NetBSD's Crypto-Graphic Disk 219
An anonymous reader writes "Security-minded laptop users live in fear of theft, not only of their computer but also of their precious secret data. NetBSD's CGD project is a cryptographic virtual disk that can protect sensitive data while acting like a normal filesystem. Recently its author, Roland Dowdeswell, was interviewed and provided a lot of details, and made a comparison with Linux's Loop-AES, FreeBSD's GBDE, OpenBSD's svnd.
This is a must-read for any laptop owner (and paranoid androids)!"
mutually exclusive? (Score:2)
Re:mutually exclusive? (Score:2, Informative)
See FileVault [apple.com] for the automagic encrypted home directory
or see hdid [apple.com] for the command-line version of disk utility.
Re:mutually exclusive? (Score:2, Informative)
For the current method, check out device-mapper, dm-crypt and cryptsetup.
For more information, check out: http://www.saout.de/misc/dm-crypt/ [saout.de]
And for a guided howto install Debian on a USB stick with everything but
Re:mutually exclusive? (Score:4, Informative)
It also features an encrypted file system, FileVault [apple.com].
Re:mutually exclusive? (Score:2)
No, Mac OS X is a BSD. There's a difference.
Re:mutually exclusive? (Score:4, Informative)
In reality, it is probably still safe to call it a *nix, only the BSD zealots would like us to separate it into a "BSD", which is about as anal as separating the Linux distributions into different groups.
BTW, your original post compared it to *nix operating systems and complained about OSX. The Article refers to this about NetBSD, therefore making your statements a bit mixed.
The folks over at Wikipedia seem to agree with us on this one [wikipedia.org].
Re:mutually exclusive? (Score:2)
Re:mutually exclusive? (Score:2)
Actually GNU's Not Unix. It is a system which behaves in the same, compatible way, not a derivate. Linux is a kernel.
Re:mutually exclusive? (Score:2)
Bemused snikering at people who have forgotten what VMS is, and how important DEC was to the growth of computing.
Re:mutually exclusive? (Score:2)
Re:mutually exclusive? (Score:2)
Install Open, Free, or NetBSD sometime and look for the /proc filesystem. It's not there.
Yet more ill informed Linuxite bull.
[chris@hooters]$ uname
/dev/wd0a on / type ffs (noatime, nodevmtime, soft dependencies, local) /proc type procfs (local)
NetBSD
[chris@hooters]$ mount
procfs on
Re:mutually exclusive? (Score:2)
Umm, yes if you install the Linux compatibility package for Open, Free, or NetBSD you'll have a /proc filesystem. It doesn't come that way naturally, though.
Re:mutually exclusive? (Score:2)
Re:mutually exclusive? (Score:2)
Re:mutually exclusive? (Score:2)
As others have pointed out, procfs is not a Linux compatability thing, although many Linux binary emulation packages require it. I have Linux binary support turned off in my kernel config as I only used it to bootstrap the build of a native JDK with Sun's Linux one. Also, if you do have proc mounted for Linux emulation it isn't /proc anyway, it's /emul/linux/proc
Re:sysctl = BSD; /proc = Linux (Score:2)
Re:mutually exclusive? (Score:5, Interesting)
Xandros Linux has automatic disk encryption (Score:2)
Re:mutually exclusive? (Score:2)
TrueCrypt is vulnerable to watermarking attacks. Some time ago I created a watermarked file [kasperd.net] to demonstrate this weakness. If you put this file on a file system encrypted with TrueCrypt, some easily recognizable patterns will show up in the encrypted container. You simply take each pair of neighbor sectors in the encryption and XOR them with each other. When you reach the place where this file is located, the result
Re:mutually exclusive? (Score:2)
I took a look through the list of new features in TrueCrypt 4.1, and apparently it has been improved to avoid watermarking attacks. So my previous comment only applies to volumes created with TrueCrypt 4.0 and earlier. I have not looked through the documentation and source to verify how secure the new mode is.
Re:mutually exclusive? (Score:2)
Filevault (Score:4, Informative)
OS.X ships with something called Filevaut, accessable from 'System Preferences'. Filevault migrates your home directory onto an encrypted image using a 128-bit AES key which, AFAIK is pretty secure, at least the NSA sponsored OS.X security guide I read recently recommended using it. This image gets mounted onto your Home directory when you log in and cannot be accessed unless you either know the login password or somehow manage to crack the encryption on the image file. This is useful for mobile professionals and the on the fly encryption works surprisingly well unless you are working with say, Photoshop files that weigh in in the hundreds of megabytes. For day to day stuff this works quite well. Just for example, I keep my iTunes collection on a filevault image and it does not seem to kill performance even with resource hogs like MS Word and Excel running.
If you only want a small secure area rather than encrypting the entire Home directory like you do with Filevault you can also create stand alone *.dmg images with the 'Disk Utility'. These have the same 128-bit AES encryption as Filevault. Fire up
Re:Filevault (Score:2)
Wonder why... ;-)
Re:Filevault (Score:2)
Is that the same guide I read? I think it's title was: " For Our Eyes Only "
Windows EFS (Score:2)
http://www.microsoft.com/technet/prodtechnol/winx
Re:Windows EFS (Score:2)
Disk-level encryption, which protects the entire drive until the key is entered is far more secure - you can't even prove there is anythign at all on the disk, or if it's just randomized bits generated from a secure wi
Re:Windows EFS (Score:2)
Re:mutually exclusive? (Score:2, Informative)
Re:mutually exclusive? (Score:2)
How do you know?
A well written virus wouldn't even have symptoms of it's existence... You could have a root-kit right now and not even know.
Paranoid Android? (Score:3, Funny)
Re:Paranoid Android? (Score:2)
Interesting but not exactly new news (Score:5, Informative)
PGP lets you do this on various platforms.
As a matter of fact, this is how I manage personal info on my OS X Macintosh. I create an strong-encrypted virtual disk image with banking, internet login, software key, and (un)related information. When I need something I mount it and when I'm done I umount it and it's nice and safe (as long as I never tell Keychain to remember the password).
You can do this on a vanilla OS X install with Disk Utility.
ffakr
Re:Interesting but not exactly new news (Score:2)
PGP lets you encrypt a file, not a filesystem.
Re:Interesting but not exactly new news (Score:3, Informative)
A new feature of PGP 9.0.
Re:Interesting but not exactly new news (Score:2)
Re:Interesting but not exactly new news (Score:2)
Re:Interesting but not exactly new news (Score:2, Insightful)
Pr0n...
Re: (Score:2)
Re: (Score:2)
Re:Interesting but not exactly new news (Score:2, Informative)
questions to ponder (Score:5, Interesting)
If you lose the cdgconfig file, is your data irrecoverable?
When it overwrites data, is it truly unreadable?
How taxing is this system, how long does it take to execute?
What happens when you lose your PW?
Are there knowledgable people in the same continent that can provide support for this?
Re:questions to ponder (Score:2)
Re:questions to ponder (Score:2)
If you loose your config, I guess (I don't know) that you easily can make a new config file. It'd be no problems to store the config on a set of superblocks on the vo
What about privileged users? (Score:2, Interesting)
If it acts like a normal filesystem, that means that nothing special needs to be done to access it, provided you have an account with rights to use that filesystem (I'm assuming it needn't be root). So what if the person stealing your laptop gets a hold of your password? How does it become any more secure?
In retrospect, most BSD users probably don't keep their passwords on a stick
Re:What about privileged users? (Score:2)
You mean, if I tell everybody my password, then it's no more secure ? Really ? Are you sure ?
I've been doing that for years, you scare me !
Re:What about privileged users? (Score:3, Informative)
TrueCrypt for WIndows and Linux. (Score:5, Informative)
Re:TrueCrypt for WIndows and Linux. (Score:5, Informative)
One thing I really like about TrueCrypt is that it just works. I have tried several commercial options and several that come with Thumb Drives, and they tend to be either too cutsey or kludgy to use. In almost all cases, they are cumbersome and just have an "unstable" feel about them. TrueCrypt is solid, quick, and also importantly, doesn't require any installation other than copying a couple files and launching the app. (It does come with an installer, but it isn't necessary.)
Have a read of their FAQ [truecrypt.org] and and you will see that a LOT of thought and effort has gone into this application. [truecrypt.org]
Important Fact: TrueCrypt is Open Source!!! (Score:2)
I like the command line options of TrueCrypt.
Most importantly:
1) Reading the web site and documentation gives me the impression the developers know what they are doing. I like it that, in the comments above, the developers are criticized for an incorrect statement about block chaining, and the error wa
Re:TrueCrypt for WIndows and Linux. (Score:5, Informative)
TrueCrypt is open source and free (as in freedom and beer).
Re:TrueCrypt for WIndows and Linux. (Score:2)
Re:TrueCrypt for WIndows and Linux. (Score:2)
Re:TrueCrypt for WIndows and Linux. (Score:2)
My point is there are quite a few commercial products that do full-disk encryption, and Vista will include it as well. I presume they do this with code loaded from the MBR. Most can even encrypt an existing disk.
Full-disk encryption would be a killer feature, and make TrueCrypt much easier to use for the average business traveller.
Re:TrueCrypt for WIndows and Linux. (Score:2)
I can only assume that the hardware-encrypted drives would have similar functionality (we haven't been able to get one yet for testing). Otherwise, those drives would be worthless to the security-conscious enterprises they're targeting as customers.
Re:TrueCrypt for WIndows and Linux. (Score:2, Interesting)
They have a forum admin, forum moderators, etc, and the project is quite big so I doubt that the software devs/designers maintain the website and docs themselves.
Hmm, Mr Anonymous Expert Cryptologist (Score:2)
That said, I don't know anything about CBC and I expect your point is 100% correct. It's just painful to see such a statement from someone purporting to inform me about computer related information.
I use loop-aes when I want an encrypted drive. Setting it up the first time sure is a pain, though.
A Slashdot editor could check his IP address. (Score:2)
When I read that, I assumed he meant that a Slashdot editor could check his IP address.
I know that Slashdot editors sometimes read the stories they post, because, when I criticize the Bush administration [futurepower.org], sometimes I am moderated down multiple points, without the moderation appearing in the karma points summary at the end of the comment. In the middle of the night, while Slashdot editors are presumably sleeping, people in other countries moderate the comme
Re:TrueCrypt for WIndows and Linux. (Score:3, Interesting)
There are other mistakes. TrueCrypt use the sectornumber for IV, which makes it vulnerable to watermarking. I mentioned this in another comment [slashdot.org]. This problem violates the plausible deniability mentioned by Futurepower [slashdot.org].
Re:TrueCrypt for WIndows and Linux. (Score:2)
Because I had more important things to do (like finishing my PhD dissertation on disk encryption). And I didn't really care much as I couldn't use the software myself, since at the time it would only work on Windows. I did tell about it to a few users of the software. Apparently they didn't care enough about the problem to contact the developers.
I know by experience how hard it can be
Re:TrueCrypt for WIndows and Linux. (Score:2)
Re:TrueCrypt for WIndows and Linux. (Score:2)
It depends on your definition of attacks and practical. Serious research in the area operate with different kinds of access to the encrypted media. The weakest attack is the one where the adversary is just given read access to the media once. The strongest attack is one where the adversary controls the media and sees all writes, and decides what the media replies to all reads. They correspond to different scenarios namely the case of theft of a
Re:TrueCrypt for WIndows and Linux. (Score:2)
I imagine that Truecrypt is used by individuals for the most part (a larger company would probably want something with more of a guarantee or contract). Now, while a lot of people have all kinds of spyware festooning all over, these are not the people who would know what Truecrypt is, anyway. A Truecrypt user is also likely to have the media in question reasonably sealed off from network access.
Thus, the scenario is that the media is on a computer that contains no adverse
Re:TrueCrypt for WIndows and Linux. (Score:2)
If you are unable to protect your computer from spyware, then disk encryption is not going to help much anyway.
A Truecrypt user is also likely to have the media in question reasonably sealed off from network access.
Some disk encryptions actually state that you can keep the container on a different computer and access it using some networking file system. I have no
Re:TrueCrypt for WIndows and Linux. (Score:2)
Well, I certainly can't :), but I agree that it is needed before it can actually be taken seriously by serious people.
Could it for some reason leak a few informations about what was in some of the sectors at an earlier point in time.
That's a very valid concern for all those users in these comments who use Truecrypt on a flash drive, USB or otherwise. As I understand, the controllers for the flash chip try to minimise the usage per individual flash
Is that you being especially nice? (Score:2)
Ahhh, the civilized and polite interaction for which Slashdot is famous.
of course it helps... (Score:5, Interesting)
Re:of course it helps... (Score:3, Informative)
Swap is now encrypted by default in OpenBSD 3.8: http://marc.theaimsgroup.com/?l=openbsd-cvs&m=1111 85331505174&w=2 [theaimsgroup.com]
What a Load (Score:5, Insightful)
From the summary: "Security-minded laptop users live in fear of theft"
Nice blanket generalization there. I'm security minded, use two laptops, and I don't live in fear. I mitigate risks. I use caution, but I don't live out my life in a state of fear, as your cliche ridden statement says.
Karma be damned, but I'm sick of people who use phrases without thinking what they actually mean.
Re:What a Load (Score:3, Funny)
Karma can not be damned, it is only a state of being.
Re:What a Load (Score:2, Interesting)
Yes, and why do you take those steps? Because you live in fear of the consequences that would happen if you didn't take them.
Re:What a Load (Score:2)
NetBSD at SCALE 4x (Score:2, Interesting)
Why is this being compared to loop-aes on Linux? (Score:2, Informative)
Have a look at http://luks.endorphin.org/ [endorphin.org]
In my opinion, there has been some excellent work been done.
SuSE (Score:2)
dm-crypt? (Score:5, Informative)
It's interesting to see xxxBSD user/developer comparing "just written" software for BSD with ancient versions of Linux counterparts and (surprisingly) finding xxxBSD version to be better. My point being: dm-crypt [saout.de].
If you are interested in Linux 2.6 encrypted partition, use dm-crypt together with cryptsetup tool. It's much safer than AES loop and:
OK, I'm tired, go read the links and you'll be much wiser and better informed than after reading TFA ;)
Robert
Re:dm-crypt? (Score:2)
With loop-aes, my drive is the bottleneck. With dm-crypt, dm-crypt is the bottleneck.
Re:dm-crypt? (Score:2)
Robert
Re:dm-crypt? (Score:2)
and there wasnt an x86_64 asm implementation when i tested in 2004. maybe everything has been fixed by now though. it wasnt an option then.
Re:dm-crypt? (Score:2)
Robert
aes.ko Vs. aes-i586.ko: stats... (Score:2, Interesting)
I am using dm-crypt on top of a level 5, 3 disk SATA raid.
The system just used a normal aes.ko module so I decided to try the aes-i586.ko module (the server is a Athlon XP 2400+ with 512 MB RAM).
Here are my results:
Control Read test file (non-crypted)...
1) 0.01user 1.43system 0:17.99elapsed 8%CPU
2) 0.03user 1.43system 0:18.07elapsed 8%CPU
3) 0.03user 1.43system 0:17.94elapsed 8%CPU
AES
===
Write test file....
1) 0.05user 4.99system 0:53.26elapsed 9%CPU
2) 0.
Re:aes.ko Vs. aes-i586.ko: stats... (Score:2)
Yeah, it is only for 586 or better CPU. I believe that even today some people use x86 processor compatible only with 386 or 486. Geode? Other embedded x86? I'm not sure.
Robert
Re:aes.ko Vs. aes-i586.ko: stats... (Score:2)
Well, I don't think so, VIA processors are rather compatible with i586. Slow as hell, but compatible. Quoting after cute page about some aspects of VIA processors [logix.cz], x86 processors are identified by family/model/stepping (F/M/S) triplet. My VIA Nehemiah processor identifies itself as 6/9/8, and family=6 means "i686 compatible" (i.e. compatible with original Pentium Pro instruction set).
Besides, i
Re:dm-crypt? (Score:2)
There is a dm-crypt tutorial on Linux Journal: Encrypt Your Root Filesystem [linuxjournal.com].
It was also published in Spanish by the magazine Mundo Linux [revistaspr...onales.com].
Huh? Which "just written" BSD software? (Score:2)
GBDE (Score:3, Interesting)
More than once has the use of deterministic encryptions lead to weaknesses in disk encryptions. And often the workarounds require additional CPU power. And even the most careful deterministic encryption can never be as secure as a probabilistic encryption.
GBDE does have probabilistic encryption. This also means that obviously an update requires more than one physical write. Though this could be done securely, the way it is done in GBDE seems to give a risk of data loss/corruption. Some kind of journaling could have solved the problem. Having journaling both in the encryption and in the file system seems to be overkill (and clearly hurts performance), but integrating the two without compromising security is nontrivial. I'd like to see some more research in this area.
From my description it may sound like from a cryptographic viewpoint GBDE is the best designed disk encryption in existence. Unfortunately it isn't so. It did get some things right, but it seems to be mostly by luck. GBDE uses different pseudo random keys for each sector, however rather than using a standard PRNG, PHK decided to invent his own known as the Cherry Picker. Unfortunately there is a weakness in this generator as the output is not uniformly random.
To the best of my knowledge GBDE is currently the only disk encryption making use of probabilistic encryption, and none of the disk encryptions in existence make a serious effort at guaranteeing integrity (also known as security against an active adversary).
Re:GBDE (Score:2)
That is just one possible solution. There are simpler ways to solve the problem, for example you could just mirror the shared sector. You'd need to add a bit of redundancy to find which one is correct. So you might end up with only 31 logical sectors rather than 32 for each 33 physical sectors. But at least you preserve locality.
If you do not do this, then at the end of the day your pseudo-disk isn't
Crypto-Graphic? (Score:2)
Crosscrypt for Windows Users. GPL too (Score:3, Informative)
Cross Crypt - Open Source AES and TwoFish Linux compatible on the fly encryption for Windows XP and Windows 2000. [scherrer.cc]
It uses the excellent Filedisk [acc.umu.se] to appear as a volume in Explorer.
It's GPL, sorry to restate that, but I dunno if you read the headline fully or not.
Apple's FileVault (Score:2)
Perhaps this might be yet another *BSD project that Apple could benefit from ala Konqueror. Or not.
Won't Full Disc Encryption make this obsolete? (Score:2, Interesting)
Re:Won't Full Disc Encryption make this obsolete? (Score:2)
Nice to hear Seagate is offering a specialty product, but you can have much more versatile encryption for free, and it's easier to administer. How would the Seagate drive get its password? Would you type it in while booting? Or have to use a Windows-specific driver? Or would it memorise it, completely defeating the point of en
Is this kind of thing portable? (Score:2)
Re:*BSD? (Score:2, Funny)
Re:*BSD? (Score:2)
Re:*BSD? (Score:5, Interesting)
GUI quality: The troll gives no indication of what or how he's measuring. it's difficult to deny that MS's GUIs are more polished, but there are numerous inconstancies. GUIs available on unix systems, including FreeBSD, tend to be more configurable. i'm inclined to agree that traditional X11-based GUIs are behind that of Windows, but that's a far cry from FreeBSD not having one, as the troll claims. also, OS X is widely agreed to be easier to use than Windows' and is unquestionably more technically advanced (we'll see what Vista brings).
Support: The troll's claims that Microsoft is "the world's most trusted software company" is simply laughable. major failures in security and stability in Microsoft products are legendary; their reputation for quality is thoroughly mediocre. they are, however, quite large and do stand behind their products (such as they are) for defined periods of time, which has a certain level of comfort associated with it. FreeBSD, on the other hand, has much higher initial quality and also has commercial support [freebsd.org] available from various sources. the open source nature of FreeBSD and the vibrant community existing around it also means particularly obscure problems are more addressable than they are in Windows, where you're left waiting for Microsoft to release a patch. again, there are trade offs to be made, but i think FreeBSD is a clear winner here.
Cost and convenience: It is undeniable that having the system pre-installed is a huge win for convenience. but the troll goes way off-track from there. first, XP is available pre-installed, but for how many architectures, maybe two (x86 and itanium)? FreeBSD is available on about a half dozen (NetBSD, incidentally, is available on dozens); this is particularly important in the sever and appliance realms, which are FreeBSD's primary target spaces. FreeBSD is available pre-installed at least on server equipment (i don't know of anyone who does workstations/laptops). the troll claims that XP is free, which is flatly false: the cost is bundled in the cost of the hardware. the troll is also implicitly defining terms like "every major manufacturer" to be only ones he cares about: get me an XP system from Sun or Apple, for example.
Stability/scalability:Again, the troll gives no measurements. at a minimum, XP has a reputation for being unreliable. in my experience at work, XP is a step down in stability and reliability from 2000, although both of these are still leaps ahead of any Microsoft system predating that (except probably DOS, which was highly stable by virtue of being so tremendously simple). DoS-style attacks which bring down the system remain common against XP and virtually unheard of against FreeBSD. FreeBSD is highly stable. the standard edition of XP also scales to 2 processors; special versions are available to get it up to higher number, but still pretty modest number of processors (i think it was 16, but i don't remember). i'm not sure specifically what SMP problems the troll is talking about (again, no specifics), but i've personally run FreeBSD on dual-processor SMB systems without issue and other BSDs on systems much, much larger than any Microsoft product has any hope of touching. for reference, note that BSD-based systems hold many places in the Top 500 supercomputer list [top500.org], including several in the top 20; Windows can't hope to touch that level of performance.
Software availability: No, troll, not everyone uses it. but yes, it does have more software. for that reason, when i was Director of IT for our company, we continued to by Windows boxes; our accounting package wasn't available on any other platform. but this very much depends what you need. FreeBSD certainly runs a far cry more than vi. most things that'll run on other open-source systems like Linux,
Re:Same as Linux's loop-aes? (Score:2)
Yes, it's similar.
It's nothing really special, until it's implemented so laptop users can easily set up an encrypted root filesystem and be able to boot into it easily.
It's aldready possible.
http://www.tldp.org/HOWTO/Encrypted-Root-Filesyst
Re:Same as Linux's loop-aes? (Score:2)
(...yeah, there was that nasty bug in yaird a couple of weeks ago but it's been marked 'done' :-)
Re:Cool, but for who? (Score:2)
Sorry, it is of use. Even if it isn't on the OS YOU choose to run.
Re:Cool, but for who? (Score:2)
Re:Doesn't address unencrypted OS (Score:3, Interesting)
Wow, I thought you were wrong about it being on by default, so I checked the CVS entries. I knew OpenBSD's swap encryption had very little impact on swapping performance, but it seems that this was switched on by default 9 months ago and I didn't even notice. I guess that shows how little impact it has.