Re: Loop-AES, security concerns, stability of file backed loop-aes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jul 13, 2004 at 01:07:02AM +0200, a.engels@xxxxxxx wrote:
> > Nice, I havent thought of this possibility. Maybe one could store a md5
> > checksum of the crypto container inside the crypto container itself and
> > check consistency when the fs is mounted. However, this would mean to read
> > the entire crypto container at each mount. Adding checksums to each block
> > (checksum also includes position of block) would be another way.
> 
> I need to correct myself: if the last method is used, its not possible to
> move blocks inside the crypto container, however an elder version of this
> block could be used to overwrite the new one without notice.

A combination of the two methods might be of some use though.  You can
checksum each block, and then checksum the checksums (will speed up
checksum verification of the whole filesystem by some [large] factor).
You may not notice a modified block at mount if an attacker preserves
its checksum, but if you verify each block's checksum before reading and
maybe writing (caching, of course) you should not be tricked into using
a modified block.

Thougt,
-- 
Pav

http://www.againsttcpa.com/  ,.,    My type: Dvorak.
http://swpat.ffii.org/     ,``:'',
                           {o ! o}
Gain your human right of   ] -+- [  My GPG/PGP key is now available at
privacy: use cryptography!  \ ! /   x-hkp://search.keyserver.net:11371.
                             `-'
`shell$ gpg --keyserver x-hkp://search.keyserver.net:11371 --recv-key 164C028F`

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux