Checking data integrity with cksfv

Check It!

Article from Issue 287/2024
Author(s):

cksfv and the CRC32 algorithm can't compete with modern methods as a way to look for intruders, but if you're just checking for random errors such as a misplaced bit, this ancient tool could still be of service.

Cyclical Redundancy Checks have been around since the 1960s and still exist today as a means for verifying the integrity of a file. The CRC32 checksum variant has existed since the 1990s. Although the CRC32 checksum method is no longer considered safe for security purposes (see the box entitled "Not a Security Tool," a CRC32 check can still identify other forms of random errors that can occur during data transmission or storage.

cksfv (short for "Check Simple File Verification") [1] has lived a quite admirable lifetime as a tool for checking data integrity using CRC32 checksums. A new version (v1.3.15) appeared in 2020 after a gap of 11 years [2]. Today even the project's developers want to be sure everyone knows cksfv should not be considered a replacement for more modern tools. The cksfv manpage states, "The algorithm is cryptographically crippled so it cannot be used for security purposes. Md5sum and sha1sum are much better tools for checksumming files. Cksfv should only be used for compatibility with other systems." The fact that md5sum [3] and sha1sum [4] are also now considered insecure is an indication of the recent inactivity at the cksfv project. However, if you are interacting with systems that use CRC32 to look for simple data errors, cksfv is still around and runs on most Linux systems.

Generating Checksums

It is easy to deploy the cksfv binary[5] via the usual

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Backup Integrity

    A backup policy can protect your data from malware attacks and system crashes, but first you need to ensure that you are backing up uncorrupted data.

  • Guymager: Forensic Backup

    If malware has taken root on a system, you need a way to safeguard the evidence. Guymager helps you create verified disk images.

  • Command Line: File Management

    Once you’ve mastered the everyday commands for manipulating files, you might want to do more. We show you some powerful commands for advanced file management.

  • Command Line: CD Images

    Before you burn a data CD in Linux, you need an ISO image – mkisofs

    helps you create an Iso image. To save disks, you might like to check

    the image before you burn it with md5sum.

  • Kup

    KDE's Kup tool uses Rsync and techniques from the Git version control environment for sophisticated backup with an easy GUI interface.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News