Hi all. I just wrote a very simple key-slot checker. It divides all active keyslots into 512 byte sectors and calculates entropy for each. For valid encrypted data, entropy will be close to 0.95 on average (would be 1, but this is sample entropy, calculated on a limited data set). No fancy output, no library usage (but verifies LUKS version), support for non-default key-sizes and setting your own entropy threshold. I put in 0.85 as default threshold, which should work well. Now I am not sure where to put it. Should I put it in misc/ in the sources? That seems to be sort of a contrib/ directory. Or should we add a section in the Wiki for tools? Anyways, if anybody want to test it, it is attached. Compile instructions at the head of the file. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@xxxxxxxxxxx GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell
/* * Simple LUKS keyslot entropy tester. Works only for header version 1. * This is a quick hack, do not expect too much. * In particular, this could be scripted for greater flexibility. * * Version history: * v0.1: 9.9.2012 Initial release * * Copyright (C) 2012, Arno Wagner <arno@xxxxxxxxxxx> * * * This file is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This file is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this file; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, * MA 02110-1301 USA. */ /* * this should compile with a simple * gcc -lm chk_luks_keyslots.c -o chk_luks_keyslots */ #include <stdlib.h> #include <stdio.h> #include <unistd.h> #include <math.h> #include <fcntl.h> #include <inttypes.h> char * help = "Help:\n" "\n" "This tool checks all keyslots of a LUKS device for \n" "low entropy sections. If any are found, they are reported. \n" "This allows to find areas damaged by things like filesystem \n" "creation or RAID superblocks. \n" "\n" "Default parameters: \n" " Section size: 512 bytes \n" " Entropy threshold: 0.85 \n" //" Print details at end: no \n" " \n" " \n" "Commandline parameters: \n" " \n" " chk_luks_keyslots [options] luks-device \n" " \n" "Options: \n" " -t <num> Entropy threshold. Possible values 0.0 ... 1.0 \n" //" -v Print found suspicuous sectors verbosely at end \n" "\n"; /* Config defaults */ int sector_size = 512; double threshold = 0.85; struct bad_sector { int num; int keyslot; int ks_start; int offset; int entropy; struct bad_sector * next; /* for linked list */ }; struct bad_sector * first_bad; struct keyslot { int num; uint32_t active; uint32_t key_material_offset; uint32_t stripes; int start; int len; }; struct keyslot ks[8]; /* tools */ double ent_samp(unsigned char * buf, int len) { /* Calculates and returns sample entropy on byte level for * The argument. */ int freq[256]; // stores symbol frequencies int i; double e, f; // 0. Plausibility checks if (len <= 0) return(0.0); // 1. count all frequencies for (i = 0; i < 256; i++) { freq[i] = 0.0; } for (i = 0; i < len; i ++) freq[buf[i]]++; // 2. calculate sample entropy e = 0.0; for (i = 0; i < 256; i++) { f = freq[i]; if (f > 0) { f = f / (double)len; e += f * log2(f); } } if (e != 0.0) e = -1.0 * e; e = e / 8.0; return(e); } int main(int argc, char **argv) { /* for option processing */ int tflag = 0; double tvalue = 0.8; int vflag = 0; int opt_index; int c; char * device; unsigned char * buffer; /* Other vars */ int f_luks; // device file for the luks device uint32_t stripe_size; /* temprary helper vars */ int i; uint32_t u32; uint16_t u16; /* get commandline parameters */ while ((c = getopt (argc, argv, "t:v")) != -1) { switch (c) { case 't': { char * s, * end; tflag = 1; s = optarg; tvalue = strtod(s, &end); if (s == end) { fprintf(stderr, "\nError: Parsing of argument to -t failed.\n"); abort(); } if (tvalue < 0.0 || tvalue > 1.0) { fprintf(stderr,"\nError: Argument > 1.0 or < 0.0 to -t\n"); abort(); } threshold = tvalue; break; } case 'v': vflag = 1; break; case '?': if (optopt == 't') fprintf (stderr,"\nError: Option -%c requires an argument.\n", optopt); else if (isprint (optopt)) { fprintf(stderr,"\nError: Unknown option `-%c'.\n", optopt); fprintf(stderr,"\n\n%s", help); } else { fprintf (stderr, "\nError: Unknown option character `\\x%x'.\n", optopt); fprintf(stderr,"\n\n%s", help); } return(1); default: abort(); } } /* parse non-option stuff. Should be exactly one, the device. */ if (optind+1 != argc) { fprintf(stderr,"\nError: exactly one non-option argument expected!\n"); fprintf(stderr,"\n\n%s", help); abort(); } device = argv[optind]; /* test whether we can open and read device */ f_luks = open(device, O_RDONLY); if (f_luks == -1) { fprintf(stderr,"\nError: Opening of device %s failed:\n", device); perror(NULL); abort(); } /* some init */ buffer = (unsigned char *) calloc(sector_size, 1); /* plausibility checks: look for magic string and version field. */ lseek(f_luks, 0, SEEK_SET); read(f_luks, buffer, 6); if (buffer[0] != 'L' || buffer[1] != 'U' || buffer[2] != 'K' || buffer[3] != 'S' || buffer[4] != 0xBA || buffer[5] != 0xBE) { fprintf(stderr,"\nError: LUKS magic string not found!\n"); abort(); } lseek(f_luks, 6, SEEK_SET); read(f_luks, buffer, 2); /* LUKS headers are stored big-endian, i.e. network byte order */ u16 = ntohs(*(uint16_t *)buffer); if (u16 != 1) { fprintf(stderr,"\nError: LUKS header version is not 1!\n"); abort(); } /* Find stripe size. It is the same as the key-bytes. */ lseek(f_luks, 108, SEEK_SET); read(f_luks, &u32, 4); stripe_size = ntohl(u32); // printf("stripe size: %d\n", stripe_size); /* enumerate keyslots */ for (i = 0; i < 8; i ++) { lseek(f_luks, 208 + i * 48, SEEK_SET); read(f_luks, &u32, 4); u32 = ntohl(u32); if (u32 == 0x00ac71f3) ks[i].active = 1; else if (u32 == 0x0000dead) ks[i].active = 0; else { fprintf(stderr, "\nError: found unknown value in keyslot %d active field: %8x\n", i, u32); abort(); } lseek(f_luks, 208 + i * 48 + 40, SEEK_SET); read(f_luks, &u32, 4); ks[i].key_material_offset = ntohl(u32); lseek(f_luks, 208 + i * 48 + 44, SEEK_SET); read(f_luks, &u32, 4); ks[i].stripes = ntohl(u32); ks[i].num = i; ks[i].start = ks[i].key_material_offset * 512; ks[i].len = ks[i].stripes * stripe_size; // printf("num: %d active: %d start:%8x end:%8x\n", // ks[i].num, ks[i].active, ks[i].start, ks[i].start + ks[i].len); } printf("\nSectors with entropy below threshold (%f):\n", threshold); for (i = 0; i < 8; i ++) { int j; int s, l; int ofs; int num_sect; double ent; s = ks[i].start; l = ks[i].len; num_sect = l / sector_size; printf("\nKeyslot %d: start: %#8x \n", i, s); if (!ks[i].active) { printf(" keyslot not in use\n"); continue; } for (j = 0; j < num_sect; j++) { ofs = s + j * sector_size; lseek(f_luks, ofs, SEEK_SET); read(f_luks, buffer, sector_size); ent = ent_samp(buffer, sector_size); // printf("slot: %d offset: %8x ent: %f\n", i, ofs, ent); if (ent < threshold) printf(" position: %#8x entropy: %f\n", ofs, ent); } } return(0); }
_______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt