Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-27 Thread Oliver Fromme
Martin Laabs wrote: > Preventing the physical access to the memory modules > could be done with a light sensor or a simple switch > at the computer case. Easily to circumvent, too. > If you implement also a temperature- > sensor near the memory-modules you could prevent cooling > them down

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-27 Thread Achim Patzner
You might want to take a look at eNova (http://www.enovatech.net/) who are pointing at interesting hardware using their crypto technology. = the idea of closed-source hardware-based crypto disk drive may appeal to some, but i've seen too many similar things fail through st

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Atom Smasher
On Tue, 26 Feb 2008, Achim Patzner wrote: You might want to take a look at eNova (http://www.enovatech.net/) who are pointing at interesting hardware using their crypto technology. = the idea of closed-source hardware-based crypto disk drive may appeal to some, but i've seen t

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Martin Laabs
Hi, Maybe someone could implement a memory section that is overwritten by the bios after reboot. Then all the sensitive keys could be stored there. This would prevent an attack that just boots from another media and dump the whole memory out of i.e. an USB-stick. Preventing the physical access

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Pawel Jakub Dawidek
On Sat, Feb 23, 2008 at 02:08:54PM +1300, Atom Smasher wrote: > article below. does anyone know how this affects eli/geli? > > from the geli man page: "detach - Detach the given providers, which means > remove the devfs entry and clear the keys from memory." does that mean > that geli properly w

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Achim Patzner
Am 26.02.2008 um 12:45 schrieb Uwe Doering: You might want to take a look at eNova (http://www.enovatech.net/) who are pointing at interesting hardware using their crypto technology. Interesting approach as well. Thanks for the pointer. However, given that notebooks are the most vulnerabl

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Achim Patzner
Am 25.02.2008 um 23:48 schrieb Uwe Doering: Since it hasn't been mentioned so far: There are hard disk drives that do encryption on the firmware level, so you don't have to store keys on the OS level. I wouldn't go that far as there isn't (better: I didn't find) enough documentation on thei

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-26 Thread Uwe Doering
Achim Patzner wrote: Am 25.02.2008 um 23:48 schrieb Uwe Doering: Since it hasn't been mentioned so far: There are hard disk drives that do encryption on the firmware level, so you don't have to store keys on the OS level. I wouldn't go that far as there isn't (better: I didn't find) enough do

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-25 Thread Uwe Doering
Achim Patzner wrote: article below. does anyone know how this affects eli/geli? There's fairly little any disk crypto system can do to thoroughly defend against this. Hm. Strange. Serious hardware is very well suited to do that (usually by adding well defended crypto hardware). Keys don't hav

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-25 Thread Rink Springer
On Mon, Feb 25, 2008 at 03:33:30PM +, Igor Mozolevsky wrote: > [text] Guys, can you take this to chat@ please... -- Rink P.W. Springer- http://rink.nu "Anyway boys, this is America. Just because you get more votes doesn't mean you win." - Fox Mulder _

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-25 Thread Igor Mozolevsky
On 25/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote: > In response to "Igor Mozolevsky" <[EMAIL PROTECTED]>: > > > Crypto is merely a way of obfuscating data, and we all know the truth > > about security by obscurity, right? > > > I don't think you correctly understand the concept of "security th

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-25 Thread Bill Moran
In response to "Igor Mozolevsky" <[EMAIL PROTECTED]>: > On 24/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote: > > "Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: [snip] > > Fact is, data is "sensitive" to different degrees. It's also valuable > > to different degrees. > > > > If you're worried a

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-25 Thread Igor Mozolevsky
On 24/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote: > "Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: [snip] > > IMO the possibility of such attack is so remote that it doesn't really > > warrant any special attention, it's just something that should be kept > > in mind when writing "secure" cry

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-24 Thread Bill Moran
Christopher Arnold <[EMAIL PROTECTED]> wrote: > > > > On Sun, 24 Feb 2008, Bill Moran wrote: > > > Or laptop vendors could make "secure" laptops that always lose memory > > on shutdown. > > > That dosn't really change anything, just don't shutdown the laptop. It reduces the risk greatly when co

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-24 Thread Bill Moran
"Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: > > On 24/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote: > > "Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: > > > > > > On 23/02/2008, Brooks Davis <[EMAIL PROTECTED]> wrote: > > > > > > > > > > > You should actually read the paper. :) They successful

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-24 Thread Christopher Arnold
On Sun, 24 Feb 2008, Bill Moran wrote: Or laptop vendors could make "secure" laptops that always lose memory on shutdown. That dosn't really change anything, just don't shutdown the laptop. Cut an opening in the case and attach a probe to monitor memory access and wait for the key being ac

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-24 Thread Bill Moran
"Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: > > On 23/02/2008, Brooks Davis <[EMAIL PROTECTED]> wrote: > > > > > You should actually read the paper. :) They successfully defeat both > > of these type of protections by using canned air to chill the ram and > > transplanting it into another machi

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-24 Thread Igor Mozolevsky
On 24/02/2008, Bill Moran <[EMAIL PROTECTED]> wrote: > "Igor Mozolevsky" <[EMAIL PROTECTED]> wrote: > > > > On 23/02/2008, Brooks Davis <[EMAIL PROTECTED]> wrote: > > > > > > > > You should actually read the paper. :) They successfully defeat both > > > of these type of protections by using

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Tim Clewlow
--- Dimitry Andric <[EMAIL PROTECTED]> wrote: > On 2008-02-23 02:08, Atom Smasher wrote: > > article below. does anyone know how this affects eli/geli? > > > > from the geli man page: "detach - Detach the given providers, which means > > remove the devfs entry and clear the keys from memory." d

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Achim Patzner
article below. does anyone know how this affects eli/geli? There's fairly little any disk crypto system can do to thoroughly defend against this. Hm. Strange. Serious hardware is very well suited to do that (usually by adding well defended crypto hardware). Keys don't have to be stored in u

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Dimitry Andric
On 2008-02-23 02:08, Atom Smasher wrote: > article below. does anyone know how this affects eli/geli? > > from the geli man page: "detach - Detach the given providers, which means > remove the devfs entry and clear the keys from memory." does that mean > that geli properly wipes keys from RAM wh

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Achim Patzner
Am 23.02.2008 um 22:28 schrieb Igor Mozolevsky: Or you could carry something that emits a huge EMI pulse to destroy the data on the disk... It would be easier to buy a MacBook Air... Achim

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread David E. Thiel
On Sat, Feb 23, 2008 at 02:08:31PM +1300, Atom Smasher wrote: > article below. does anyone know how this affects eli/geli? There's fairly little any disk crypto system can do to thoroughly defend against this. The best workaround currently is to turn off your machine when not in use. This has alwa

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Igor Mozolevsky
On 23/02/2008, Brooks Davis <[EMAIL PROTECTED]> wrote: > > You should actually read the paper. :) They successfully defeat both > of these type of protections by using canned air to chill the ram and > transplanting it into another machine. Easy to get around this attack - store the key on a us

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Brooks Davis
On Sat, Feb 23, 2008 at 11:24:22AM -0800, Tim Clewlow wrote: > > --- Pieter de Boer <[EMAIL PROTECTED]> wrote: > > > Jeremy Chadwick wrote: > > > > > It's interesting that you classified this as a "feature" (in quotes), > > > because there's nothing "modern" about said "feature". This issue has

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Tim Clewlow
--- Pieter de Boer <[EMAIL PROTECTED]> wrote: > Jeremy Chadwick wrote: > > > It's interesting that you classified this as a "feature" (in quotes), > > because there's nothing "modern" about said "feature". This issue has > > existed since the beginning of RAM chip engineering; I can even confir

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Diomidis Spinellis
Pieter de Boer wrote: Atom Smasher wrote: article below. does anyone know how this affects eli/geli? from the geli man page: "detach - Detach the given providers, which means remove the devfs entry and clear the keys from memory." does that mean that geli properly wipes keys from RAM when a l

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Pieter de Boer
Jeremy Chadwick wrote: It's interesting that you classified this as a "feature" (in quotes), because there's nothing "modern" about said "feature". This issue has existed since the beginning of RAM chip engineering; I can even confirm this "feature" exists on old video game consoles such as the

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Jeremy Chadwick
On Sat, Feb 23, 2008 at 07:40:53PM +0100, Pieter de Boer wrote: > Atom Smasher wrote: >> article below. does anyone know how this affects eli/geli? >> from the geli man page: "detach - Detach the given providers, which means >> remove the devfs entry and clear the keys from memory." does that mean

Re: Security Flaw in Popular Disk Encryption Technologies

2008-02-23 Thread Pieter de Boer
Atom Smasher wrote: article below. does anyone know how this affects eli/geli? from the geli man page: "detach - Detach the given providers, which means remove the devfs entry and clear the keys from memory." does that mean that geli properly wipes keys from RAM when a laptop is turned off?