Re: few questions on truecrypt and luks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Am 15.04.2013 16:59, schrieb Arno Wagner:
> On Mon, Apr 15, 2013 at 03:47:38PM +0200, octane indice wrote:
>> Responding to  ".. ink .." <mhogomchungu@xxxxxxxxx> :
>>
>>> Two differences i can think of are:
>>> 3. luks doesnt support hidden volumes.
>>>
>> It does, in a way.
> 
> True. Not much worse than the TrueCrypt variant actually. 

Ocatane, thanks for the example. Arno, thanks for additional
explanations. May I suggest adding this to the FAQ?

Kind regards,
 jonas

>  
>> Create a loop file (or an existing partition).
>> fill it with random data (important!)
>> cryptsetup luksFormat it
>> cryptsetup luksOpen it
>> Format the crypted device with FAT32 (important!)
> 
> Yes, as FAT32 fills a volume from the beginning.
> 
>> Then, use loop with a high offset, e.g. more than half of the disk,
>> create a plain cryptsetup
> 
> To avoid metadata.
> 
>> losetup -o 10000000 device
>> cryptsetup create loop secretname
>> format it with any filesystem, copy your very secret documents in it, close
>> this partition.
>>
>> By doing this, anyone without the knowledge of the offset + the password
>> won't be able to prove that you have datas hidden.
>> Warning, if you write more data in the first luks device than the offset
>> choosen, you destroy data (but in some case, you may want it).
>>
>> My 2 cents.
> 
> The problem with hidden volumes is this: Either you have the risk
> of destroying them, or you cannot use the partition they are
> hiding in (which gives a good hint to an attacker), or you need to 
> reserve space for them explicitely (which gives a strong hint to the
> attacker). 
> 
> TrueCrypt does not do any better here. Also keep in mind that
> in many situations (US border inspection, e.g.) the mere suspicion
> of a hidden partition being present will be enough.
> 
> Arno
> 

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux