From owner-freebsd-geom@freebsd.org Fri Apr 21 20:26:56 2017 Return-Path: Delivered-To: freebsd-geom@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1948BD49DC7 for ; Fri, 21 Apr 2017 20:26:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 08E181519 for ; Fri, 21 Apr 2017 20:26:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v3LKQt1e068173 for ; Fri, 21 Apr 2017 20:26:55 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-geom@FreeBSD.org Subject: [Bug 218512] Geli arbitrarily prevents setting passphrases Date: Fri, 21 Apr 2017 20:26:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: mav@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-geom@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-geom@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GEOM-specific discussions and implementations List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Apr 2017 20:26:56 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D218512 --- Comment #13 from Alexander Motin --- (In reply to Frank from comment #10) "One or more of the iterations end up getting computed differently that wha= t it is currently set to and subsequently causing one or more passphrase changes= to fail." -- Sorry, I don't see logic in this statement. You several times mentioned this scenario as source of problems, but I don't see any. Multip= le processes running same time indeed likely cause different number of iterati= ons to be set on different disks. And so what? The only thing number of iterations affect is a strength of password protection against brute force attack. And it should in no way cause any errors reported, since number of iterations is generated only once and then used forever, unless forced later with -i key, which IMO you should not do without very good reason. --=20 You are receiving this mail because: You are the assignee for the bug.=