Re: How about deniability? (read: http://www.zdnet.co.uk/print/?TYPE=story&AT=39269746-39020330t-10000025c)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jari Ruusu wrote:
Gregor Zattler wrote:
does loop-aes provide some kind of deniability?

Yes, if you set it up that way. For example, if you set up a computer to
first try to boot from USB-stick, and then to try hard disk boot.

disk partition  Normal boot usage             Forced key handover boot usage
~~~~~~~~~~~~~~  ~~~~~~~~~~~~~~~~~             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/dev/hda1       not used                      unencrypted /boot
/dev/hda2       not used                      encrypted root
/dev/hda3       encrypted swap, random keys   encrypted swap, random keys
/dev/hda4       encrypted root                encrypted /tmp, random keys

USB-stick       Normal boot usage             Forced key handover boot usage
~~~~~~~~~       ~~~~~~~~~~~~~~~~~             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/dev/sda        unencrypted /boot             not used

You install some small distro on /dev/hda2, and never put any secret data
there. You install your normal distro on /dev/hda4, and put your secret data
there.

On normal usage, you always boot your computer from USB-stick to encrypted
root on /dev/hda4. Key files used for encrypting /dev/hda4 and /dev/hda2 are
different, and use different gpg passphrases. If you accidentally try to
boot from hard disk, you never enter the 'key handover' passphrase. When you
are forced to reveal the 'key handover' passphrase, your computer boots to
encrypted root on /dev/hda2. You can do that only *once*, because according
to /etc/fstab on /dev/hda2 root partition, mount sets up random loop
encryption keys on /dev/hda4, and runs 'mkfs' on /dev/hda4, effectively
overwriting file system structure there. After one such 'key handover' boot,
even when used with correct key file and passphrase from your USB-stick, you
or anyone else, have significant difficulties recovering data from
/dev/hda4.

Although I will agree that this provides a great deal of security for the data I don't think that it provides 'deniability'. In particular if the attack consists of physical possession of the computer and an analysis of the disk drive content without the attempt to boot it, and even
more so if the usb key is available to the attacker.

Truecrypt does provide some degree of deniability, although you have clearly demonstrated previously its vulnerability to watermark attacks (which somewhat diminishes the deniability).



-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux