
Basics of Cryptographic Filesystems 24
mix_master_mike writes "Found a good article over at security focus: cryptographic filesystems: design and implementation. Nice piece on this level of security that isn't being used very effectively in the industry."
Hmm... (Score:1)
encrypted swap space (Score:5, Interesting)
Are there any crypto schemes designed specifically for use on swap files and volumes? They'd need to be blazingly fast so as not to slow the machine down, but would also have to be strong enough to protect anything that gets dumped to the drive. Maybe a big (2 meg plus) hash table generated randomly on boot, with a few extra operations to keep block comparisons from working?
Re:encrypted swap space (Score:2, Insightful)
Just add the RAM and be done with it.
Re:encrypted swap space (Score:2, Insightful)
Not that simple in practice. I'm not sure why but some OSes (Windows and MaxOS at least not sure about *nix) don't perform well without swap space even if you are not using all your physical memory.
Re:encrypted swap space (Score:1)
Re:encrypted swap space (Score:2)
Re:encrypted swap space (Score:1)
Re:encrypted swap space (Score:5, Informative)
And that's why the swap space of OpenBSD [openbsd.org] is encrypted. Fortunately some programmers already thought of this =)
encrypted swap space - question (Score:2, Interesting)
So then the OS is the only thing that can get to the swap space, where is the security issue? If you're running a hostile OS then you're pretty much fucked anyways.
But I'm no swapspert, so please explain if I'm being stooopid.
Re:encrypted swap space - question (Score:4, Insightful)
How is the OS gonna cope with that, then I dissect your computer and connect your harddrive (including your swapspace) into my computer and find all the little pieces and nuggets of information that I need to fry your ass
Re:encrypted swap space - question (Score:1)
Deleted files can be recovered with an Electron microscope even if the blocks have been overwritten multiple times.
The question you have to ask is weather your data is valuable enough for a compditor/govenment to do this. For most people the answer is no.
Either that or look at the previous reply... OS's crash!
Re:encrypted swap space - question (Score:4, Interesting)
The point of encrypting a drive is so that if the drive mechanism itself is stolen your safe. There is some saftey in having data encrypted on a life filesystem, but the saftey of the files is limited unless you encrypt each file/directory/partition with a different key. If they all use the same key, I'll just compromise the OS and read it if the filesystem is mounted. Otherwise, I just compromise the OS and wait around for you to access the encrypted filesystem, and steal it after you put the key in.
Encrypting the filesystem is also handy for drive disposal. If you always write to the encrypted drive, then you can just give the drive to anyone you want and they can't get any data off it. Which means that hospitals or other places with sensitive could feel a lot safer that medical data isn't being given away every time they auction old computers off, or everytime a laptop gets lost.
Swap has a lot of stuff on it. Lets say I know that your using ssh-agent, this stores the decrypted private keys in memory so it's never written on the disk (the private key is normally stored encrypted via a password on disk). So if I pull the plug on the computer, it was in RAM so it's gone now I have to know your password. However, if I can load up enough stuff into memory to force that to be written to swap, now if I pull the plug, I just steal the swap disk (or boot into single user mode and copy the swap partition). Granted this is predicated on me having physical access to the machine, but if swap isn't secured, I've got a legitimate attack on your machine to get me enough information that I can be you, and all I had was a regular user account (or access to an open console), and physical access.
Kirby
Re:encrypted swap space (Score:2)
physically secure - no need for crypto-fs (or..?) (Score:3, Insightful)
Crypted filesystems have their uses but they arent as many as one would imagine. Laptops for instance should have it by default. That should be remedied. But as long as there arent crypto offloading chipsets by default it wont be widely used because of fear to loose speed. Also its not easy enough to use yet..
Catch-22 (Score:3, Insightful)
Re:Catch-22 (Score:4, Informative)
Re:Catch-22 (Score:1)
Speed Issues (Score:2, Insightful)
While the idea of securing a whole filesystem by using cryptography is a great idea, I have reservations on how it will effect performance. Most secure algorithms tend to be rather slow in operation. Examples include DES, AES, RSA, etc. While this is not to bad when its just decrypting small files, it seems like this could quickly hurt performance with lots of commonly used small files and larger files.
I do understand that many computers sit around idle many times when having to access disk, but it stil
Re:Speed Issues (Score:4, Insightful)
Re:Speed Issues (Score:2)
I think a better way to handle it is to have a cryptographic support build
Re:Speed Issues (Score:2)
Sure thing, Skipper! In fact, the wonderful, thoughtful people at everybody's favorite company Microsoft have been pushing for on-CPU crypto acceleration very recently [slashdot.org]! Chip manufacturers from Intel [slashdot.org] to AMD [slashdot.org] to Transmeta [slashdot.org] have all pledged support for this user-friendly [slashdot.org] scheme that will work hard to improve security [slashdot.org] on your system.
Don't you feel relieved knowing that we're all getting what we've been asking for?
Re:Speed Issues (Score:2)
Re:Speed Issues (Score:2)
Crypto acceleration is a part of making Palladium work from encrypting the data they wish to protect to signing and decrypting the programs needed to run them. RTFA.