On Sat, 27 Jan 2007, Don Smith wrote:

> On the newer versions of OpenBSD, there is -K added as
> an option for SVND.
> 
> I always used the -k option with a strong key and no
> salt file.
> 
> Is the original -k method still secure, given a strong key?

No. But that's hearsay.  Here's what I heard someone say:

"The biggest drawback of svnd is its lack of security in the general
use case. It is vulnerable to an offline dictionary attack. That
is, you can generate a database mapping known ciphertext blocks on
the disk back into pass phrases that can be accessed in O(1) without
even being in possession of the disk. What's even worse is that the
same database will work on any svnd disk. It is possible--and perhaps
even likely--that large agencies such as the NSA have constructed
such a database and can crack a majority of the svnds in the world
in less than a second. The way that one prevents an offline dictionary
attack is to use a salt in conjunction with the pass phrase,"

Source: http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=3

Disclaimer: I am not a cryptanalyst.  Maybe that's all FUD and blown
smoke.  

Advice: Use the salt.  How can it hurt?  It depends on your threat
model.  If it's a laptop and you don't want some random thief or
whoever he sells your stolen property to to read your disk, -k will
suffice.  If you're worried about a large government, there are
still other considerations (rubber hoses for one), but the salt
won't hurt.  If I recall the source code correctly, using -k, you
are already using salt -- of zero.  The salt is used when generating
the key from the passphrase, and won't slow down the actual disk
en/decryption, so salt is a win.

Dave
-- 
      The law has converted plunder into a right and lawful defense
      into a crime.  -- Frederic Bastiat, 1850

Reply via email to