Re: Announce loop-AES-v3.0b file/swap crypto package

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



jerome etienne wrote:
> the paper describing the attack propose 2 simple ways to fix the
> vulnerabilities. people, who care that an attacker could modify their
> content without being detected, may code or poke people who code to
> implement it

To modify encrypted data on hard disk partition means that attacker has to
root the box first. If attacker successfully roots a box, it is "game over"
securitywise right there. Only sane option after that is reinstallation
and/or restore from known good backup.

Your paper effectively says that "compromized box is insecure" which is like
saying "water is wet".

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux