search for: plain64

Displaying 9 results from an estimated 9 matches for "plain64".

Did you mean: plain
2020 Apr 15
2
Can't start vm with enc backing files, No secret with id 'sec0' ?
...iver": "qcow2", "file": {"driver": "file", "filename": "/root//enc.qcow2"}} backing file format: qcow2 Format specific information: compat: 1.1 lazy refcounts: false refcount bits: 16 encrypt: ivgen alg: plain64 hash alg: sha256 cipher alg: aes-256 uuid: ab0e3f87-35e7-40cb-9888-9fe9bb54e981 format: luks cipher mode: xts slots: [0]: active: true iters: 115582 key offset: 4096...
2020 Jul 16
1
Cannot pass secret id for backing file after taking external snapshot on encrypted qcow2 file
...le: /root/first.qcow2 ### backing file: json:{"encrypt.format": "luks", "encrypt.key-secret": "secrete-id"} backing file format: luks Format specific information: compat: 1.1 lazy refcounts: false refcount bits: 16 encrypt: ivgen alg: plain64 hash alg: sha256 cipher alg: aes-256 uuid: e4158089-26e4-433f-990e-1d1d0723feee format: luks cipher mode: xts slots: [0]: active: true iters: 1257888 key offset: 4096 stripes:...
2013 Jan 13
0
luks and aes-ni
...d luks use it? I know that Upstream Vendors Security Guide [2] says: ...snip The default cipher used for LUKS (refer to cryptsetup --help) is aes-cbc-essiv:sha256 (ESSIV - Encrypted Salt-Sector Initialization Vector). Note that the installation program, Anaconda, uses by default XTS mode (aes-xts-plain64) snap... I also found a notion in the forums that maybe only aes-cbc is using aes-ni [3] and that could mean that after a install aes-ni is not used at all. Does anyone know about this or has experiences? [1] http://en.wikipedia.org/wiki/AES_instruction_set [2] https://access.redhat.com/knowled...
2014 Jun 27
2
virt_blk BUG: sleeping function called from invalid context
...md/raid1:md127: active with 2 out of 2 mirrors created bitmap (1 pages) for device md127 md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits md127: detected capacity change from 0 to 10203693056 md127: unknown partition table systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2. md127: unknown partition table md127: unknown partition table dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes fedora-foo1/root fedora-foo1/swap fedora-foo1/root fedora-foo1/swap dracut-...
2014 Jun 27
2
virt_blk BUG: sleeping function called from invalid context
...md/raid1:md127: active with 2 out of 2 mirrors created bitmap (1 pages) for device md127 md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits md127: detected capacity change from 0 to 10203693056 md127: unknown partition table systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2. md127: unknown partition table md127: unknown partition table dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes fedora-foo1/root fedora-foo1/swap fedora-foo1/root fedora-foo1/swap dracut-...
2020 Apr 15
0
Re: Can't start vm with enc backing files, No secret with id 'sec0' ?
..."file", "filename": "/root//enc.qcow2"}} > > backing file format: qcow2 > > Format specific information: > > compat: 1.1 > > lazy refcounts: false > > refcount bits: 16 > > encrypt: > > ivgen alg: plain64 > > hash alg: sha256 > > cipher alg: aes-256 > > uuid: ab0e3f87-35e7-40cb-9888-9fe9bb54e981 > > format: luks > > cipher mode: xts [snip] > > 5. Then I changed the configuration of the XML, as shown below.And re-defi...
2020 Aug 27
2
CentOS 8 installer bug
Has anyone managed to create an encrypted disk partition with CentOS 8 kickstart? 1 reqpart --add-boot 2 part /boot --fstype ext3 --size=1024 --ondrive=sda 3 part pv.1 --size=1 --grow --ondrive=sda --encrypted --pashphrase="bla" 4 volgroup vol0 pv.100000 5 logvol / --vgname=vg_00 --name=lv_root --size=102400 --fstype=ext4 ... No matter what I specify in line 3, the installer bombs out.
2014 Jun 29
0
virt_blk BUG: sleeping function called from invalid context
...ith 2 out of 2 mirrors > created bitmap (1 pages) for device md127 > md127: bitmap initialized from disk: read 1 pages, set 0 of 153 bits > md127: detected capacity change from 0 to 10203693056 > md127: unknown partition table > systemd-cryptsetup[358]: Set cipher aes, mode xts-plain64, key size > 512 bits for device > /dev/disk/by-uuid/6972a564-542d-498b-b3a0-7d71c2e966a2. > md127: unknown partition table > md127: unknown partition table > dracut-initqueue[296]: Scanning devices dm-0 for LVM logical volumes > fedora-foo1/root fedora-foo1/swap fedora-foo1/...
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log returns nothing. But I have got an entry in /etc/crypttab. I only found this with grep -i luks /var/log/anaconda/anaconda.*: /var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet: LUKS.__init__: /var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui: LUKS.__init__: