[Bug 1820049] Re: cryptsetup 2.1.0 requires excessive amount of RAM ( 1GB ) to luksOpen encrypted drives
Dimitri John Ledkov
launchpad at surgut.co.uk
Fri Mar 15 13:49:28 UTC 2019
** Also affects: s390-tools (Ubuntu)
Importance: Undecided
Status: New
** Changed in: s390-tools (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to s390-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1820049
Title:
cryptsetup 2.1.0 requires excessive amount of RAM ( 1GB ) to luksOpen
encrypted drives
Status in cryptsetup package in Ubuntu:
Won't Fix
Status in s390-tools package in Ubuntu:
Fix Committed
Status in cryptsetup package in Debian:
New
Bug description:
cryptsetup 2.1.0 requires excessive amount of RAM ( 1GB ) to luksOpen
encrypted drives
LUKS2 introduces support for Argon2i and Argon2id as a PBKDF. Argon2
is the winner of Password Hashing Competition and is currently in
final RFC draft specification.
The Argon2 uses three costs: memory, time (number of iterations) and
parallel (number of threads). Note that time and memory cost highly
influences each other (accessing a lot of memory takes more time).
There is a new benchmark that tries to calculate costs to take similar
way as in LUKS1 (where iteration is measured to take 1-2 seconds on
user system). Because now there are more cost variables, it prefers
time cost (iterations) and tries to find required memory that fits.
(IOW required memory cost can be lower if the benchmarks are not able
to find required parameters.) The benchmark cannot run too long, so it
tries to approximate next step for benchmarking.
All default parameters can be set during compile time and also set on the command line by using --pbkdf, --pbkdf-memory, --pbkdf-parallel and --iter-time options.
(Or without benchmark directly by using --pbkdf-force-iterations, see below.)
You can still use PBKDF2 even for LUKS2 by specifying --pbkdf pbkdf2 option.
(Then only iteration count is applied.)
The current upstream defaults are:
Default PBKDF for LUKS1: pbkdf2, iteration time: 2000 (ms)
Default PBKDF for LUKS2: argon2i
Iteration time: 2000, Memory required: 1048576kB, Parallel threads: 4
LUKS2 header format has many improvements, but the default choices of
costs for the LUKS2 seem to be excessive. There are many VMs and IoT
Ubuntu Core devices that simply do not have 1GB of ram available for
luksOpen to complete, resuling in OOM kill in the initramfs.
Imho, we should either lower the memory requirement, or switch the
compiled in default for LUKS2 from argon2i to pbkdf2. For example,
setting memory requirement to 128MB is imho reasonable on Ubuntu.
As an added kicker, if there are multiple encrypted supplementary
volumes, they are attempted to be unlocked in parallel on boot, thus
one may need 1GB * n peak memory usage to unlock all the drives
(especially if all drives are unlocked with keyfiles).
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1820049/+subscriptions
More information about the foundations-bugs
mailing list