Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
PSA: Upgrade your LUKS key derivation function (mjg59.dreamwidth.org)
16 points by sashk on April 18, 2023 | hide | past | favorite | 3 comments


Archive link for anyone who's stuck behind some sort of captcha (sorry, I don't make the CDN decisions here) https://archive.is/5hu2x


From the article linked in the article, it seems they were able to get into bitlocker as well.

My speciation is there's a decent probability the password(s) were discovered by law enforcement through some other means, likely reuse.

That said, it would be best to maintain a heightened awareness for any advanced attacks or other similar incidents.


tl;dr check for desirable presence of argon2id as key derivation function in the output of

    lsblk
    sudo cryptsetup luksDump /dev/sd[xy]
or more terse (not sure if this works for luks1 header format too)

    sudo cryptsetup luksDump /dev/sd[xy] --dump-json-metadata | jq '.keyslots | .[].kdf.type'
if you see anything but argon2id, consider migrating. Thanks for the explanation and PSA @mjg59

https://anarchistnews.org/content/update-ivan-alocco has the english translation of the letter by comrade arsonist anarchist




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: