Re: Re: Result of supplying an incorrect passphrase?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Jul 17, 2009 at 01:16:04AM +0200, Michael Gebetsroither wrote:
> * Arno Wagner <arno@xxxxxxxxxxx> wrote:
> > No to nitpick, but my approach would be to not boot the computer
> > at all, but remove the drive and copy it (e.g. attached by USB)
> > on a different machine.
> 
> But thats not always possible with todays technology.
> You can seal the crypto keys for your data to your
> bootloader+kernel+initrd, so no one except your own binaries will ever
> get the keys.

I am not talking about getting the keys, but about making a
backup that defeats the destruction mechanism. 

> Adding txt security features from current intel systems you have runtime
> secure boot, so no one will be able to break into your bootsequence.
> 
> So it will only be possibel to decrypt the data on exactly this box with
> exactly this initrd+kernel.
> 
> Though the attacker can restore the destroyed luks header from backups.

This is what I am talking about. You can try to destroy
your LUKS header, but it will not work. The only thing you will
accomplish is another round in torture and then another go with
the backup.
 
> The real problem imho is that with this feature you are actively
> destroying evidence. Even trying to to this will get you into _real_
> problems, instead of just refusing to give out the keys or admit that
> this isn't just random data.

And LUKS is totally unsuitable for it, as the header
can be clearly recognized. Nobody can prove otherwise if you
use dm-crypt and claim it was with a random key for wiping the 
drive. This is still problematic, however. The only real solution
are a true tamper proof module (very hard to do) or that 
mythical cyanide pill.
 
> > Oh, and btw, having cryptographically strong randomness on a drive is also
> > a risk. Come to think of it, I do secure wipoes by mounting with dm-crypt
> > and random password, then overwrite with ordinary prng-randomness. There is
> > no way I can prove I do not have the key or the data was random. But that
> > alone should protect me here.
> 
> I usually do a whipe with dm-crypt + random password followed by dd with
> /dev/zero.
> Much less trouble, just in case someone takes a closer look.

Basically the same thing I do and I doubt it is much less trouble ;-)

> michael
> -- 
> It's already too late!

Indeed.

Arno
-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux