Announcement
Collapse
No announcement yet.
A Self-Destruct Option For Linux Disk Encryption
Collapse
X
-
So you all just read michael's rewording and put undue emphasis on minor grammatical points, instead of clicking through to the original announcement and getting your information from there?
I'd say you all failed reading comprehension then.
There's a direct setup guide in there!
root@kali:~# cryptsetup luksAddNuke /dev/sda5
Enter any existing passphrase: (existing passphrase)
Enter new passphrase for key slot: (nuke passphrase)
Comment
-
Originally posted by rohcQaH View PostSo you all just read michael's rewording and put undue emphasis on minor grammatical points, instead of clicking through to the original announcement and getting your information from there?
I'd say you all failed reading comprehension then.
Comment
-
This gives a fast destroy option for non-hacker users
Originally posted by phoronix View PostPhoronix: A Self-Destruct Option For Linux Disk Encryption
The security-minded Kali Linux distribution has proposed a feature of adding "emergency self-destruction of LUKS" to their cryptsetup package when doing full-disk encrypted Linux installations...
http://www.phoronix.com/vr.php?view=MTU2MjQ
For some (most recent) disks a "security erase enhanced" could be initiated from the OS while running, and even a single second of that would kill the LUKS header of a freestanding /home disk. A daytime raid would often find computers running, so a boot destroy passphrase should also be set up to be usable from the running OS, just as hdparm --security-erase-enhanced or LuksKillSlot are by themselves. A dedicated IT guy could easily destroy data while others fight to keep the raid team off him-unless the power is cut first.
Don't rely on being able to destory data, use strong passphrases that your enemy cannot brute force. Five words that do not form a phrase found in any book or your writing is said to require "nation-state" level resources to crack, so use more than that.
Comment
-
Forensic agencies ALREADY use only disk images
Originally posted by A Laggy Grunt View PostWhat's it to be used for? If someone is telling you to put your password in so they can get at your files, or maybe several nuke passwords for someone to accidentally find when trying to decrypt a drive.
Once people figure out this feature exists, the new standard operating procedure for this kind of thing will be "mirror the drive first."
You should NEVER carry computer equipment over US borders as it is subject to search, data smuggling should be done with LOCALLY encrypted file containers moved over the network. If you must use a laptop, TSA and CBP goons are not forensic computer specialists and will try to order you to boot the machine. A honeypot OS will usually be enough to fool them-but combining this with a destroy password on the real one is a lot of extra protection.
Finally, if CBP gets burned this way a few times, they will be forced to stop stealing laptops when passphrases are refused (as they should always be) and switch to making a disk image they can attempt to crack later. If they simply steal every encrypted laptop they will make too many corporate enemies. As for me, I refuse to use legal US border crossings or any form of transit that searches luggage at all as I refuse to consent to searches.
Comment
-
Originally posted by Ericg View PostDepends on the situation, there was one story on /. about a guy being forced to give up the encryption key to his laptop. Give up the nuke password then say that they must've damaged the hard drive in transit, or that the drive must be suffering from corruption. Or have the nuke password be something one letter off from the real password (like a strange letter, z instead of s maybe) then when they enter it and blame you just say they heard you incorrectly.
Really depends on if maybe you're a reporter and the data on your drive could get someone else killed or start a war or something extreme like that
This feature is especially useless if it's widely known about. It becomes an expected tactic by anyone wishing to break into your system.
Comment
-
I get the impression that a lot of people don't understand what's going on here. This code doesn't literally go through and wipe a hard drive. Instead, it finds all LUKS keyslots and wipes those.
You see, when you encrypt your drive using LUKS, your passphrase actually isn't used to encrypt the disk at all. Instead, your passphrase is used to encrypt a container that the real key is stored in. This allows you to do things like change your passphrase without reencrypting the entire disk, or rendering a disk unreadable by deleting where the real key is stored. This code combines these two things. This makes it theoretically useful for "wiping" your hard drive without having to write to the whole disk.
However, this DOES NOT WORK if there is wear-leveling used, as is the case for pretty much every SSD. If wear-leveling is enabled, this will simply make it look like the LUKS header was destroyed, when in fact it's just the drive reporting to the OS that it was, while in reality it simply wrote the data intended to overwrite it to someplace else. Any adversary capable of any physical analysis (e.g. any moderately sized government) would be able to examine the whole drive and see the original LUKS header this code thinks it wiped, and then use any cryptanalysis attack that they would have used if the nuke password hadn't been entered.
Comment
-
Originally posted by tga.d View PostI get the impression that a lot of people don't understand what's going on here. This code doesn't literally go through and wipe a hard drive. Instead, it finds all LUKS keyslots and wipes those.
You see, when you encrypt your drive using LUKS, your passphrase actually isn't used to encrypt the disk at all. Instead, your passphrase is used to encrypt a container that the real key is stored in. This allows you to do things like change your passphrase without reencrypting the entire disk, or rendering a disk unreadable by deleting where the real key is stored. This code combines these two things. This makes it theoretically useful for "wiping" your hard drive without having to write to the whole disk.
However, this DOES NOT WORK if there is wear-leveling used, as is the case for pretty much every SSD. If wear-leveling is enabled, this will simply make it look like the LUKS header was destroyed, when in fact it's just the drive reporting to the OS that it was, while in reality it simply wrote the data intended to overwrite it to someplace else. Any adversary capable of any physical analysis (e.g. any moderately sized government) would be able to examine the whole drive and see the original LUKS header this code thinks it wiped, and then use any cryptanalysis attack that they would have used if the nuke password hadn't been entered.
I didn't know the SSD bit, though.
Comment
-
SSD's not good for encrypted data, OK for OS
Originally posted by tga.d View PostI get the impression that a lot of people don't understand what's going on here. This code doesn't literally go through and wipe a hard drive. Instead, it finds all LUKS keyslots and wipes those.
You see, when you encrypt your drive using LUKS, your passphrase actually isn't used to encrypt the disk at all. Instead, your passphrase is used to encrypt a container that the real key is stored in. This allows you to do things like change your passphrase without reencrypting the entire disk, or rendering a disk unreadable by deleting where the real key is stored. This code combines these two things. This makes it theoretically useful for "wiping" your hard drive without having to write to the whole disk.
However, this DOES NOT WORK if there is wear-leveling used, as is the case for pretty much every SSD. If wear-leveling is enabled, this will simply make it look like the LUKS header was destroyed, when in fact it's just the drive reporting to the OS that it was, while in reality it simply wrote the data intended to overwrite it to someplace else. Any adversary capable of any physical analysis (e.g. any moderately sized government) would be able to examine the whole drive and see the original LUKS header this code thinks it wiped, and then use any cryptanalysis attack that they would have used if the nuke password hadn't been entered.
The only reason I encrypt SSD OS volumes at all is to narrow the target area for a keylogger attack to /boot and the BIOS, both of which are very small, plus the (obvious) hardware keylogger that pretends to be a USB adapter and gets caught. SSD's should not be used for secure data unless it is acceptable not to be able to erase the data and/or a plain mapping is used with a long interation at password-derived key generation. For the same reason, if a key must be revoked, an SSD drive volume should be remade from scratch so as to kill the usefulness of any recovered key.
For a laptop, a control to feed the full +12V to an SSD's memory cells with a combination of keys would be the best emergency kill switch.
Comment
Comment