Skip to content

Commit

Permalink
Add warning about OPAL admin PIN to man page and release notes.
Browse files Browse the repository at this point in the history
  • Loading branch information
mbroz committed Apr 9, 2024
1 parent 4bd64ee commit bc62204
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 0 deletions.
8 changes: 8 additions & 0 deletions docs/v2.7.2-ReleaseNotes
Original file line number Diff line number Diff line change
Expand Up @@ -21,3 +21,11 @@ Changes since version 2.7.1
as this passphrase already exists.

* Update license for FAQ document to CC BY-SA 4.0.

NOTE: Please note that with OPAL-only (--hw-opal-only) encryption,
the configured OPAL administrator PIN (passphrase) allows unlocking
all configured locking ranges without LUKS keyslot decryption
(without knowledge of LUKS passphrase).
Because of many observed problems with compatibility, cryptsetup
currently DOES NOT use OPAL single-user mode, which would allow such
decoupling of OPAL admin PIN access.
8 changes: 8 additions & 0 deletions man/common_options.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -344,6 +344,14 @@ ifdef::ACTION_LUKSFORMAT[]
Format LUKS2 device with HW based encryption configured on SED OPAL locking range only. LUKS2
format only manages locking range unlock key. This option enables HW based data encryption managed
by SED OPAL drive only.
+
*NOTE*: Please note that with OPAL-only (--hw-opal-only) encryption,
the configured OPAL administrator PIN (passphrase) allows unlocking
all configured locking ranges without LUKS keyslot decryption
(without knowledge of LUKS passphrase).
Because of many observed problems with compatibility, cryptsetup
currently DOES NOT use OPAL single-user mode, which would allow such
decoupling of OPAL admin PIN access.
endif::[]

ifdef::ACTION_REENCRYPT[]
Expand Down

0 comments on commit bc62204

Please sign in to comment.