[mdlug] Dick encryption

David Lane dcl400m at yahoo.com
Fri Feb 22 14:00:15 EST 2008


It is good programming practice to zero memory resources before you release them.

David 

----- Original Message ----
From: Raymond McLaughlin <driveray at ameritech.net>
To: MDLUG's Main discussion list <mdlug at mdlug.org>
Sent: Friday, February 22, 2008 1:49:28 PM
Subject: Re: [mdlug] Dick encryption


Jeff 
Hanson 
wrote:
> 
On 
Fri, 
Feb 
22, 
2008 
at 
10:53 
AM, 
Garry 
Stahl 
<tesral at comcast.net> 
wrote:
>> 
http://www.networkworld.com/news/2008/022108-disk-encryption-cracked.html?page=1
>>
>>  
Network 
World 
article 
pointing 
out 
that 
who 
controls 
the 
physical
>>  
computer, 
controls 
the 
data 
in 
it.  
There 
is 
a 
method 
to 
crack 
disk
>>  
encryption.  
It 
ain't 
easy, 
and 
you 
would 
have 
to 
have 
it 
ready, 
but 
it
>>  
is 
possible.
> 
> 
The 
security 
implications 
of 
loading 
the 
decryption 
keys 
into 
DRAM 
is
> 
something 
I 
though 
of 
myself 
a 
while 
ago.  
I 
hadn't 
realized 
that 
the
> 
data 
retention 
was 
that 
long 
without 
power 
or 
that 
cooling 
them 
could
> 
increase 
the 
data 
lifetime.

I 
was 
likewise 
surprised 
by 
this. 
It 
seems 
like 
motherboard
manufacturers 
adding 
a 
"zero 
all 
memory" 
routine 
to 
power 
up, 
reset,
and 
power 
down 
routines 
could 
go 
quite 
a 
ways 
toward 
mitigating 
this
concern.

For 
that 
matter, 
couldn't 
a 
"key 
flush" 
routine 
be 
added 
to 
umount
routines 
to 
zero 
the 
memory 
location 
that 
held 
the 
key. 
DRAM 
is 
not
magnetic 
media 
that 
retains 
"shadows" 
of 
its 
previous 
states.

> 
My 
theory 
was 
that 
it 
would 
be 
possible
> 
to 
read 
the 
memory 
bus 
while 
the 
system 
was 
active 
and 
pick 
up 
the
> 
keys 
that 
way. 

But 
that 
would 
require 
physical 
access 
to 
the 
memory 
bus, 
in 
which 
case
you 
are 
"owned" 
from 
the 
get 
go.

<SNIP>

> 
The 
only
> 
advantage 
they 
offer 
is 
a 
more 
complicated 
architecture 
that 
would
> 
have 
to 
be 
reverse 
engineered 
first 
so 
that 
an 
attacker 
would 
know
> 
where 
to 
look 
before 
attempting 
to 
find 
the 
key 
(obfuscation).  
I 
was
> 
thinking 
that 
storing 
the 
key 
in 
a 
CPU 
register 
would 
be 
better 
as 
the
> 
complexity 
and 
small 
feature 
size 
would 
make 
it 
a 
lot 
harder 
to
> 
extract.  
OpenBSD, 
IIRC, 
randomizes 
memory 
locations 
so 
theoretically
> 
it 
would 
be 
more 
difficult 
to 
find 
a 
key 
(again 
obfuscation).

Obfuscation 
wouldn't 
provide 
much 
protection. 
I've 
seen 
other 
article
mentioning 
researcher 
who's 
developed 
algorithms 
for 
finding 
crypto 
keys
in 
memory 
dumps, 
including 
"error 
correction" 
schemes 
to 
compensate 
for
bit 
rot.

> 
I 
think
> 
the 
Linux 
solution 
is 
to 
have 
the 
kernel 
wipe 
entire 
memory 
space
> 
before 
halting 
or 
suspending.

Ah, 
yes 
that's 
my 
suggestion, 
you 
did 
beat 
me 
to 
it.

I 
think 
an 
understated 
aspect 
of 
this 
situation 
is 
that 
it 
pertains 
to
encrypted 
filesystems 
which 
were 
"very 
recently" 
mounted. 
I 
think
something 
to 
be 
taken 
away 
from 
this 
is 
that 
an 
encrypted 
file 
system
that's 
"always 
mounted" 
isn't 
really 
very 
protected.

 
This 
also 
speaks 
well 
of 
powering 
notebook 
computers 
all 
the 
way 
down,
rather 
than 
suspending, 
before 
transport, 
if 
the 
security 
of 
encrypted
information 
is 
important.

Raymond 
McLaughlin

_______________________________________________
mdlug 
mailing 
list
mdlug at mdlug.org
http://mdlug.org/mailman/listinfo/mdlug






      ____________________________________________________________________________________
Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs



More information about the mdlug mailing list