Menu

1.26.18 Released 2025/1/20

2025-01-22
2025-02-08
1 2 3 > >> (Page 1 of 3)
  • Enigma2Illusion

    Enigma2Illusion - 2025-01-22

    Version 1.26 and newer VeraCrypt versions have deprecated the following features:

    • TrueCrypt Mode
    • HMAC-RIPEMD-160 Hash Algorithm
    • GOST89 Encryption Algorithm

    .
    See the documentation below for remediation procedures.

    Conversion Guide for VeraCrypt 1.26 and Later


    Update on bumping minimum Windows version requirements for VeraCrypt


    MacOS users must skip 1.26.18 and use 1.26.20.


    https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.18/

    Changes between 1.26.15 and 1.26.18 (20 January 2025):

    • All OSes:
      • Added support for SHA-256 x86 intrinsic to enhance the performance of PBKDF2-HMAC-SHA256.
      • Added support for AES hardware on ARM64 platforms (e.g. Windows ARM64, macOS on Apple Silicon Mx).
      • Updated translations
    • Windows:
      • Dropped support for Windows 32-bit.
      • Set Windows 10 October 2018 Update (version 1809) as the minimum supported version.
      • Reduce driver deadlock occurences under low-memory scenarios caused by re-entrant IRP completions.
      • Fixed failed EFI detection on some PCs where the BootOrder variable is not defined (proposed by @kriegste, GH #360).
      • Fixed "Access Denied" error when updating VeraCrypt using EXE setup following a Windows upgrade.
      • Fixed various issues affecting the EFI system encryption configuration editor.
      • Fixed regression in Traveler Disk creation (GH #886)
      • Replaced the deprecated CryptGenRandom with BCryptGenRandom for generating secure random bytes.
      • Use modern API to gather system entropy for random generation instead of obsolete ones.
      • Update LZMA SDK to version 24.09
      • Update libzip to version 1.11.2
    • Linux:
      • CVE-2024-54187: Added absolute paths when executing system binaries to prevent path hijacking (collaboration with SivertPL @__tfr)
      • CVE-2025-23021: Prevent mounting volumes on system directories and PATH (reported by SivertPL @__tfr)
      • Fixed an assertion issue with the wxWidgets library included in Ubuntu.
      • Improved directory-opening logic by prioritizing xdg-open and adding fallback mechanisms.
      • Ensure that volume exists before starting the mount operation.
      • Fix "Password too long" error message not expanded to include max length (GH #1456)
      • Simplify sudo session detection logic.
    • macOS users must skip 1.26.18 and use 1.26.20:
      • CVE-2024-54187: Added absolute paths when executing system binaries to prevent path hijacking (collaboration with SivertPL @__tfr)
      • CVE-2025-23021: Prevent mounting volumes on system directories and PATH (reported by SivertPL @__tfr)
      • Disabled screen capture by default. Added the --allow-screencapture CLI switch to enable it if needed.
      • Ensure that volume exists before starting the mount operation.
      • Implement sudo session detection logic
     
    ❤️
    2
    👍
    1

    Last edit: Enigma2Illusion 2025-02-04
  • Jim

    Jim - 2025-01-22

    I was still having issues with freezes on 1.26.17 due to low memory on partition encryption on Windows 10. Does this latest version address these issues? I am running 22H2 version of Windows.

     
    • ara ara

      ara ara - 2025-01-22

      Download and let us know

       
      • Jim

        Jim - 2025-01-22

        If they didn't do any work on it, there is no need to download as it is a risk that I could corrupt my system hence the reason I ask.

         
  • Mounir IDRASSI

    Mounir IDRASSI - 2025-01-22

    @goldengate2032: There is no change with regards to the freeze issue between 1.26.17 and 1.26.18. That's why I didn't post any update to the freeze related thread.

     
    • Anonymous

      Anonymous - 2025-01-22

      I currently have VeraCrypt 1.26.15 and have encrypted the entire disk and have no problems.

      Windows 10 1903 MBR

      Overall I have never had any problems with my computer freezing and I only have 4GB of RAM

       
  • troika

    troika - 2025-01-23

    The option for full disk encryption is grayed out

     
    • Enigma2Illusion

      Enigma2Illusion - 2025-01-23

      @mytroika

      You can only select the system encryption option "Encrypt the whole drive" if the drive is using MBR which is the old Windows method verses the Windows preferred method UEFI with GPT.

      If your system is using MBR, that means in the PC BIOS settings is set to boot in Legacy BIOS mode.

      On UEFI systems, your only VeraCrypt system encryption option available is the "Encrypt the Windows partition" and the other option "Encrypt the whole drive" is greyed-out.

      You can check your system by clicking on the Windows Start icon and type system information. Look for the entry called "BIOS Mode". The value of "UEFI" is the newer method and therefore the only option you can select in VeraCrypt is the "Encrypt the Windows partition" option.

      For UEFI systems, VeraCrypt must not encrypt the system partitions for the EFI, MSR, Recovery Tools nor the Recovery Image partitions. The Recovery Image partition is an optional setup in Windows OS.

      EDIT:
      The MBR vs UEFI and the subsequent system encryption options is not new to the 1.26.18 version.

      Please create a new topic in the Technical section if you need to continue this discussion.

       

      Last edit: Enigma2Illusion 2025-01-23
  • Alex R

    Alex R - 2025-01-23

    Just for my own curiosity, this comment;

    Use modern API to gather system entropy for random generation instead of obsolete ones.

    refers to using Crypto NG instead of the older CryptoAPI?

     
  • petitlou60

    petitlou60 - 2025-01-27

    hello,
    i have a problem with veracrypt background task
    my system is not crypted, but all my personal data is in veracrypt partition container

    At startup a scheduled task start mount of this container with secure desktop option
    this is always succesfull

    Problem occurs at first attempt to mount another container
    mount occurs but veracrypt background task fails with différent code (see attachement)
    i need to restart background task
    after all mount attempts are succesfull without problem

     

    Last edit: petitlou60 2025-01-27
    • Enigma2Illusion

      Enigma2Illusion - 2025-01-27

      Did this problem only occur in 1.26.18?

      Did it work in 1.26.15?

      If this is not directly caused by the new 1.26.18 version, please open a new topic in the Technical section and include your script.

       
  • petitlou60

    petitlou60 - 2025-01-27

    Yes it is a specific 1.26.18 problem
    first mount of my data container is started by a schéduled task
    other mount occurs when i connect USB disk or USBKey

     
  • Enigma2Illusion

    Enigma2Illusion - 2025-01-27

    @idrassi

    I noticed on my Win10 22H2 Pro the Windows OS volume mounts both manually and using Favorites Hot Key a delay before I get the volume mount prompt screen using the 1.26.18 version. I use Secure Desktop setting.

    I see in the release notes for Linux & MacOS:

    Ensure that volume exists before starting the mount operation.

    Is Windows also included using this method?

    If yes, the 1.26.18 release notes for future reference should be changed to:

    All OSes:

    • Ensure that volume exists before starting the mount operation.

    .
    And the removal from the Linux & MacOS notes:

    • Ensure that volume exists before starting the mount operation.

    .
    Thank you for your hard work!

     

    Last edit: Enigma2Illusion 2025-01-27
  • petitlou60

    petitlou60 - 2025-01-27

    file Data.Axml can be directly imported in task cheduler
    my data container is the only favorite mounted by shortcut or with /a favorites (see first command)
    command to stop wsearch service (wsearch restart automaticaly after) refresh indexer service
    so my A:\ container is now indexed by windows
    last command start veracrypt background task

     

    Last edit: petitlou60 2025-01-27
  • petitlou60

    petitlou60 - 2025-01-27

    After a lot of tests
    i see that source of problem is secure desktop
    with secure desktop
    fist mount OK
    second mount OK but background task fail
    third & + ok
    without secure desktop no problem
    best regards

     
    • Enigma2Illusion

      Enigma2Illusion - 2025-01-27

      Which version of Windows OS are you running on your PC? For example Windows 10 22H2 64-bit with latest Microsoft monthly patches.

       

      Last edit: Enigma2Illusion 2025-01-27
  • Mounir IDRASSI

    Mounir IDRASSI - 2025-01-28

    @petitlou60: Thank you for the report. This appears to be a crash in VeraCrypt when the background task is run with admin rights by the task scheduler. When a second mount occurs, a notification is sent to the background task, and it seems this is what causes the crash. Afterward, the VeraCrypt background task is started with normal rights, so the issue doesn't happen in that case.

    I will try to reproduce this issue to debug it. It's important because a crash should never occur.

    @enigma2illusion: Thank you for reporting this as well. I didn't add volume existence validation to Windows, so that isn't the cause. Since you're using Secure Desktop, I suspect the random generator might be responsible. Secure Desktop logic uses the random generator to create a random desktop name, and it seems the initialization of the random generator is taking longer than before.

    As indicated in the release notes, I have changed the implementation to use modern APIs for gathering better system entropy, including network statistics. I believe these new entropy sources require more time for initialization.

    To confirm this, could you please try running it without Secure Desktop enabled?

    On my side, I don't notice any lag, but I also haven't performed any precise measurements. It might depend on your system configuration.

     
  • Enigma2Illusion

    Enigma2Illusion - 2025-01-28

    Hi @idrassi

    Results of Tests

    • For each test with Secure Desktop enabled, I had to reboot my PC to get the ~2 second delay with a brief popup box with the green scrolling indicator showing something about this can take a long time before I received the login box. I was unable to screen snip the popup box.

    • The reboot is required due to it appears that the stats are cached and subsequent mount delays without rebooting the PC is very brief occurring in 1/4 of a second with a flicker of the popup box showing before I received the login box for both Secure Desktop enabled or disabled.

    • Before I began testing and rebooting my PC, I had been using my PC all day and subsequent mounting with Secure Desktop enabled was 1/4 of a second with a flicker of the popup box showing before I received the login box. Thus, I conclude the stats are only gathered once for the first time Secure Desktop is used instead of each time.

    • I would have expected all subsequent mounts with Secure Desktop enabled without rebooting the PC to gather new stats giving the same ~2 second delay and the popup box with the green scrolling indicator showing something about this can take a long time before I received the login box.. This does not happen.

    • This morning due other testing unrelated to mount delay, I downgraded to 1.26.15 and there was no delay for using VeraCrypt Hot Key for mounting my Favorites and with Secure Desktop enabled on my PC before I received the login box.

    .
    Given your explanation, I am willing to accept the ~2 second delay if it provides greater security.

    Per my original post, I thought the delay was checking for the existence of my volumes and it was an documentation error.

    Can you expand on your explanation if the caching of stats for Secure Desktop needs to be per Secure Desktop session mounting or is once is enough? Please consider that some users do not reboot/shutdown their PCs daily.

    By Secure Desktop session, I mean in the case the user is using their Favorites to mount multiple volumes during the same Secure Desktop session. Hence, you only collect stats once for this multiple mount session.

    Kind Regards,
    Enigma2Illusion

    EDITED to correct my results, add clarity and fix typos.

     

    Last edit: Enigma2Illusion 2025-01-28
    • Enigma2Illusion

      Enigma2Illusion - 2025-01-28

      Maybe after first Secure Desktop session, the APIs for the stats are now in memory resulting in the ~1/4 second times.

       
  • carrelus

    carrelus - 2025-01-28

    after upgrade to v1.26.18 windows 10 19045.5131 started defragging my hdds

     
    • Enigma2Illusion

      Enigma2Illusion - 2025-01-28

      My external HDDS VeraCrypt encrypted partitions do not show-up in my Windows 10 OS Build 19045.5371 version. Only the non-encrypted partitions are showing in my Optimize Drives which are scheduled via Windows to defragment.

      Therefore, your drive letters D and E appear to be the unencrypted partitions.

      Please provide a screenshot of your Disk Management showing the drive partitions.

       
      • carrelus

        carrelus - 2025-01-28

        drives c, d, e are encrypted
        disk 3: linux partitions

         
  • carrelus

    carrelus - 2025-01-28

    downgraded to v1.26.15 and it works as expected

     
1 2 3 > >> (Page 1 of 3)

Log in to post a comment.

MongoDB Logo MongoDB