Re: Cascading two plain dm-crypt volumes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Nov 29, 2013 at 01:08:25 CET, Claudio Moretti wrote:
> Forgot to hit "reply to all". Forwarding to the list.
> ---------- Messaggio inoltrato ----------
> Da: flyingstar16@xxxxxxxxx
> Data: 29/nov/2013 00:06
> Oggetto: Re:  Cascading two plain dm-crypt volumes
> A: anderson jackson <thewizard@xxxxxxxxxxxx>
> Cc:
> 
> 
> Il 28/nov/2013 23:32 "anderson jackson" <thewizard@xxxxxxxxxxxx> ha scritto:
> >
> > Hello,
> >
> > I have a small question regarding luks and plain dm-crypt, and I am unsure
> > what to use.
> >
> > I feel that the advantages provided by Luks obviously offers extra
> security
> > compared to plain, however I feel uneasy about the obviousness of the fact
> > that the drive is encrypted. Mainly because a disk with just random data
> could
> > have been wiped instead of encrypted. I would like the extra security
> provided
> > by luks without it being obvious that the disk is encrypted. To combat
> this I
> > was thinking about doing a cascade of two identical ciphers in plain mode
> 
> I may be mistaken, but (a) if you're using plain mode, there is no
> indication that the disk is encrypted; from the FAQ
> 
> "Plain format is just that: It has no metadata on disk, reads all
> parameters from the commandline (or the defaults), derives a master-key
> from the passphrase and then uses that to de-/encrypt the sectors of the
> device, with a direct 1:1 mapping between encrypted and decrypted sectors."

Correct, but incomplete. There is also no indication that the disk
is _not_ encrypted. Remember than often, if there is initial 
suspicion, you will have to prove your innocence.
 
> And if you're worried about the fact that if a hacker gets you password
> right he will be able to decrypt your disk, there is no guarantee that it
> can happen twice.  True, the probability get extremely reduced, but AFAIK
> current estimates say that to crack AES128 you need 30 years of continuous
> computing, so...

Depends entirely on passphrase quality, see FAQ Item 5.1.
If an attacker guesses that there will be some non-random
data at the start (the LUKS header), breaking both encryptions 
is just as hard as breaking the LUKS one, if bothe pass-hrases
are of similar quality. The plain mapping will be about 
100'000 times easier, as it does not iterate the hash.

> If instead you meant two cascaded luks partition, you still need the luks
> identifier in the "inner" partition so an attacker would know when your
> partition is open because the luks header of the partition will be in
> plaintext.

If I understood this right, it is plain(luks(data))
 
> All of this is to the best of my actual knowledge, if I got something
> wrong, please correct me.

See above.

Arno
-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@xxxxxxxxxxx
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
There are two ways of constructing a software design: One way is to make it
so simple that there are obviously no deficiencies, and the other way is to
make it so complicated that there are no obvious deficiencies. The first
method is far more difficult.  --Tony Hoare
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux