WG: Pam_mount and encrypted filesystem keys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



W. Michael Petullo wrote:
> Pam_mount will read efsk from the local filesystem, perform 
> fsk = D_sk (efsk) and use fsk to mount the filesystem. If you change
> your system password, simply regenerate efsk using efsk = E_sk  (fsk).
> 
> Does this technique appear to make sense from a security 
> point of view?

The weak point here, as usual, is the strength of the password the
user chooses. It's very likely much weaker than the efsk key. The only
way to circumvent this is to store the user's key on some device, like
a smartcard, so that the user does not have to remember a random, sufficiently
long password.
I wrote a pam_module that authenticates a user to the system
by doing a RSA-challenge with an iButton (a smartcard). The iButton can
also store a password to be used with an encrypted loop-back devices. I also included
a mount option to the pam module. When given, the module also retrieves this
password from the iButton during the authentication process and hands it over to
other pam modules as the current authentication token. Your pam_mount module
can then use this token to mount the loop-back device. My pam_iButton module
can be found under: http://www-users.rwth-aachen.de/dierk.bolten/pam_ibutton.html

Cheers,
Dierk



-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux