Bug 2193342
Summary: | LUKS devices created during installation in FIPS mode use argon2i derivation function | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Jan Stodola <jstodola> |
Component: | cryptsetup | Assignee: | Daniel Zaťovič <dzatovic> |
Status: | CLOSED ERRATA | QA Contact: | guazhang <guazhang> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 8.8 | CC: | agk, guazhang, jbrassow, okozina, prajnoha, ssorce |
Target Milestone: | rc | Keywords: | Triaged |
Target Release: | 8.9 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | cryptsetup-2.3.7-7.el8 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-11-14 15:51:13 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Stodola
2023-05-05 10:18:23 UTC
After the installation it can be fixed by running following command: cryptsetup luksConvertKey -S<keyslot_id> /dev/vda2 The command above will change pbkdf parameters to appropriate default values (pbkdf2 function, targeting 2 seconds unlock time if system runs in FIPS mode) for keyslot identified by <keyslot_id>. The keyslot binary area is overwritten with new data containing same volume key but it will be protected by new KEK derived from passphrase using pbkdf2 function. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (cryptsetup bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:7161 |