[dm-crypt] self-destruct mode for dm-crypt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

is it possible to add a self-destruct passphrase to the encrypted
filesystem ?
Are there any intentions to implement a self-destruct solution ?

This would be wonderful if one is forced to mount the crypto-fs.
IMHO there exist at least two possibilities for this case:
	(1) the "a gun is pointed at your head" situation
	(2) the more likely situation, where local law enforcement (or other legal
	    forces) try to get your data

A litte bit on situation (2) (might not be true for all countries):
	one can say that law enforcement has no right to force you to show them
	your personal encrypted data (like emails, source code, whatever).
	However, it might be the case that they have reasonable suspicion (or at
	least they say so) and you would get the maximum penalty in case you do not
	show the data to them.
	It's comparable to drunken driving: If you agree to do a
	field sobriety test (FST) you'll get your justified penalty, but if you
	disagree you get maximum penalty.
	Of course, this is just an example and there might be numerous other similar
	"legal" situations.
	
	note: What information is stored on the encrypted disk and if it's legal or not
	should not be point of discussion here.


My idea for self-destruct would be the following:
	There are two passphrases for an encrypted partition: the "real" one and the
	self-destruct passphrase.
	The "real" one just mounts the encrypted disk of course.
	The self-destruct passphrase will set up a new filesystem (thus no real secure
	self-destruct) and then run some encrypted script or program which will
	populate the newly created filesystem with "nonsensitive" but meaningful data
	(like some kernel source or newsgroup messages).

	The goal is that the attacker believes to get what he wants (access to the
	encrypted data).
	To achieve an even higher level of security, the previous disk content would
	have to be overwritten multiple-times with random trash and the self-destruct
	mechanism would have to be removed as well, so that the newly created
	filesystem containing the "nonsensitive" data works like expected.

I'm currently implementing some dirty-hack solution which is based on
encrypted shell-script execution.
(To be more specific, the cryptsetup tool passes the passphrase to the
shellscript decryption routine (the shellscript resides on the root-fs) and
executes the script if the passphrase was right (thus self-destruction).
Otherwise execution returns to the cryptsetup routines which set up the
crypto-filesystem).
Needless to say, that this solution is neither very secure (security through
obscurity) nor does it work if the harddisk is used on another system.

For a real solution, I would suggest the following:
	* The encrypted script is stored on the disk itself
	* some solution will have to be found, so that the
	  self-destruct mechanism works a bit more hard- and software independant.

I think that it is extremely difficult to impossible to implement a
system-independant solution.
The only ways to implement it is on userspace (cryptsetup) or kernel-space
(dm-crypt).
Unfortunately, if the attacker does not have the right kernel or
cryptsetup-tools self-destruct will not work.

Maybe it would be better to just store 2 data-partitions in one (real)
partition ?
The idea would be the following:
	There would be 2 passphrases and 2 virtual partitions: a storage partition and
	a fake partition.
	The fake partition is mounted with the fake-passphrase and vice-versa.
	Both partitions have the size of the (large) storage-partition (thus they
	overlap), so if the fake partition is mounted the space the storage partition
	takes will be free-space.
	If there is no real-space on the fake-partition left, the
	fake-partitions	starts to overwrite the storage-partition (which is then
	unuseable).
	The storage-partition does of course not have this feature.

Please let me know what you think of it.

---------------------------------------------------------------------
 - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux