The same researchers posted a vulnerability in the MacOSX keychain this week. It involved searching RAM for the password to the keychain, which give access to all disk encryption and any stored passwords and private keys.

http://www.news.com/8301-10784_3-9881870-7.html?tag=nefd.lede




At 2:07 PM -0500 2/29/08, Garrett M. Groff wrote:
I conveniently got an email from Secude in my inbox. One of the closing paras had the following:


As you continue your investigation of disk-encryption technologies, I invite you to contact us to learn more about our partnership with Seagate and other hard drive manufacturers and how we eliminate the types of vulnerabilities found in DRAM attacks. By encrypting data at the drive level, we are able to offer you the highest level of protection.

Of course, that's not true at all. The vulnerability of data residing in DRAM still exists. That will be the case until we get "secure RAM," or something along those lines.

However, it is true that the particular attack involving reading the FDE key directly from RAM is defeated since that key is never written to RAM.

Maybe I'm being too picky here, but looking ahead, this technique could be used to read information from any application that happens to be open at the moment using software that looks for juicy keywords (like "confidential" or "password"). Doesn't that seem like the next logical threat once the "low-hanging fruit" (such as it is) of cold-boot key discovery is patched? I mean, how long are we going to have secure disks with wide-open RAM chips?

- Garrett

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to