulation function into LUKS specific code.
   99  * Replace global options struct with separate parameters in helper functions.
  100  * Implement old API calls using new functions.
  101  * Allow using passphrase provided in options struct for LuksOpen.
  102  * Allow restrict keys size in LuksOpen.
  103  * Fix errors when compiled with LUKS_DEBUG.
  104  * Print error when getline fails.
  105  * Completely remove internal SHA1 implementation code, not needed anymore.
  106  * Pad luks header to 512 sector size.
  107  * Rework read/write blockwise to not split operation to many pieces.
  108  * Use posix_memalign if available.
  109  * Fix segfault if provided slot in luksKillslot is invalid.
  110  * Remove unneeded timeout when remove of temporary device succeeded.