Mailinglist Archive: opensuse-security (145 mails)

< Previous Next >
Re: [suse-security] twofish256 crypto-loop
  • From: Arvin Schnell <arvin@xxxxxxx>
  • Date: Tue, 9 Nov 2004 19:22:53 +0100
  • Message-id: <20041109182253.GA14256@xxxxxxx>
On Tue, Nov 09, 2004 at 06:33:29PM +0100, Torsten Flammiger wrote:
> Hi,
>
> i used an encrypted partition using twofish-256 under gentoo with kernel
> 2.6.8.1
> and 2.6.9. Today i installed SuSE 9.2 and would like to take over my data
> from that partition/harddisk. But that failed with:
>
> requested cipher or key length (256 bits) not supported by kernel
>
> after a long warning message:
>
> <snip>
> Passwords shorter than 20 characters are considered too short and insecure.
> Use of rmd160 password hash permits use of such short passwords for
> compatibility with other systems that do not enforce minimum length.
> SuSE has introduced a patch which also permits short passwords with
> a minimal length of 8 characters for all other hashes.
> Hopefully this message is annoying enough that you discontinue using such
> short passwords.
> </snip>
>
> I thought, ok lets use rmd160:
> # losetup -e twofish256 -H rmd160 /dev/loop0 /dev/hdb1
> but that did not help at all
>
> The twofish-module loads fine into the running kernel.
>
> Something i missed?

I think you need the cryptoloop kernel module loaded.

ciao Arvin

< Previous Next >
References