I recently created a LUKS partition on which I installed Ubuntu 16.04.3 LTS. I did this via a Ubuntu 16.04.3 LTS live USB.
I am now having doubts as to whether this is secure. When I read the man page for cryptsetup, the "--use-random" and "--use-urandom" section reads the following:
--use-random
--use-urandom
For luksFormat these options define which kernel random number generator will be
used to create the master key (which is a long-term key).
See NOTES ON RANDOM NUMBER GENERATORS for more information. Use cryptsetup --help to
show the compiled-in default random number generator.
WARNING: In a low-entropy situation (e.g. in an embedded system), both selections
are problematic. Using /dev/urandom can lead to weak keys. Using /dev/random can
block a long time, potentially forever, if not enough entropy can be harvested by
the kernel.
I found out what entropy was today and then realised that live distros have low entropy, so I believe this warning applies to me. I can't remember if I included the --use-random flag when creating my LUKS partition, so have no idea which was used (because I think urandom is default), but the warning suggests both options are bad?
FYI the command I used to create my partition was this:
sudo cryptsetup --verbose --cipher aes-xts-plain64:sha512 --key-size 512 --hash sha512 --iter-time 5000 luksFormat /dev/sdaX
(but like I said, I don't remember if I included the --use-random flag to this command)
What are your opinions on these circumstances? Do you think I will have to reinstall, and if so what options should I use?