aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMilan Broz <gmazyland@gmail.com>2015-09-08 12:26:54 +0200
committerMilan Broz <gmazyland@gmail.com>2015-09-08 12:26:54 +0200
commitf238e8c07532d276988fbdc60d22c5aac7ad3c76 (patch)
tree8abfe4fb00439eb7d346a2b98065796fe634b8f2
parent7d9a14fd249457cfdf4c20f6d68eb152f5a0515b (diff)
downloadcryptsetup-f238e8c07532d276988fbdc60d22c5aac7ad3c76.tar.gz
Add 1.6.8 release notes.
-rw-r--r--docs/v1.6.8-ReleaseNotes47
-rw-r--r--lib/libcryptsetup.h3
2 files changed, 49 insertions, 1 deletions
diff --git a/docs/v1.6.8-ReleaseNotes b/docs/v1.6.8-ReleaseNotes
new file mode 100644
index 0000000..43b4f2c
--- /dev/null
+++ b/docs/v1.6.8-ReleaseNotes
@@ -0,0 +1,47 @@
+Cryptsetup 1.6.8 Release Notes
+==============================
+
+Changes since version 1.6.7
+
+* If the null cipher (no encryption) is used, allow only empty password for LUKS.
+ (Previously cryptsetup accepted any password in this case.)
+
+ The null cipher can be used only for testing and it is used temporarily during
+ offline encrypting not yet encrypted device (cryptsetup-reencrypt tool).
+
+ Accepting only empty password prevents situation when someone adds another
+ LUKS device using the same UUID (UUID of existing LUKS device) with faked
+ header containing null cipher.
+ This could force user to use different LUKS device (with no encryption)
+ without noticing.
+ (IOW it prevents situation when attacker intentionally forces
+ user to boot into different system just by LUKS header manipulation.)
+
+ Properly configured systems should have an additional integrity protection
+ in place here (LUKS here provides only confidentiality) but it is better
+ to not allow this situation in the first place.
+
+ (For more info see QubesOS Security Bulletin QSB-019-2015.)
+
+* Properly support stdin "-" handling for luksAddKey for both new and old
+ keyfile parameters.
+
+* If encrypted device is file-backed (it uses underlying loop device),
+ cryptsetup resize will try to resize underlying loop device as well.
+ (It can be used to grow up file-backed device in one step.)
+
+* Cryptsetup now allows to use empty password through stdin pipe.
+ (Intended only for testing in scripts.)
+
+Cryptsetup API NOTE:
+
+Direct terminal handling and password calling callback for passphrase
+entry will be removed from libcryptsetup in next major (2.x) version
+(application should handle it itself).
+It means that application have to always provide password in API calls.
+
+Functions returning last error will be removed in next major version (2.x).
+These functions did not work properly for early initialization errors
+and application can implement better function easily using own error callback.
+
+See comments in libcryptsetup.h for more info about deprecated functions.
diff --git a/lib/libcryptsetup.h b/lib/libcryptsetup.h
index e7c573d..bf223a2 100644
--- a/lib/libcryptsetup.h
+++ b/lib/libcryptsetup.h
@@ -1173,12 +1173,13 @@ int crypt_header_restore(struct crypt_device *cd,
const char *backup_file);
/**
- * Receive last reported error.
+ * Receive last reported error, DEPRECATED.
*
* @param cd crypt device handle
* @param buf buffef for message
* @param size size of buffer
*
+ * @note This function is DEPRECATED and will be removed in future versions.
* @note All error messages are reported also through log callback.
*/
void crypt_last_error(struct crypt_device *cd, char *buf, size_t size);