Re: Questions about loop-aes and the implementation of encryptedfilesystems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Lars Bungum wrote:
> What I am talking about is encrypting the root partition with loop-aes,
> patching a kernel with loop-aes and replacing the utils necessary for
> mounting them, like described in Christophe Devine's HOWTO
> (http://howtos.linuxbroker.com/howtoreader.shtml?file=Encrypted-Root-Filesystem-HOWTO.html)
> as a starting point.  In the future, I would also like to add a gpg
> layer, like the one described in the loop-aes.README.

Go with multi-key setup that is described in loop-AES' README. Old
single-key mode has exploitable weaknesses and should be avoided.

> Journalling file systems.  Will it be safe to run journalling file
> systems, or does one risk loss of data if the power is switched off,
> etc, on an encrypted file system?  Is there a recommended filesystem at
> all, or is the question itself irrelevant for such encryption?  Can
> write cache be used?

Device backed (partition backed) loops are ok with journaling file systems
at least when used with loop-AES. Mainline (current -bk version)
loop+cryptoloop combo is no longer journaling file system safe.

> Changing of passwords.  If one has a system of gpg keys and with
> passwords contained in USB-dongles, one would like to enforce some
> regime of password changing requirements on it.   It seems that just
> checking the file dates vs. the hw clock would not be good enough, as it
> can easily be changed, another thing I have thought of is having a
> system with a counter stored on the dongle.  It might look like a using
> a dongle with a trusted clock is the best option, but I'm hoping to find
> out if this can be done through gpg directly or other smart ways.

At least current version of loop-AES' mount does not support that. You have
to write your own scripts to do that. Depending how gpg encrypted key file
was set up, changing password is either re-encrypting key-file contents with
new password or changing gpg secret key password.

> Performance.  I would like to see some benchmarking of the performance
> cost of an encrypted filesystem, so that I would know what to expect
> from the hardware.  Is there any source out there for this?  In time the
> system will be used for operation on very large files.

Here is benhmark I ran some time ago on my 300 MHz Pentium-2 test box. ATA
hard disk. Tests file reads and writes to ext2 file system partition.

KERNEL      IMPLEMENTATION  MODE                WRITE MiB/s     READ MiB/s
2.6.1       cryptoloop      single-key           5.21            4.08
2.6.1       loop-AES        single-key           9.52            7.56
2.6.1       loop-AES        multi-key(MD5 IV)    7.67            6.35
2.4.22aa1   loop-AES        single-key          10.55           10.16
2.4.22aa1   loop-AES        multi-key(MD5 IV)    8.75            8.13

> Suspend.  I read this in the announcement of the loop-AES-v2.0f
> file/swap crypto package:
> 
> ---
> - Updated loop code to be compatible with Pavel Machek's software
> suspend code (2.4 and 2.6 kernels).
> ---
> 
> ..but I didn't really understand if this means that it is "recommended"
> or safe to use an encrypted version of software suspend now, or if this
> is still hazardous.  I saw some notes of scepticism among linux kernel
> developers.

Here compatible means that unencrypted loop devices do not livelock during
suspend to disk. If there are encrypted loops active when suspending to
disk, encryption keys will get written to disk when kernel RAM is saved to
suspend partition, therefore completely voiding security of those keys.

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux