Re: using a salt for encrypting blocks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



En réponse à Arno Wagner <arno@xxxxxxxxxxx> :
> > not if I change all of them.
> 
> Indeed. Which you cannot do in practice.
>
By changing the salt, yes. I understand that's a huge performance issue on
closing the device, but it's acceptable in regard of the privacy gain.
  
> > In this situation it helps in order to change the ciphered 
> > version even if we don't change the clear.
> > -We could change the master key: impossible in practice.
> 
> Not harder than changing the salt, actually. You do have
> to recrypt the whole device anyways for this to be secure, 
> so changing the master key is entrierly possible.
>
No. The problem lies when you trans-cipher the device from the
old master key to the new master key.
You begin to transcipher to the half of the device, then you 
encounter a power loss of your laptop. The next boot, you 
lost a lot of things. Either the new master key is saved, then 
you read only what has been transciphered, or the old 
master key, and you can read the other half. And if you have 
both keys, you can't determine which one has to be used for
a specific block, or you must track what's has been 
transciphered which seems to be harder to implement than 
just changing the salt.

Plus, but I didn't want to say it, you can imagine random block changes when
using the device. Just check when the system is not busy, check an unused
block, recipher it.
 
> > If we use a salt, we can always decipher, even if a break
> > occurs while reciphering; at last, only one block could be
> > unreadable.
> 
> If thet one block holds critical meta-information, the 
> damage can be extreme.
> 
Yes but it's allways the situation when a disk is hard-stop
by a power loss.

> Sorry, this is not the way to go. And you are not the
> first with this (or a similar) idea as well. If you really
> want to prevent visibility of what was changed in the 
> encrypted device

yes

> (and as Milan rightfully points out, the
> attacker already has repeated access),

Yes, I think that's unavoidable. You have to consider
that an attacker has repeated access to your computer.

> the only good way 
> is to make it a filesystem feature and write a lot
> of fake data in addition.

ok. but it would be tight to a filesystem. Working with
the block level could be used with anything.

>  AFAIK, nobody cared enough
> for the, at best, marginal increase in security to
> actually implement such a scheme.
> 
ok. I understand, but I disagree with the "marginal" 
impact :-)

thanks

> _______________________________________________








Envoyé avec Inmano, ma messagerie renversante et gratuite : http://www.inmano.com



_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux