Date: Thu, 26 Jul 2012 08:54:20 -0700 From: Michael Sierchio <kudzu@tenebras.com> To: Ivan Voras <ivoras@freebsd.org> Cc: freebsd-questions@freebsd.org Subject: Re: geli - selecting cipher Message-ID: <CAHu1Y726pcN0i2f2j7rbBzO%2BS=bLU%2Bc3ZB0%2BgR-pNxJd-Jvu%2BQ@mail.gmail.com> In-Reply-To: <juropu$hvb$1@dough.gmane.org> References: <alpine.BSF.2.00.1207252055180.9814@wojtek.tensor.gdynia.pl> <201207260052.q6Q0qdss086796@mail.r-bonomi.com> <20120726031450.5c06dd61@gumby.homeunix.com> <juropu$hvb$1@dough.gmane.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 26, 2012 at 8:47 AM, Ivan Voras <ivoras@freebsd.org> wrote: > You didn't get an answer because in security, the answer depends on > exact circumstances of use. The short answer is that if you don't have a > specific adversary you need to protect your data from, I'd say that > GELI's CBC is good enough for you. The specific adversary that XEX / XTS etc. is designed to protect against is probably unrealistically strong - someone who can write arbitrary data to raw disk sectors and ask to have them decrypted (chosen ciphertext attack), etc. If you don't need to detect modifications/insertions/deletions that don't go through the GELI layer, I would be perfectly comfortable with AES-CTR mode - it is many times faster than any of the above methods. - M
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHu1Y726pcN0i2f2j7rbBzO%2BS=bLU%2Bc3ZB0%2BgR-pNxJd-Jvu%2BQ>