Re: Cascading two plain dm-crypt volumes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 29 Nov 2013 02:03:53 +0100 Arno Wagner <arno@xxxxxxxxxxx> wrote

> On Fri, Nov 29, 2013 at 01:49:57 CET, anderson jackson wrote:
> > On Fri, 29 Nov 2013 01:32:51 +0100 Arno Wagner <arno@xxxxxxxxxxx> wrote
> > 
> > > If I understood this right, it is plain(luks(data))
> > 
> > No actually I meant plain(plain(data)). Therefore you won't see the luks
> > header when the attacker finds the correct pass but just random data.
> > 
> 
> That is not really more secure than just plain with the two 
> passphrases concatenated (as long as the entropy does not
> exceed the key length). No reason to do this, except if you 
> mistrust the ciphers and want to use two different ones.

My knowledge about the subject is only skin deep. However I feel as if I am
missing something and in addition to that I must have explained myself poorly.
What I was suggesting is cascading two identical ciphers (both AES) in plain
mode with two independent passphrases one for the first plain block device and
another for the second one. 
/dev/sdx = random data
/dev/mapper/cascade1 = random data
/dev/mapper/cascade2 = file system

Let’s say an attacker is using brute force to find the passphrase and
let’s say the tries he has performed includes the first passphrase. When
that passphrase was tried the decrypted result would have been random data
just as if it were a wrong passphrase. The attacker has no way of knowing that
there is a cascade since there is no header or other identifiable markers. So
even when he finds the correct passphrase it would appear to be a failed
attempt because he only gets random data. He would have to try to brute force
the passphrase for the second plain block device for each of the used phrases
of the first block device. 

Jackson


____________________________________________________________
South Africas premier free email service - www.webmail.co.za 

Cotlands - Shaping tomorrows Heroes http://www.cotlands.org.za/


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt





[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux