Re: why init crypto partition with random data?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Junk ;-)

junk <junk@...> writes:

> 
> Roscoe wrote:
> > My two cents:
> >
> >
> > I personally think that page should be reworded.
> > "This makes breaking the passphrase so much harder" Says who?
> >
> >
> > Overwriting the previous contents of the HD does have some value
> > regarding secure deletion IMHO, just not very much - someone can't
> > just run `strings /dev/sda` after you've zeroed out a hard drive,
> > rather they need some specialized hardware and skills.
> >
> >
> > As for writing random data to the disk for the purposes of obscuring
> > the ciphertext location:
> >
> > So what if they do know the exact boundaries of the ciphertext? The
> > ciphertext doesn't need to be kept secret. That's the whole idea of
> > ciphertext.
> >
> That's true only if the plaintext is genuinely unknown. This is not the 
> case for filesystem data - it contains many elements that are pretty 
> predicatable. Not overwriting the disk with random data before creating 
> an encrypted file system on it might give an attacker useful information 
> about the boundaries between unused portions of the disk and files 
> system structures and the files themselves. This in turn could be used 
> to mount a known plaintext attack, particularly if the attacker knows 
> your operating system/distribution/file system type

This is a good point. Although I'm not really able to quantify the loss of 
security here, I understand that knowing the BOUNDARIES between encrypted and 
unencrypted data yields some info on the allocation of the file system, hence 
makes it easier to do educated guesses on certain sectors that contain FS 
administration data only. So it increases the attack vector for known plaintext 
attacks. I didn't think of this in the first place. 

Is anyone able to pursue this train of thoughts any further, how these known 
plaintext attacks help breaking confidentiality of the ciphertext?



---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux