Listing encryption keys is a Bad Idea

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello dm-cryptics,

I was shocked to learn that the encryption keys for dm-crypt volumes are
visible to root:

# dmsetup table swap
0 1975932 crypt aes-cbc-plain 3132333435363738313233343536373831323334353637383132333435363738 0 3:6 0

The 3132... reveals what I put in the keyfile that I setup for this test.

Showing this kind of information is a Bad Idea.  It means, for example,
that an encrypted swap can be read after system down by anyone who happened
to record this bit of information.

It also means that encrypted file systems, which have to rely on symmetric
encryption with long-lived keys, are a lot more open to attacks than
strictly necessary.

It has always been good design practice to hide keys like these from
users, even root, because the forward-direction of supplying the same
key at later sessions is always possible.  The convenience of listing
the table in a copy/paste mode is far too convenient for attackers.


Best regards,

Rick van Rein,
OpenFortress Digital signatures

http://openfortress.nl

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux