Displaying 9 results from an estimated 9 matches for "plain64".
Did you mean:
plain
2020 Apr 15
2
Can't start vm with enc backing files, No secret with id 'sec0' ?
...iver": "qcow2", "file": {"driver": "file", "filename": "/root//enc.qcow2"}}
backing file format: qcow2
Format specific information:
compat: 1.1
lazy refcounts: false
refcount bits: 16
encrypt:
ivgen alg: plain64
hash alg: sha256
cipher alg: aes-256
uuid: ab0e3f87-35e7-40cb-9888-9fe9bb54e981
format: luks
cipher mode: xts
slots:
[0]:
active: true
iters: 115582
key offset: 4096...
2020 Jul 16
1
Cannot pass secret id for backing file after taking external snapshot on encrypted qcow2 file
...le: /root/first.qcow2 ### backing file: json:{"encrypt.format": "luks", "encrypt.key-secret": "secrete-id"}
backing file format: luks
Format specific information:
compat: 1.1
lazy refcounts: false
refcount bits: 16
encrypt:
ivgen alg: plain64
hash alg: sha256
cipher alg: aes-256
uuid: e4158089-26e4-433f-990e-1d1d0723feee
format: luks
cipher mode: xts
slots:
[0]:
active: true
iters: 1257888
key offset: 4096
stripes:...
2013 Jan 13
0
luks and aes-ni
...d luks use it?
I know that Upstream Vendors Security Guide [2] says:
...snip
The default cipher used for LUKS (refer to cryptsetup --help) is
aes-cbc-essiv:sha256 (ESSIV - Encrypted Salt-Sector Initialization
Vector). Note that the installation program, Anaconda, uses by default
XTS mode (aes-xts-plain64)
snap...
I also found a notion in the forums that maybe only aes-cbc is using
aes-ni [3] and that could mean that after a install aes-ni is not used
at all.
Does anyone know about this or has experiences?
[1] http://en.wikipedia.org/wiki/AES_instruction_set
[2]
https://access.redhat.com/knowled...
2014 Jun 27
2
virt_blk BUG: sleeping function called from invalid context
...md/raid1:md127: active with 2 out of 2 mirrors
created bitmap (1 pages) for device md127
md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits
md127: detected capacity change from 0 to 10203693056
md127: unknown partition table
systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size
512 bits for device
/dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2.
md127: unknown partition table
md127: unknown partition table
dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes
fedora-foo1/root fedora-foo1/swap fedora-foo1/root fedora-foo1/swap
dracut-...
2014 Jun 27
2
virt_blk BUG: sleeping function called from invalid context
...md/raid1:md127: active with 2 out of 2 mirrors
created bitmap (1 pages) for device md127
md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits
md127: detected capacity change from 0 to 10203693056
md127: unknown partition table
systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size
512 bits for device
/dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2.
md127: unknown partition table
md127: unknown partition table
dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes
fedora-foo1/root fedora-foo1/swap fedora-foo1/root fedora-foo1/swap
dracut-...
2020 Apr 15
0
Re: Can't start vm with enc backing files, No secret with id 'sec0' ?
..."file", "filename": "/root//enc.qcow2"}}
>
> backing file format: qcow2
>
> Format specific information:
>
> compat: 1.1
>
> lazy refcounts: false
>
> refcount bits: 16
>
> encrypt:
>
> ivgen alg: plain64
>
> hash alg: sha256
>
> cipher alg: aes-256
>
> uuid: ab0e3f87-35e7-40cb-9888-9fe9bb54e981
>
> format: luks
>
> cipher mode: xts
[snip]
>
> 5. Then I changed the configuration of the XML, as shown below.And re-defi...
2020 Aug 27
2
CentOS 8 installer bug
Has anyone managed to create an encrypted disk partition with CentOS 8 kickstart?
1 reqpart --add-boot
2 part /boot --fstype ext3 --size=1024 --ondrive=sda
3 part pv.1 --size=1 --grow --ondrive=sda --encrypted --pashphrase="bla"
4 volgroup vol0 pv.100000
5 logvol / --vgname=vg_00 --name=lv_root --size=102400 --fstype=ext4
...
No matter what I specify in line 3, the installer bombs out.
2014 Jun 29
0
virt_blk BUG: sleeping function called from invalid context
...ith 2 out of 2 mirrors
> created bitmap (1 pages) for device md127
> md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits
> md127: detected capacity change from 0 to 10203693056
> md127: unknown partition table
> systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size
> 512 bits for device
> /dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2.
> md127: unknown partition table
> md127: unknown partition table
> dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes
> fedora-foo1/root fedora-foo1/swap fedora-foo1/...
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log
returns nothing. But I have got an entry in /etc/crypttab.
I only found this with grep -i luks /var/log/anaconda/anaconda.*:
/var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet:
LUKS.__init__:
/var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui:
LUKS.__init__: