[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Just how secure encrypted linux partitions really are?



Another thing : you have to make sure the swap is encrypted or there
will be chances that the passphrase is just sitting there in clear...

Le dimanche 12 décembre 2010 à 09:20 +0100, news a écrit :
> See : http://en.wikipedia.org/wiki/Linux_Unified_Key_Setup
> 
> ASFAIK, dmcrypt is the solution used by all distros around and it
> doesn't support TPM.
> 
> So cracking the disk "just" require the passphrase.
> Though you have to make sure it is not using CBC by default on CentOS,
> otherwise it would be possible to retrieve the passphrase pretty easily.
> 
> JC
> 
> Le dimanche 12 décembre 2010 à 07:14 +0000, Thor (Hammer of God) a
> écrit :
> > > > Hello to All,
> > > >
> > > > If anyone have serious hands-on experience with this, I would like to
> > > > know some hard facts about this matter... I thought to ask you,
> > > > because here're some of the top experts in this field, so I could find 
> > > > few
> > > better places.
> > > > Hope you can nodge me in the right direction, and take the time to
> > > > answer this.
> > > >
> > > > ...
> > > >
> > > > Could some of you please give me some of your thoughts about this?
> > > > And, maybe, what other methods of file system encryption are out there
> > > > which are more secure?
> > > >
> > > If you are using a PBE (password based encryption), its no stronger than 
> > > the
> > > password. Though stated regarding Microsoft's BitLocker, the same applies
> > > to all PBE systems: "BitLocker, at its core, is a password technology, we 
> > > simply
> > > have to get the password...", Exploration of Windows 7, Advanced Forensics
> > > Topic (page 70).
> > > 
> > > If your file system key is on a USB thumb drive, the security is probably 
> > > only
> > > as strong as the physical security on the thumb drive.
> > > 
> > > Jeff
> > 
> > Hey Jeff - not sure if you read the LE deck or just referenced Wikipedia, 
> > but regarding Bitlocker, there is a good bit more to it.  Saying to 
> > "simply" get the password (not sure who would have written that) isn't 
> > "simple."  It's not like the password (passphrase) is stored anywhere...  
> > And yes, there should be some physical security around the USB key, where 
> > the actual KEY is, but with Bitlocker anyway, you can leverage TPM, etc to 
> > make things far more difficult.
> > 
> > I'm not familiar with CentOS's drive encryption solution - does it operate 
> > like bitlocker in that system configuration hashes must match that stored 
> > by BL before mounting?   That's one of the benefits of Bitlocker - even if 
> > you have the PIN, you can't mount the drive in another machine.   If CentOS 
> > acts in a similar manner, then just getting the password won't help.  
> > 
> > When you throw TPM in the mix with a PIN (as the actual deck refers to), 
> > then you need the PIN to get to the TPM to get the keys used to check the 
> > stored hash against the system before it can mount.  TPM-based encryption 
> > is pretty easy, so if CentOS supports that, it very well be far more 
> > difficult (or statistically impossible) to decrypt.    In Bitlocker's case, 
> > if a recovery key infrastructure is in place, then those could be leveraged 
> > as well. 
> > 
> > In any event though, to answer the OP's specific question about getting to 
> > the drives in an array and decrypting them without the key, that would 
> > indeed be impossible unless there were some other configuration or 
> > implementation issue present. 
> > 
> > t
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/