Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Bill Bogstad
On Wed, Oct 1, 2014 at 3:49 AM, Bill Horne wrote: > On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote: >> >> In linux, I'm not aware of any product that does whole disk encryption >> without needing a power-on password. In windows, Bitlocker uses the TPM to >> ensure the OS gets booted untamper

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Edward Ned Harvey (blu)
> From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- > bounces+blu=nedharvey@blu.org] On Behalf Of Bill Horne > > On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote: > > In linux, I'm not aware of any product that does whole disk encryption > without needing a power-on password.

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Bill Bogstad
On Wed, Oct 1, 2014 at 12:52 PM, Edward Ned Harvey (blu) wrote: >> From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- >> bounces+blu=nedharvey@blu.org] On Behalf Of Bill Horne >> >> On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote: >> > In linux, I'm not aware of any product t

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Edward Ned Harvey (blu)
> From: Bill Bogstad [mailto:bogs...@pobox.com] > > It seems like > whenever people start talking about computer security, there is a > tendency to shoot for the maximum theoretically possible. We don't do > that when it comes to our cars or homes, but it does with computers. Along a similar vei

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
Meh. Today, if someone were to ask my opinion I'd say "no" to any and every software-based disk encryption system. If you want to encrypt the entire disk then get a self-encrypting disk and set a BIOS/firmware password on the host. -- Rich P. ___ Discu

Re: [Discuss] Shellshock

2014-10-01 Thread Mike Small
Bill Ricker writes: > Code fuzzed on the ENV value *after* the function definition should > not have been accepted at all. Executing it at function def time is a > bug. What troubles me most about this is how the bit of code that reads in environment variables sends the function body string into

Re: [Discuss] Shellshock

2014-10-01 Thread Richard Pieri
On 9/30/2014 10:59 PM, Bill Ricker wrote: >Code injection in a critical gut component like /bin/sh ... > implemented with a link. Oops ! And Lennart wonders why some of us hate his code. > Note that Multiple additional BASH security bugs have been found > and/or fixed since they started look

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Bill Horne
On 10/1/2014 9:32 AM, Edward Ned Harvey (blu) wrote: From: Bill Bogstad [mailto:bogs...@pobox.com] It seems like whenever people start talking about computer security, there is a tendency to shoot for the maximum theoretically possible. We don't do that when it comes to our cars or homes, but

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Bill Bogstad
On Wed, Oct 1, 2014 at 4:56 PM, Richard Pieri wrote: > Meh. > > Today, if someone were to ask my opinion I'd say "no" to any and every > software-based disk encryption system. If you want to encrypt the entire > disk then get a self-encrypting disk and set a BIOS/firmware password on > the host.

[Discuss] Back to the OP: Re: Server/laptop full-disk encryption

2014-10-01 Thread Rich Braun
Discussion on this topic has veered from the technical -- what's the state of open-source or low-cost key-server and encryption software today -- to the tactical: why bother? I'll address the why-bother: I live in the heart of the tech capital of the world, San Francisco. The city is seeing a sur

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
On 10/1/2014 11:19 AM, Bill Bogstad wrote: > Because you trust the firmware provided by the disk drive manufacturer? You > clearly aren't wearing your tin foil hat today. The encryption in SEDs is good enough to keep someone who swipes a notebook from getting at the data on it. They're strong ag

Re: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption

2014-10-01 Thread Richard Pieri
On 10/1/2014 12:06 PM, Rich Braun wrote: > (a) the keys are convenient, readily accessible at every reboot > (b) the keys can't readily fall into the wrong hands These are contradictory requirements. The more readily accessible the keys are, the more readily they can be obtained by unwanted actors

Re: [Discuss] Shellshock

2014-10-01 Thread Bill Ricker
On Wed, Oct 1, 2014 at 11:07 AM, Richard Pieri wrote: >> Note that Multiple additional BASH security bugs have been found >> and/or fixed since they started looking harder in the last week. > Which is not a bad thing as long as the people looking actually > understand what they are looking at and

Re: [Discuss] Shellshock

2014-10-01 Thread Richard Pieri
On 10/1/2014 12:34 PM, Bill Ricker wrote: > Yes indeed. Unskeptical eyes are useless for security review no matter > how multiplied. As an aside, this is why I trust self-encrypting disk firmware. Rather, it's better to say that I don't trust it any more or less than I trust software like TrueCryp

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Derek Martin
On Tue, Sep 30, 2014 at 09:49:48PM -0400, Bill Horne wrote: > On 9/30/2014 9:38 AM, Edward Ned Harvey (blu) wrote: > >In linux, I'm not aware of any product that does whole disk > >encryption without needing a power-on password. In windows, > >Bitlocker uses the TPM to ensure the OS gets booted un

Re: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption

2014-10-01 Thread Bill Horne
On 10/1/2014 12:06 PM, Rich Braun wrote: Discussion on this topic has veered from the technical -- what's the state of open-source or low-cost key-server and encryption software today -- to the tactical: why bother? As it must at some point: even if I were an FAA-certifiend Airframe and Powerp

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Derek Martin
On Wed, Oct 01, 2014 at 01:41:43PM +0200, Bill Bogstad wrote: > Unlike on-line data thieves who can automate their data collection > to attack thousands, actually retrieving data from you stolen laptop > will take significant human effort on their part. Unless it doesn't. If the attacker knows yo

Re: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption

2014-10-01 Thread Richard Pieri
On 10/1/2014 2:38 PM, Bill Horne wrote: >> (a) the keys are convenient, readily accessible at every reboot >> (b) the keys can't readily fall into the wrong hands > > Fingerprint scanner. A sharp knife will rectify that. -- Rich P. ___ Discuss mailing

Re: [Discuss] Back to the OP: Re: Server/laptop full-disk encryption

2014-10-01 Thread Rich Braun
I'm *still* getting question as to why I want to encrypt my servers. There's 100,000+ photos on them. Email from the last 20 years. Brokerage account and billing details. Typical of most anyone's server here. (I can hear the voices saying: just put it in the cloud. Feh. I work in the cloud, t

Re: [Discuss] Need speaker and topic for October BLU meeting

2014-10-01 Thread Jerry Feldman
I suggested possibly a talk on file systems, such as EXT, BTRFS, XFS, and ZFS. Target this to users without getting overly technical. Unfortunately I cannot be at the October meeting. Currently there is a confusing set of elements for the users: RHEL 7 is standardizing on XFS, Fedora 20 uses EXT4 a

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Jerry Feldman
Richard lives in a faraday cage :-) The reasons I prefer software encryption is that algorithms can be compromised. A software encryption system can be updated, and re-encrypt your data. While firmware can also do the same thing it is more difficult. Additionally you can set the BIOS/frmware passwo

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
On 10/1/2014 3:59 PM, Jerry Feldman wrote: > Also, consider how valuable your data might be to a thief. Rather, consider why, if the data is so valuable, you're storing it where he can gain physical access to it. -- Rich P. ___ Discuss mailing list Dis

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Tom Metro
Richard Pieri wrote: > There is a clever SED attack: hotplug. If you disconnect the SATA data > cable without disconnecting power then you can plug the drive into a > different host and the data will be readable. This is easily foiled > simply by turning off the computer when physical security is l

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Jerry Feldman
Considering Rich Braun, he probably has a 2-bedroom apartment with both bedrooms filled with computers, and he sleeps on a pull out couch in the living room. But, you are right on with that. Physical security is always the best first option. But, for a regular person who essentially can't afford a

Re: [Discuss] Shellshock

2014-10-01 Thread Tom Metro
Bill Ricker wrote: > Yes, it's a fair point that Gnu project is older than either Apache or > Linux, but that doesn't exempt Bash from criticism. > > Alas there is both a mis-guided feature and at least one bug in the > feature (even assuming its intent ever made any sense) -- as well as > the en

Re: [Discuss] Need speaker and topic for October BLU meeting

2014-10-01 Thread Bill Ricker
On Wed, Oct 1, 2014 at 3:48 PM, Jerry Feldman wrote: > I suggested possibly a talk on file systems, such as EXT, BTRFS, XFS, > and ZFS. Target this to users without getting overly technical. > ...> Another part of this would be RAID. Great idea for topic, need a presenter who can boil it down.

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Bill Bogstad
On Wed, Oct 1, 2014 at 8:44 PM, Derek Martin wrote: > On Wed, Oct 01, 2014 at 01:41:43PM +0200, Bill Bogstad wrote: >> Unlike on-line data thieves who can automate their data collection >> to attack thousands, actually retrieving data from you stolen laptop >> will take significant human effort on

Re: [Discuss] Shellshock

2014-10-01 Thread Bill Ricker
On Wed, Oct 1, 2014 at 4:59 PM, Tom Metro wrote: > But in the case of CGI you are just moving the network/local > barrier a bit further down the stack. and moved it right through system() => /bin/sh => /bin/bash by alias which last wasn't designed to be network secure. > The CGI code is written

Re: [Discuss] Shellshock

2014-10-01 Thread John Hall
On Wed, Oct 1, 2014 at 4:59 PM, Tom Metro wrote: > > The age thing is a bit of a red herring, and that this came about due to > a bug in Bash is almost irrelevant. The responsibility lies squarely > with the application that provides the network interface. It should not > be handing off unsaniti

Re: [Discuss] key server

2014-10-01 Thread Tom Metro
Rich Braun wrote: > (a) the keys are convenient, readily accessible at every reboot > (b) the keys can't readily fall into the wrong hands Is it a requirement that reboots happen unattended? If not, what level of interaction is acceptable? You said in a previous message you didn't want to have to

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Bill Bogstad
On Wed, Oct 1, 2014 at 6:08 PM, Richard Pieri wrote: > On 10/1/2014 11:19 AM, Bill Bogstad wrote: >> Because you trust the firmware provided by the disk drive manufacturer? You >> clearly aren't wearing your tin foil hat today. >... > > There is a clever SED attack: hotplug. If you disconnect th

Re: [Discuss] Shellshock

2014-10-01 Thread John Abreau
Seems to me that changing the /bin/sh symlink to point to dash instead of bash should ameliorate the problem, at least where scripts that invoke /bin/sh don't depend on bash features. Of course, finding all such sloppily-written scripts on an existing server could be a big chore. Once found, they

Re: [Discuss] Shellshock

2014-10-01 Thread Bill Ricker
On Wed, Oct 1, 2014 at 5:34 PM, John Hall wrote: > It also that shellshock would not apply to scripts in one language that > use a subprocess for some functionality like a script in python or ruby > that uses results from a perl or even a bash script, as long as any data > that is passed went tho

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Rich Braun
Bill wrote: > And we are back to what is your threat model and potentially > "rubber hose" key retrieval. > Or for that matter, if you have a "lot of money" do you have > paper copies of your financial statements and if so do you keep > them in a locked safe? And what about someone setting up a sp

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
On 10/1/2014 4:58 PM, Jerry Feldman wrote: But, you are right on with that. Physical security is always the best first option. But, for a regular person who essentially can't afford a secure facility for his/her data, you've got to consider both encryption and backing up to a secure backup locati

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
On 10/1/2014 5:48 PM, Bill Bogstad wrote: Actually, they don't do everything that (open source) software encryption does. They don't let you (or you an agent of your choice) audit the encryption algorithms/implementation to verify that everything is being done to spec. True as far as your choic

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Rich Braun
Rich Pieri suggests: > Or inside the box this time around: dog cages. A heavy duty, welded > steel dog cage will run you $300-$500 depending on the size. Bolt the > cage to the floor, put your server(s) in it, and lock it with a good > padlock. Voila! your own secure data cage. Thank you, Tom Metr

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Eric Chadbourne
FWIW, when I first started playing with computers, and was very poor, I used to take whatever my neighbors would discard on trash day and fix it up. I found a some personal info. Of course I didn't abuse this, but if it was encrypted it would have made me seeing it much harder. I think hard

Re: [Discuss] CipherShed: TrueCrypt fork

2014-10-01 Thread Richard Pieri
On 10/1/2014 8:27 PM, Rich Braun wrote: So: the dog-cage idea. Laugh if you want but I'm quite serious. I picked on dog cages because they're strong and reasonably mobile until you remove the wheels and bolt them down. Or chain to a couple of concrete blocks. Or embed in concrete. Or whateve

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Matthew Gillen
On 9/30/2014 2:20 AM, Rich Braun wrote: > The thorny problems with doing this are making sure that > > (a) the keys are convenient, readily accessible at every reboot > (b) the keys can't readily fall into the wrong hands > (c) infrequently-accessed filesystems aren't accessible except when needed

Re: [Discuss] Server/laptop full-disk encryption

2014-10-01 Thread Matthew Gillen
On 9/30/2014 2:20 AM, Rich Braun wrote: > The thorny problems with doing this are making sure that > > (a) the keys are convenient, readily accessible at every reboot > (b) the keys can't readily fall into the wrong hands > (c) infrequently-accessed filesystems aren't accessible except when needed

Re: [Discuss] Shellshock

2014-10-01 Thread Derek Martin
On Wed, Oct 01, 2014 at 05:33:58PM -0400, Bill Ricker wrote: > On Wed, Oct 1, 2014 at 4:59 PM, Tom Metro wrote: > > But in the case of CGI you are just moving the network/local > > barrier a bit further down the stack. > > and moved it right through system() => /bin/sh => /bin/bash by alias > whi

[Discuss] vz outgoing mail

2014-10-01 Thread Matthew Gillen
I finally had the problem someone else had a little while back where verizon's outgoing relay stopped working. Took a little fiddling to get it working; I believe the OP in that thread was using postfix. If you need to get sendmail going using a similar solution, check out the last post in this t