Announcement

Collapse
No announcement yet.

Cryptsetup Lands Support For OPAL Self Encrypting Drives

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Cryptsetup Lands Support For OPAL Self Encrypting Drives

    Phoronix: Cryptsetup Lands Support For OPAL Self Encrypting Drives

    Linux 6.4 or newer paired with the latest cryptsetup development code has landed support for the OPAL specification for self-encrypting drives...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I admit I do not have a proper understanding of how SED drives are implemented, but I am asking myself how (or whether) it is guaranteed that the hardware itself is not logging the keys, which are retrievable later via an undocumented interface, (hopefully) only known to vendors and those "agencies"? Nobody would notice if a drive with TB of capacity would hide some KB of its capacity to log the key history..

    Admitted, it is still useful in situations like a lost notebook or for selling the drive second hand, but that is just part of the story.

    Comment


    • #3
      I agree, I would only trust an open source encryption technology because of fears of hardware having built in back doors. LUNKS with Linux, GEOM with FreeBSD, whatever OpenBSD's native encryption tech is called, all three are good and haven't failed me yet!

      Comment


      • #4
        Originally posted by Joe2021 View Post
        I admit I do not have a proper understanding of how SED drives are implemented, but I am asking myself how (or whether) it is guaranteed that the hardware itself is not logging the keys, which are retrievable later via an undocumented interface, (hopefully) only known to vendors and those "agencies"? Nobody would notice if a drive with TB of capacity would hide some KB of its capacity to log the key history..

        Admitted, it is still useful in situations like a lost notebook or for selling the drive second hand, but that is just part of the story.
        It's a matter of trust, but even Microsoft changed the defaults of BitLocker in September 2019 to not use SED functionality:

        Changes the default setting for BitLocker when encrypting a self-encrypting hard drive. Now, the default is to use software encryption for newly encrypted drives. For existing drives, the type of encryption will not change.
        For me it looks that the security state of hardware encrypted drives was so dire it required a change of policy, which historically is something that Microsoft is conservative about.

        Comment


        • #5
          I wouldn't trust their firmware, hardware vendors have a very poor track record with security and fixing vulnerabilities.
          Not to mention firmware will most likely be closed source too.

          Comment


          • #6
            Does OPAL decrease performance with fast SSDs e.g. Samsung EVO 990 pro? Just considering nested OPAL+dm-crypt vs. dm-crypt-only.

            Comment


            • #7
              Originally posted by Jakobson View Post
              Does OPAL decrease performance with fast SSDs e.g. Samsung EVO 990 pro? Just considering nested OPAL+dm-crypt vs. dm-crypt-only.
              No, they will operate at the same speed. In fact, even without setting it up, data is already encrypted regardless. It's just that the keys are unlocked by default; at least on the Samsung drives I have: 970 EVO nvme and 870 EVO sata.

              Comment


              • #8
                Originally posted by numacross View Post
                It's a matter of trust, but even Microsoft changed the defaults of BitLocker in September 2019 to not use SED functionality:

                For me it looks that the security state of hardware encrypted drives was so dire it required a change of policy, which historically is something that Microsoft is conservative about.
                These changed defaults were on Windows 10.

                Windows 11 supports hardware encryption by default again.

                Comment


                • #9
                  Originally posted by johnp View Post
                  These changed defaults were on Windows 10.

                  Windows 11 supports hardware encryption by default again.
                  It doesn't look like it does according to Microsoft documentation and Group Policy running on Windows 11:

                  mWPyCvl.png

                  If you have an official source that they changed it please post it.

                  Comment


                  • #10
                    Originally posted by numacross View Post

                    It doesn't look like it does according to Microsoft documentation and Group Policy running on Windows 11:

                    mWPyCvl.png

                    If you have an official source that they changed it please post it.
                    AFAICT, that policy hasn't changed on Windows 11. Drive manufacturer firmware hasn't gotten any more reliable since Microsoft realized SED as a practical matter isn't reliable.

                    Edit to add: What's really needed are tools to easily verify the encryption integrity on devices with SED so they can actually be used when it does work. Right now, I don't know of any reliable way to do so as all drive manufacturers are dependent on their own secret sauce firmware to the detriment of their customer's data integrity, security, and privacy. The current situation is we've no choice but to default to throwing out the baby with the bathwater because we can't know if both are contaminated.
                    Last edited by stormcrow; 18 August 2023, 05:43 PM.

                    Comment

                    Working...
                    X