Garrett,

 

The alternate boot threat you describe cannot be executed against the
Seagate Momentus FDE drives.  Whenever power is removed from the drive,
either at full system shutdown, or when the system goes into
hibernation, the drive locks and all user data, including the
hibernation file is encrypted and unavailable.  When the system is
powered up the FDE drive is locked.  If an alternate system is booted,
the drive will only appear to have a 128MB available, which is the
protected read-only partition on the drive which stores the shadow
master boot record which is used to provide the pre-boot authentication
for unlocking the drive by an authorized user.  Once the drive is
unlocked, then the normal boot process or return from hibernation will
execute.  There is no possibility for alternate boot scenarios which
will be able to find the drive in an unlocked state.   

 

The Wave Embassy software you mentioned for managing the setup and
security settings for the Seagate FDE drive, forces Windows to use
hibernate mode, even if standby mode is selected by the user.  In Dell
systems, Seagate, Wave, and Dell worked together to create a solution
for secure standby mode, so for Dell systems both hibernate and standby
modes are supported with full security.  

 

Lark Allen

 

Wave Systems Corp.

From: fde-boun...@www.xml-dev.com [mailto:fde-boun...@www.xml-dev.com]
On Behalf Of Garrett M. Groff
Sent: Monday, July 06, 2009 11:23 AM
To: fde@www.xml-dev.com
Subject: [FDE] Q concerning hardware-based encryption/security

 

I have a concern about self-encrypting drives, specifically Seagate
Momentus FDE. While the idea looks quite brilliant, my understanding is
that the user is only prompted for credentials when booting from a cold
machine (one that has been shut down completely). If that's correct,
then that presents the following vector of attack:

 

Bad Guy catches machine in standby (or hibernate?) mode. Bad Guy wakes
machine & then restarts it, booting to a USB stick (or CD) rather than
the HDD. Since HDD is already authenticated, Bad Guy mounts file system
& reads (or writes!) data directly off of HDD.

 

Can someone provide technical information that confirms or denies this
potential attack vector? I'm specifically looking at Seagate's Momentus
FDE drive w/ Wave's Embassy Suite, though other vendors would logically
suffer the same vulnerability.

 

Thanks.

_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to