From owner-freebsd-questions@FreeBSD.ORG Sat Oct 27 12:12:34 2007 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CEDC116A419 for ; Sat, 27 Oct 2007 12:12:34 +0000 (UTC) (envelope-from fbsd06+PV=46c18da6@mlists.homeunix.com) Received: from turtle-out.mxes.net (turtle-out.mxes.net [216.86.168.191]) by mx1.freebsd.org (Postfix) with ESMTP id A616613C48D for ; Sat, 27 Oct 2007 12:12:34 +0000 (UTC) (envelope-from fbsd06+PV=46c18da6@mlists.homeunix.com) Received: from mxout-04.mxes.net (mxout-04.mxes.net [216.86.168.179]) by turtle-in.mxes.net (Postfix) with ESMTP id 0D585164681 for ; Sat, 27 Oct 2007 07:55:00 -0400 (EDT) Received: from gumby.homeunix.com. (unknown [87.81.140.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTP id 514C3D05B3 for ; Sat, 27 Oct 2007 07:54:58 -0400 (EDT) Date: Sat, 27 Oct 2007 12:54:55 +0100 From: RW To: freebsd-questions@freebsd.org Message-ID: <20071027125455.353e5217@gumby.homeunix.com.> In-Reply-To: References: X-Mailer: Claws Mail 3.0.2 (GTK+ 2.12.1; i386-portbld-freebsd6.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Re: Harddisk encryption with geli: key's block size X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Oct 2007 12:12:34 -0000 On Sat, 27 Oct 2007 12:40:00 +0200 "Thomas Hobbes" wrote: > Hi, > > I want to encrypt my mobile computer's data-partition with a > passphrase, 128 bit AES and HMAC/MD5. A lot of people use different > block sizes to generate keys with dd. There are examples with block > sizes of 64, 32k and 128k in geli's man-page, but I couldn't find out > why they were used. Spidering 'geli + "key bs"' discovered that there > are some more values used, i.e. 128, 512 and 1k. What is a reasonable > block size to use? > It doesn't matter, the output of /dev/random is generated from a 256 bit yarrow key, so anything more than "dd /dev/random bs=32 count=1" is pointless. As you are only using 128 encryption, 256 bit of entropy is overkill anyway.