|
作者: group [group] 论坛用户 | 登录 |
我对Linux术语不熟悉,翻译不了,哪位可以帮忙翻译出来? 谢谢,另外,有英文强,愿意翻译漏洞文章的希望可以和我联系 QQ:42449970 Email: emile_liao@163.net Linux Encrypted Loop Filesystem Replay Attack Vulnerability published Jan 02, 2002 vulnerable Linux kernel 2.2 Linux kernel 2.2.1 Linux kernel 2.2.2 Linux kernel 2.2.3 Linux kernel 2.2.4 Linux kernel 2.2.5 Linux kernel 2.2.6 Linux kernel 2.2.7 Linux kernel 2.2.8 Linux kernel 2.2.9 Linux kernel 2.2.10 + Caldera OpenLinux 2.3 Linux kernel 2.2.11 Linux kernel 2.2.12 Linux kernel 2.2.13 + S.u.S.E. Linux 6.3 + S.u.S.E. Linux 6.4 Linux kernel 2.2.14 + Caldera eDesktop 2.4 + Caldera eServer 2.3.1 + RedHat Linux 6.2 Linux kernel 2.2.15 + MandrakeSoft Corporate Server 1.0.1 + MandrakeSoft Linux Mandrake 7.1 Linux kernel 2.2.16 + RedHat Linux 7.0 Linux kernel 2.2.17 + MandrakeSoft Linux Mandrake 7.2 + S.u.S.E. Linux 7.0 Linux kernel 2.2.18 + Wirex Immunix OS 6.2 + Wirex Immunix OS 7.0 + Wirex Immunix OS 7.0-Beta Linux kernel 2.2.19 + EnGarde Secure Linux 1.0.1 + MandrakeSoft Linux Mandrake 8.0 + MandrakeSoft Linux Mandrake 8.0 ppc + MandrakeSoft Linux Mandrake 8.1 + MandrakeSoft Single Network Firewall 7.2 + S.u.S.E. Linux 6.3 + S.u.S.E. Linux 6.4 + S.u.S.E. Linux 7.0 Linux kernel 2.2.20 Linux kernel 2.4 Linux kernel 2.4.1 Linux kernel 2.4.2 + Caldera OpenLinux Server 3.1 + Caldera OpenLinux Workstation 3.1 + RedHat Linux 7.1 alpha + RedHat Linux 7.1 i386 Linux kernel 2.4.3 + MandrakeSoft Linux Mandrake 8.0 + MandrakeSoft Linux Mandrake 8.0 ppc Linux kernel 2.4.4 Linux kernel 2.4.5 + Slackware Linux 8.0 Linux kernel 2.4.6 Linux kernel 2.4.7 + RedHat Linux 7.2 + S.u.S.E. Linux 7.1 + S.u.S.E. Linux 7.2 Linux kernel 2.4.8 + MandrakeSoft Linux Mandrake 8.1 Linux kernel 2.4.9 Linux kernel 2.4.10 + S.u.S.E. Linux 7.3 Linux kernel 2.4.11 Linux kernel 2.4.12 Linux kernel 2.4.13 Linux kernel 2.4.14 Linux kernel 2.4.15 Linux kernel 2.4.16 Linux kernel 2.4.17 not vulnerable Linux includes support for encrypted filesystems through a loop device. While a variety of encryption algorithms are supported, the basic operation is based on a block cipher in cipher block chaining (CBC) mode. Encryption is done individually on different blocks of the filesystem, and the same key is used throughout. While the initialization vector is different for each block (and is in fact based on the block number), the self correcting property of CBC ciphers allows a form of a replay attack. Encrypted data may be copied between various areas of the file system. With the exception of the boundary area between the original and inserted data, the resulting plaintext will be correct. An attacker with knowledge of the physical layout of the file system may take advantage of this to replace data on the file system. Examples would include areas known to contain plain text, or guesses as to the locations of inode data. Write access to the encrypted file system is required for this attack. This will generally require local or physical access to the machine or media. In general, it should not be assumed that integrity of data is provided for by this encryption model. [此贴被 晓澜(group) 在 1月6日18时55分 编辑过] |
地主 发表时间: 1/6 18:53 |
回复: abc [abc] 论坛用户 | 登录 |
@#@#!%^&*)&&%##$!$%#^*&)( ? ?? ??? ???? ????? ?????? ---- 我非鸟类,希望大虾们能帮我进化成为菜鸟。 |
B1层 发表时间: 1/7 0:52 |
回复: group [group] 论坛用户 | 登录 |
编码出问题了,我写的中文都变成了字符 |
B2层 发表时间: 1/7 3:1 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号