Re: Result of supplying an incorrect passphrase?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Eric Grejda wrote:
> Using /bin/dd assumes that the systems in question is already booted up
> and a root shell is available.  It wouldn't be too difficult for an
> attacker to run in, clock the user over the head, and hit ^C to stop the
> overwrite to copy the contents of /home/* to removable media.

This is always the case if the LUKS volume is decrypted, with or without
the mechanism.

So the mechanism is only for... what? Basically it needs a locked state
and someone entering the destruct code.

Bruteforce attacks will be done on copies, with a mechanism independant
from your kernel's variant of LUKS, so the destruct sequence doesn't
trigger.

When being forced to unlock the system, such a mechanism could only
remove the option to get away by unlocking it. If you have attacker that
will beat you up for the contents, this leaves you with the worst case
that you can also choose by refusing to unlock.

If you need to wipe the LUKS header without the running system, you
could also use livecd or dban for wiping.

> One supposes it depends on how valuable you consider the information:
> would it be better for no one to have the data at all, or for an
> attacker to potentially have at least some of the data at risk?

http://xkcd.com/538/

Yours, Uwe

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux