Re: Secure unattended decryption

2010-03-20 Thread David Shaw
On Mar 20, 2010, at 10:00 AM, Robert J. Hansen wrote: > On 3/20/2010 8:41 AM, egg...@gmail.com wrote: >> Maybe I'm doing it wrong, but all I see are patents and research >> projects ongoing at IBM. > > You're doing it wrong. Keep searching. I know there's at least one > paper readily findable i

Re: Secure unattended decryption

2010-03-20 Thread Robert J. Hansen
On 3/20/2010 8:41 AM, egg...@gmail.com wrote: > Maybe I'm doing it wrong, but all I see are patents and research > projects ongoing at IBM. You're doing it wrong. Keep searching. I know there's at least one paper readily findable in Google Scholar that tells you exactly how BitLocker does it. M

Re: Secure unattended decryption

2010-03-20 Thread eggled
On Fri, Mar 19, 2010 at 06:48:52PM -0400, Robert J. Hansen wrote: > On 3/19/2010 5:36 PM, FederalHill wrote: > > Are there refernces where such procedures are detailed that I might look at? > > http://scholar.google.com > > Check for "encrypted database rekeying". > > Maybe I'm doing it wrong,

Re: Secure unattended decryption

2010-03-19 Thread Robert J. Hansen
On 3/19/2010 5:36 PM, FederalHill wrote: > Are there refernces where such procedures are detailed that I might look at? http://scholar.google.com Check for "encrypted database rekeying". smime.p7s Description: S/MIME Cryptographic Signature ___ Gnup

Re: Secure unattended decryption

2010-03-19 Thread FederalHill
Are there refernces where such procedures are detailed that I might look at?   --- On Fri, 3/19/10, Robert J. Hansen wrote: From: Robert J. Hansen Subject: Re: Secure unattended decryption To: gnupg-users@gnupg.org Date: Friday, March 19, 2010, 5:30 PM On 3/19/2010 4:26 PM, egg

Re: Secure unattended decryption

2010-03-19 Thread Robert J. Hansen
On 3/19/2010 4:26 PM, egg...@gmail.com wrote: > Yes, well, changing the AES key on a database (Which may be several > hundred gigabytes) is time consuming. Only if you design your database poorly. This is a solved problem in both database design and filesystem design. smime.p7s Description: S/

Re: Secure unattended decryption

2010-03-19 Thread Grant Olson
On 3/19/2010 1:17 PM, M.B.Jr. wrote: >> >> The encryption key for the databases is stored on-disk, encrypted with PGP >> (Gnupg specifically). > > > Sort of a conceptual remark at this point. > > See, this database password you refer to is a symmetrical one. And you > stated you keep it on-disk,

Re: Secure unattended decryption

2010-03-19 Thread eggled
On Fri, Mar 19, 2010 at 02:17:12PM -0300, M.B.Jr. wrote: > Hi Daniel, > > > On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston wrote: > > I know it's sort of a contradiction in terms, but hear me out: > > > > The case I'm looking at is a High Availability environment hosting a > > database. The d

Re: Secure unattended decryption

2010-03-19 Thread M.B.Jr.
Hi Daniel, On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston wrote: > I know it's sort of a contradiction in terms, but hear me out: > > The case I'm looking at is a High Availability environment hosting a > database. The database is comprised of many Unix files, encrypted via AES, > on shared s

Re: Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
Yea, I don't need to have it entered automatically at boot time (if that's possible, I've just thrown all semblance of true security out the window). All I was looking for is a way to have gpg cache the passphrase for an indefinite amount of time; and a human can enter the passphrase at boot. It s

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 2:43 PM, Grant Olson wrote: > On 3/18/2010 11:59 AM, Daniel Eggleston wrote: > > Not sure exactly what sort of database you're using, but gpg (to my > knowledge) doesn't do block-level/random access. You can't just mount > the database, stop using pgp, and write a block here and a bl

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 11:59 AM, Daniel Eggleston wrote: > Full-disk encryption still requires that the DBA enter a > passphrase at the time of mounting the disks and doesn't solve anything > (and is less cross-platform, there may be many different flavors of Unix > including HP-UX, AIX, and Linux); and encr

Re: Secure unattended decryption

2010-03-18 Thread Florian Philipp
Am 18.03.2010 12:50, schrieb Daniel Eggleston: [...] > > The encryption key for the databases is stored on-disk, encrypted with > PGP (Gnupg specifically). At first startup, it's no big deal to have the > DBA enter a passphrase to start the database server. Once a failover > occurs, though, time i

Re: Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
On Thu, Mar 18, 2010 at 10:37 AM, Grant Olson wrote: > On 3/18/2010 7:50 AM, Daniel Eggleston wrote: > > ..., with the ultimate goal > > that if somebody does somehow walk out with the storage containing the > > databases, there will be no way to gain access to the data. > > Physically walk out?

Re: Secure unattended decryption

2010-03-18 Thread Grant Olson
On 3/18/2010 7:50 AM, Daniel Eggleston wrote: > ..., with the ultimate goal > that if somebody does somehow walk out with the storage containing the > databases, there will be no way to gain access to the data. Physically walk out? You could use some full disk encryption instead. And a lock on th

Secure unattended decryption

2010-03-18 Thread Daniel Eggleston
I know it's sort of a contradiction in terms, but hear me out: The case I'm looking at is a High Availability environment hosting a database. The database is comprised of many Unix files, encrypted via AES, on shared storage. If the node accessing the database loses enough of its redundant hardwar