Re: LUKS/dm-crypt vulnerable?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,
of course, this also affects dm-crypt - or any other encryption scheme for that matter.

You need an unbroken chain of trust to achieve security. You must be able to trust your hardware/firmware, your BIOS, the code in your MBR, your boot loader, your kernel, your drivers, your system libraries, your shell, your cryptsetup executable and so on.

If an attacker manages to replace or manipulate at least one piece of that chain, he has broken your security. Here is an example of a keylogger implemented in keyboard firmware: http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09-Chen-RevAppleFirm-SLIDES.pdf (Yes, even keyboards might come with programmable flash nowadays ;-)

However, this is nothing new. If you assume that an attacker is determined and able to get physical access to your computer - especially without your knowledge - securing your system gets much, much harder.

In this case you need a method to verify the integrity of every compnent of your system. The best bet would probably be something like TPM. This should cover at least the BIOS and the rest of the software but manipulated firmware might still slip through.

Marc
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux