TrueCrypt 5.0 Released, Now Encrypts Entire Drive 330
A funny little man writes "The popular open source privacy tool, TrueCrypt, has just received a major update. The most exciting new feature provides the ability to encrypt an entire drive, prompting the user for a password during boot up; this makes TrueCrypt the perfect tool for non-technical laptop users (the kind who are likely to lose all of that sensitive customer data). The Linux version receives a GUI and independence from the kernel internals, and a Mac version is at last available too."
Independence from Kernel Internals? (Score:2, Insightful)
Re: (Score:2)
Re:Independence from Kernel Internals? (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
True. I am not criticizing the technology. I think it is sound. I am criticizing the marketing statement.
Re: (Score:3, Informative)
Your concept of impossible is, of course, a little bit flawed, for I have at least 5 *entire* disks encrypted in this single box I am writing on. And some of them has no partitions, just a filesystem over raw disk.
Re:Independence from Kernel Internals? (Score:5, Informative)
Of course you can. You just can't have an encrypted MBR... unless you boot from a floppy or a USB drive you keep on your person, or something like that. Note that bios limitations can also be circumvented with linuxbios
Re: (Score:3, Funny)
Of course, then your BIOS isn't encrypted, so you encrypt it and need another one below that to decrypt it, but then that bottom one isn't encrypted.
It's encrypted boot code all the way down!
Re: (Score:2)
Re:Independence from Kernel Internals? (Score:5, Informative)
Re: (Score:3, Insightful)
Re:Independence from Kernel Internals? (Score:5, Interesting)
Hi, I read the site yesterday (from Firehose), and I think I can say one thing or two.
TrueCrypt does a good job of encryption, it's not a trivial level. It uses strong algorithms, and you can choose from 5 or 6 different algorithms. It doesn't store your password anywhere in the disk, when you type the password, it tries to decrypt the header, and if it makes sense (I guess if checksums match) then it knows it's the right password and it goes on, otherwise not. It uses basically the XEX (almost sure that's the name... I don't really know what it is, this is what I remember from the site) schema, but XEX uses only one key for two purposes, and TrueCrypt uses two different keys for these two purposes.
The whole-disk encryption (the correct term is partition encryption) seems to work well, at least from the documentation, I didn't try it (yet). It includes a boot sector that does the part of asking the password during boot and decrypting the partition. The boot sector is obviously encrypted, and I suppose it also stores some unencrypted data to implement the boot code (I don't believe it can be done in 512 bytes only), but after you boot the OS, everything it sees is encrypted, so it will protect even temporary files or logs created by the OS on that drive. Even if it doesn't encrypt 100% of the data (boot sector, boot code), it encrypts everything that you should encrypt. What it doesn't encrypt is not secret in any way.
I tried previous versions and I liked it, it is really a great product, and if 5.0 does everything they say it does, I guess it's really worth it. Whole-disk encryption is no longer missing from this excellent software, many businesses need it for laptops (just see how many information theft happened last year due to lost laptops). I believe TrueCrypt is going mainstream now.
Re:Independence from Kernel Internals? (Score:5, Informative)
Oh, I forgot to mention. According to their website, TrueCrypt can encrypt the boot partition even after the OS is installed, even with Windows.
Basically, you install it, then you ask it to encrypt the whole disk. It will install the boot code to ask the password and decrypt the partition before loading the OS, and then it will start encrypting your partition in the background, you may continue using the OS. You may even reboot the machine, it will boot correctly and continue encrypting from where it stopped. If it really works as they say it does, this version is indeed amazing.
Re: (Score:3, Informative)
If it runs while loading the OS (kernel), and then runs when that OS mounts a filesystem, it must be running in two different places since in one case the I/O is done through BIOS calls and in the other case through device driver calls in a kernel. That doesn't sound like independence from the kernel to me. It sounds like it has to be compiled into the kernel (otherwise the / filesystem isn't encrypted), or at least inside initramfs (which is still compiled into the kernel).
I'm really not concerned about
Re:Independence from Kernel Internals? (Score:5, Informative)
I am not a TrueCrypt expert, but I follow the discoveries of the crypto community. It seems TrueCrypt is highly respected. While it cannot defeat a (hardare in this case) keylogger, the crypto used seems to be strong crypto implemented according to current standards. Not a snake-oil product with home-rolled ciphers or "passwordless" security or such nonsense. At the moment, nobody admits being able to breaking it and I am not aware of instances that indicate it has been broken. And, other than many other products, it is widely used. Personally I would say it is on a level with PGP/GnuPG/dm-crypt/LUKS with regard to security level offered.
Re: (Score:3, Informative)
The final excuse. (Score:5, Interesting)
Re:The final excuse. (Score:5, Insightful)
Re: (Score:3, Funny)
Re:The final excuse. (Score:5, Informative)
Re: (Score:3, Insightful)
A reasonable compromise would be to encrypt only the "interesting" data — such as the /home partition and, maybe, the /var/log (or simply make sure the particular log-files you wish to protect — such as maillog — reside on the encrypted /home).
Whoever tries to crack your laptop is unlikely to be interested in the standard-issue binaries you may have installed...
Re: (Score:2)
For us, since we can't guarantee our users store their confidential data in any particular location, we had to do full disk encryption and take the penalty.
Re:The final excuse. (Score:4, Insightful)
Re:The final excuse. (Score:5, Interesting)
DriveLock: Full Discosure Required (Score:5, Interesting)
As referenced in another reply, http://technocrat.net/d/2007/3/9/15796 [technocrat.net]this user was obviously not aware that DriveLock can be very easily bypassed if the persons taking your hardware have access to a clean-room facility.
Lastly, your definition of sensitive data might be different than mine. Without full disclosure, how can I be expected to make an informed decision about the strength of protection required?
Re: (Score:3, Interesting)
Re: (Score:3, Informative)
Also, yes you CAN recover truecrypt volumes if you lose the password. If you backup the volume header and store that with a password, you may later get back at your data by restoring the volume header.
That FAQ is either out of context or out dated. I've recovered TC volumes using volume headers.
Re: (Score:2)
Re: (Score:2)
Comment removed (Score:4, Funny)
How to DDoS your favorite open source project. (Score:4, Funny)
Step 2: ???
Step 3: Profit!
Re: (Score:2)
One thing annoys me: (Score:5, Interesting)
Thats nice.
But how about converting non-boot drives?
Doesnt seem to be possible.
Not everybody starts with a blank sheet, or has double the needed capacity to empty first one HD and then another...
Re: (Score:2)
Converting non-boot drives seems like a fringe use, honestly. Most people can just make a new truecrypt volume and then mount like normal. For everyone else, move the files temporarily onto DVD-R/CD-R media, create a truecrypt volume, then move the files into the new truecrypt volume. Problem solved.
-Grym
Re: (Score:2)
I'd be much more likely to convert a non-boot drive to full encryption anyways. I find typing a password in enough of a pain so a nice, long, secure passphrase would drive me nuts on bootup. I'd much rather just store any sensitive data on a second disk - not only does that mean I'm not completely hosed if I forget the
Re: (Score:2)
However, if the encryption is only about personal documents, mails, and simple things like that, and you don't need "deep" encryption of various stuff that may risk ending up on the system drive without your knowledge, I would also rather encrypt a non-system drive. That way, you would as you say not always have to enter
Re:One thing annoys me: (Score:4, Insightful)
If you want something encrypted, you put it on a truecrypt drive; you can move it from the original drive to the truecrypt drive, then juggle the drive letters if you use windows, the mount points otherwise. The only thing that can't get this treatment is the boot drive, therefore (uniquely) you have an absolute need for a way to encrypt that while it is running.
Re: (Score:2, Insightful)
Re: (Score:2)
Our current Windows-only solution does that, so the Macs get left untouched... which works out OK for me, but is technically a problem =-)
Re: (Score:2)
I have 2 HDs, and a Raid.
HD1 has XP
HD2 has Vista
RAID has... well, raid
It cannot encrypt the vista partition, because the bootloader is on the first HD.
Re: (Score:2, Informative)
I also duel boot windows / linux, and ran into the following errors tryin to set it up with TC
You can't encrypt the whole drive if you have more than 1 OS on 1 drive (not partition)
You can encrypt only your windows partition, but ONLY if you are using the windows boot manager in your MBR, and move grub to your linux partition.
If you have 2 drives, 1 for windows and 1 for linux, you should be home free.
Guess i'll stick to encrypted volumes
Download here (as the site seems down atm) (Score:3, Informative)
Press release here [sourceforge.net].
We are pleased to announce that TrueCrypt 5.0 has been released. Among the new features are the ability to encrypt a system partition or entire system drive (i.e. a drive where Windows is installed) with pre-boot authentication, pipelined operations increasing read/write speed by up to 100%, Mac OS X version, graphical interface for the Linux version, XTS mode, SHA-512, and more.
After four years of development, during which millions of people downloaded a copy of TrueCrypt, it is the only open-source disk encryption software that runs on Windows, Mac OS X, and Linux. The newly implemented ability to encrypt system partitions and system drives provides the highest level of security and privacy, as all files, including any temporary files that Windows and applications create on system drives (typically, without the user's knowledge or consent), swap files, etc., are permanently encrypted. Large amounts of potentially sensitive data that Windows records, such as the names and locations of files opened by the user, applications that the user runs, etc., are always permanently encrypted as well. For more information, please see http://www.truecrypt.org/docs/?s=version-history [truecrypt.org]
Re: (Score:2, Interesting)
Re: (Score:2)
What about wake up? (Score:4, Interesting)
Re: (Score:2)
The way SafeBoot works you only have to get past it once, when your machine starts, then you log onto the domain.
Re:What about wake up? (Score:5, Informative)
This forces you to re-enter your password to access the volume.
Of course, you should have an option in your OS to ask you for your login password whenever you close and then open your lid as well.
Re: (Score:3, Informative)
Normally this wouldn't offer complete protection - you could just reboot from a system disk and access the filesystem, but with truecrypt (or FileVault, or any of the other encrypted file system solutions) they can't do this.
Re: (Score:2)
So if your computer is in sleep mode or has a screen saver - you need to password protect your computer so that you control who accesses your data and apps.
If I wanted your data, and I didn't know your password - I would get your entire drive (either by stealing it, booting up with a liveCD, or image it to another drive). Now I can't even do that because the data is encrypted on the disk, not jus
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Finally a Linux GUI :) (Score:3, Interesting)
Ah well, maybe the storm will be over till I'm home.
Re: (Score:2)
Holy shit, you can do that?! And I've been weighing, grinding, and pouring my own coffee by hand. This is one time I really wouldn't mind being replaced by a very small shell script.
Re: (Score:2)
My favorite part must be from the "device driver" section:
Just read kernel hacker's guide, implement a device driver (it could even be user space I think). Please compile it as a module, so that we won't need a kernel compile in every update. Then write: /dev/coffee /dev/coffee, depending on whether you want only root making coffee or not.
echo cappuccino >
And you will have a hot cup of coffee in minutes! Remember to give the right permission to
Have fun setting that one up. :)
Re: (Score:2)
Hard Drive Read/Write Times (Score:2, Interesting)
I am all for more security. But, if it slows my laptop down to the point of un-usability....
Re: (Score:3, Informative)
Random accesses arent slowed down noticable, but large STR (like copying 50Gbyte to another HD) are. For me, the limit was about 30Mbyte/s.
But as this is driver-level CPU load, and not interupt driven, the system responsitivity was not negatively affected.
Memory usage is neglectable, and CPU load scales linearly with bytes/s. So in most scenarios, or multicores, its not the limiting factor.
But you would NOT want to capture video or stuff
Downloading (Score:3, Funny)
Re: (Score:2)
Layne
OT -- what's the state of flash encryption? (Score:2)
Are there any standalone encryption systems that don't require software install on the host environment but can "mount" an encrypted disk file on a USB drive?
Re: (Score:2)
Re:OT -- what's the state of flash encryption? (Score:4, Informative)
It does install a system driver when in use, but the driver can reside purely on the unencrypted portion of the flash drive.
James
Encryption is for terrorists. (Score:2, Funny)
Linux 64bit? (Score:3, Informative)
FIPS 140-2? (Score:3, Interesting)
Re: (Score:3, Informative)
The algorithms used are fine, but this stamp of approval would be very useful for federal Linux and Mac users!
http://www.extrapepperoni.com/2007/09/10/fips-140-2-for-mac-os-x/
Filevault already provides FIPS 140-2 compliant encryption.
Not anytime soon. (Score:3, Informative)
In any case it costs a lot of money and they only test binaries which makes anything that links into a kernel difficult unless it's only a library core common among implementations which is linked at install time or something.
It's a real pain.
Most p
!slashdotted (Score:2)
I will always encrypt (Score:5, Interesting)
And one big big big reason I use encryption: Usenet. I often use NewsBin to indiscriminately download all the binaries in a given group. I think this is very dangerous. And many times you get some very illegal junk you just don't want lying around -- but I can't get to it for several days to manually filter through it. ISPs get the benefit of being an ISP and not having to filter their caches for content; I do not get that same benefit. If I get caught with something I shouldn't have, it's jail time.
So if it comes up that I had inadvertently downloaded some kiddie pr0n through Usenet newsgroup (which is often mixed in with legitimate stuff), and my machine gets searched, I want some protection. And both: the things I downloaded and the things I have deleted simply CAN NOT be found.
Re:Not sure it matters (Score:4, Funny)
ZFS Encryption (Score:2)
Re: (Score:2)
- File servers tend not to be mobile, so the chances of the disk(s) falling into the wrong hands because of the physical theft of the device is fairly low.
- File servers are up all the time, so the primary means of attack is to compromise a service or application on the already-running server, and gain access to the data with that application or service's privilege level. Encryption does not protect against this.
- When file servers do g
Re: (Score:3, Informative)
a Mac version (Score:2)
Recovery CD (Score:5, Interesting)
I know it doesn't happen often, but there is not anyone here that hasn't at least once screwed up something on his system and needed to boot a livecd to fix a configuration file. With total disk encryption, what do you do? You're boned, as far as I can see and I don't think that I really like the idea.
As I'm writing this, the thought pops into my head that "you can probably just enter your passphrase from the live environment while trying to mount the filesystem". Is this how things actually work? It's a genuine question and I'd appreciate not being modded down for asking it. Of course someone probably will.
Re:Recovery CD (Score:4, Informative)
They've really thought this through. I've gotta hand it to the people at Truecrypt.org. I'm impressed, especially considering this is the first release of their whole disk encryption product.
Junction points? (Score:3, Interesting)
Still no option to mount a TrueCrypt volume on an NTFS junction point, alas.
PGPdisk has had this for ages. Means you don't have to expose to all and sundry who can see your machine that another drive has just appeared.
Would very much like to see this in the next version.
code audit by professionals (Score:3, Interesting)
if the code has never been audited doesn't it seem a bit irresponsible to recommend truecrypt?
Re:Slashdotted? (Score:2, Informative)
Re: (Score:2)
Mod me +5 Captain Obvious. kthx.
Re:Slashdotted - Download Mirror on Filehippo (Score:5, Informative)
Re:Slashdotted (Score:5, Insightful)
I've been looking forward to the Linux GUI since I read about it, checking back, checking back etc.
Then today, suddenly the entire site is virtually inaccessible.
On the actual release, I think it is going to be good. After all, we see a new MacOS version, a Linux GUI and a few other nice little tools which most people might not even notice.
On the actual software, I love TrueCrypt, I use it both in Windows (where it, simply, is so easy to use), and in Linux (command-line, mehs all around, plus you have to go and delete history if you don't want to save the fact that your using it (or perhaps the fact that a specific file/partition is a container)).
The hidden-partition feature is the bees knees, especially for those extra secret documents, just hide them behind some porn, financial data or something else which you access and make changes to regularly (to hide if you are making changes to the hidden volume).
The ability to back-up headers makes this software great for businesses or governments (can restore a password if a user loses it), and this new encrypt the entire system thing, simply swell (though it doesn't work on Linux/MacOS I don't think).
Anyway, as always, check out the Wikipedia article for more info. http://en.wikipedia.org/wiki/TrueCrypt [wikipedia.org]
Re: (Score:2)
I could be mistaken here but I could have sworn that the install docs/HOWTO unequivocally said to never ever ever write data to the dummy volume once you've started using the real hidden volume. Something about overwriting blocks of the hidden vo
Re: (Score:3, Informative)
Re: (Score:2)
Re:Slashdotted (Score:4, Informative)
Re: (Score:2, Informative)
Re:Slashdotted (Score:5, Informative)
Re: (Score:2)
Re: (Score:2, Informative)
Re:if truecrypt.org is still down (Score:5, Informative)
February 5, 2008
New features:
*
Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts). For more information, see the chapter System Encryption in the documentation. (Windows Vista/XP/2003)
*
Pipelined operations increasing read/write speed by up to 100% (Windows)
*
Mac OS X version
*
Graphical user interface for the Linux version of TrueCrypt
*
XTS mode of operation, which was designed by Phillip Rogaway in 2003 and which was recently approved as the IEEE 1619 standard for cryptographic protection of data on block-oriented storage devices. XTS is faster and more secure than LRW mode (for more information on XTS mode, see the section Modes of Operation in the documentation).
Note: New volumes created by this version of TrueCrypt can be encrypted only in XTS mode. However, volumes created by previous versions of TrueCrypt can still be mounted using this version of TrueCrypt.
*
SHA-512 hash algorithm (replacing SHA-1, which is no longer available when creating new volumes).
Note: To re-encrypt the header of an existing volume with a header key derived using HMAC-SHA-512 (PRF), select 'Volumes' > 'Set Header Key Derivation Algorithm'.
Improvements, bug fixes, and security enhancements:
*
The Linux version of TrueCrypt has been redesigned so that it will no longer be affected by changes to the Linux kernel (kernel upgrades/updates).
* Many other minor improvements, bug fixes, and security enhancements. (Windows and Linux)
If you are using an older version of TrueCrypt, it is strongly recommended that you upgrade to this version.
4.3a.......
==============
System Encryption
TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots (a TrueCrypt-encrypted system drive may also contain non-system partitions, which are encrypted as well).
System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), swap files, etc., are permanently encrypted. Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and registry entries are always permanently encrypted as well.
System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots (starts). Pre-boot authentication is handled by the TrueCrypt Boot Loader, which resides in the first cylinder of the boot drive.
Note that TrueCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual with
Re:if truecrypt.org is still down (Score:4, Informative)
You Fail It.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2, Informative)
Re: (Score:3, Interesting)
Here's what it takes for it to be a real part of Ubuntu:
On a default install, EVERYONE should get a truecrypt container file that's of a fair size (maybe relative to the HDD size with a max limit, and min limit - unless the drive is really too small then it's not installed), with a random password.
Now truecrypt becomes far far more useful to everyone, because everyone now has plausible deniability.
All that marketing bullshit about hidden partition vs dummy partition i