Skip to content

Commit

Permalink
add warning to order luksChangeKey and reencrypt
Browse files Browse the repository at this point in the history
  • Loading branch information
JanZerebecki authored and mbroz committed Sep 29, 2024
1 parent 31bf986 commit 3c00305
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 0 deletions.
4 changes: 4 additions & 0 deletions man/cryptsetup-luksChangeKey.8.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,10 @@ been wiped and make the LUKS container inaccessible. LUKS2 mitigates
that by never overwriting existing keyslot area as long as there's
a free space in keyslots area at least for one more LUKS2 keyslot.

*WARNING:* If you need to use both luksChangeKey and reencrypt (e.g.
to recover from a leak) you need to use them in that order to not leak
the new volume key.

*NOTE:* some parameters are effective only if used with LUKS2 format
that supports per-keyslot parameters. For LUKS1, PBKDF type and hash
algorithm is always the same for all keyslots.
Expand Down
3 changes: 3 additions & 0 deletions man/cryptsetup-reencrypt.8.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,9 @@ You can regenerate *volume key* (the real key used in on-disk encryption
unlocked by passphrase), *cipher*, *cipher mode* or *encryption sector size*
(LUKS2 only).

*WARNING:* If you need to use both luksChangeKey and reencrypt (e.g. to recover
from a leak) you need to use them in that order to not leak the new volume key.

Reencryption process may be safely interrupted by a user via SIGINT
signal (ctrl+c). Same applies to SIGTERM signal (i.e. issued by systemd
during system shutdown).
Expand Down

0 comments on commit 3c00305

Please sign in to comment.