|
| 1 | +Cryptsetup 2.8.3 Release Notes |
| 2 | +============================== |
| 3 | +Stable bug-fix release with minor extensions. |
| 4 | + |
| 5 | +All users of cryptsetup 2.8.x must upgrade to this version. |
| 6 | + |
| 7 | +Changes since version 2.8.2 |
| 8 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 9 | + |
| 10 | +* BITLK: Fix for BitLocker metadata validation on big-endian systems. |
| 11 | + |
| 12 | +Changes since version 2.8.1 |
| 13 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 14 | + |
| 15 | +* Fix cryptsetup LUKS2 status for HW inline integrity device. |
| 16 | + Cryptsetup status did not print the inline flag if the underlying device with |
| 17 | + HW integrity tags was used. |
| 18 | + |
| 19 | +* Fix LUKS2 format with detached header and data device with HW integrity tags. |
| 20 | + |
| 21 | +* Fix PBKDF serialization flag during device activation. |
| 22 | + The --serialize-memory-hard-pbkdf and CRYPT_ACTIVATE_SERIALIZE_MEMORY_HARD_PBKDF API flag |
| 23 | + is now properly supported again. This option is an optional workaround for situations where |
| 24 | + multiple devices are activated in parallel (e.g., systemd crypttab activation). |
| 25 | + |
| 26 | +* BITLK: Add support for opening devices with Clear Key in BitLocker compatible mode. |
| 27 | + BitLocker devices that are not yet encrypted can contain a Clear Key that is not protected |
| 28 | + by a password. Cryptsetup can now map such devices and allow the user to access data on them. |
| 29 | + Note that while such a device is detected as BitLocker, it must be treated as an unencrypted |
| 30 | + device. Cryptsetup still does not allow mapping of partially encrypted BitLocker devices |
| 31 | + (those in the middle of the encryption process). |
| 32 | + |
| 33 | +* BITLK: Harden metadata check by properly validating BitLocker metadata. |
| 34 | + BitLocker metadata store checksums and authentication tags to detect random or malicious |
| 35 | + manipulation. BITLK code now properly validates these and uses a backup metadata block |
| 36 | + if validation fails. Previously, only the first metadata block was used. |
| 37 | + |
| 38 | +* Fix documentation to explicitly mention units for various API functions and in help messages. |
| 39 | + Note that due to compatibility reasons, cryptsetup arguments use key sizes in bits while |
| 40 | + integritysetup uses bytes. |
| 41 | + |
| 42 | +* Fix handling of too-long labels and subsystem fields. |
| 43 | + LUKS2 labels are stored in the binary header area, which has a limited size. |
| 44 | + Cryptsetup no longer silently truncates too-long labels; it prints an error instead. |
| 45 | + |
| 46 | +* Optimize reencryption to not repeatedly test access to the device. |
| 47 | + |
| 48 | +* Allow to use PHMAC (protected HMAC) with integritysetup and cryptsetup. |
| 49 | + PHMAC is used by S390 mainframes. Support was added in Linux kernel 6.17. Configuration requires |
| 50 | + steps using s390-tools; once that's done, it can be handled as a common LUKS2 or integrity device. |
| 51 | + |
| 52 | +* Opal2 SED: Fix misleading error messages during the self-encrypting drives format. |
| 53 | + Cryptsetup misinterpreted some error codes when the kernel interface was not available |
| 54 | + or the system call failed. |
| 55 | + |
| 56 | +* Opal2 SED: Ensure the system tries to rescan the device after the PSID reset. |
| 57 | + Udev should now receive change events, allowing rescan of partition table after PSID reset. |
| 58 | + |
| 59 | +* Fix typos in volume-key-file help and integritysetup man page. |
| 60 | + |
| 61 | +* Fix detection of supported compiler attributes on PPC64 architecture. |
| 62 | + |
| 63 | +* Fix const compilation warnings with new gcc and glibc headers. |
0 commit comments