Mastery Key and RAM burn-in

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I would suggest that Gutmann's insights (which were pretty 
good when published) are pretty much outdated 18 years later.
Manufacturing processes have changed and cell stability is
vastly better than it was (or DRAMs would not survive very 
long). It is not clear whether these attacks still work and
how much effort they would be. 

This attack is not a widespread concern in the security 
community these days though. As far as I am aware (correct
me if I am wrong), there is not a single instance where
this attack was used successfully. 

Anyways, this is not a LUKS or dm-Crypt issue. This is an
issue with the kernel crypto services, I believe. loop-AES
is kind of historic and still did its own crypto. That is
not how things work these days.

Regards,
Arno
Alright thanks for making it clear. The only instance of a successful attack was with a machine using SRAM which is antiquated.


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux