Bug#381981: crypto installation report (root on dm-crypt, loop-AES)
Package: installation-reports
Boot method: businesscard ISO
Image version: 2006-08-07 build from
http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso
Machine: VMWare Player 1.0.1 build-19317
Memory: 128MB
Partitions:
Filesystem Type 1K-blocks Used Available Use% Mounted on
/dev/mapper/crypt0
ext3 917414 270869 597600 32% /
tmpfs tmpfs 63580 0 63580 0% /dev/shm
/dev/sda2 ext3 45162 10727 32026 26% /boot
/dev/mapper/crypt1
ext3 89361 4127 80466 5% /srv
tmpfs tmpfs 10240 100 10140 1% /dev
# /etc/fstab: static file system information.
#
# <file system> <mount point> <type> <options> <dump> <pass>
proc /proc proc defaults 0 0
/dev/mapper/crypt0 / ext3 defaults,errors=remount-ro 0 1
/dev/sda2 /boot ext3 defaults 0 2
/dev/mapper/crypt1 /srv ext3 defaults 0 2
/dev/sda5 none swap sw,loop=/dev/loop0,encryption=serpent128 0 0
/dev/hdc /media/cdrom0 udf,iso9660 user,noauto 0 0
/dev/fd0 /media/floppy0 auto rw,user,noauto 0 0
/etc/crypttab:
crypt0 /dev/sda1 none luks
crypt1 /dev/sda3 none luks
cryptsetup status crypt{0,1}:
/dev/mapper/crypt0 is active:
cipher: aes-cbc-essiv:sha256
keysize: 256 bits
device: /dev/.static/dev/sda1
offset: 2056 sectors
size: 1957811 sectors
mode: read/write
/dev/mapper/crypt1 is active:
cipher: blowfish-cbc-essiv:sha256
keysize: 256 bits
device: /dev/.static/dev/sda3
offset: 2056 sectors
size: 190724 sectors
mode: read/write
losetup -a:
/dev/loop/0: [000c]:4381 (/dev/sda5) offset=4096 encryption=serpent128 multi-key-v3
/proc/swaps:
Filename Type Size Used Priority
/dev/loop0 partition 96344 0 -1
Initial boot worked: [O]
Configure network HW: [O]
Config network: [O]
Detect CD: [O]
Load installer modules: [O]
Detect hard drives: [O]
Partition hard drives: [O]
Create file systems: [O]
Mount partitions: [O]
Install base system: [O]
Install boot loader: [O]
Reboot: [O]
This install was focused on testing installation onto dm-crypt
encrypted root partition.
1. For dm-crypt I could choose the blowfish cipher with a
keysize of 448 bits. The blowfish kernel module supports such a
large keysize, but unfortunately cryptsetup is not too happy
about it and segfaults during luksOpen of the device. It was
possible to continue the installation after changing the
keysize to 256 bits. (Bug#381973)
cheers,
Max
Reply to: