Garrett,
There is no time like the present to begin to investigate the tools that have been provided to secure the network. All enterprise authentication should leverage the TPM. Start Monday. Take a wireless 802.1x hot spot and use the TPM to hold the client side keys in a security chip and never in RAM. This is done by asking the original keys to be created in the TPM and MSCAPI pretty much takes care of the rest. When you create a client side certificate click advanced on the CA request and use the CSP (cryptographic Service Provider) for the TPM. If you select that the keys are not migratable, then the secret key will never leave the chip. Once this is done you have authentication keys on the TPM that can be used for many network purposes. This will dramatically reduce the attack vectors on authentication. P.S. this only works if you turned your TPM on in bios. Only by machines with Seagate Drives Read as much as you can on Intel's VPRO and *T technologies. This is how we will create secure processing in the future. Security takes hardware- It worked for cellphones, set top boxes, garage doors, ..... No it's time for you to use it on your PC. To ultimately thwart DRAM all memory must be encrypted all of the time. This is no different then all network traffic must be encrypted. Steven Sprague CEO Wave Systems Corp. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Garrett M. Groff Sent: Saturday, March 01, 2008 12:14 AM To: [email protected] Subject: Re: [FDE] DRAM attack - not thwarted at all by Seagate'sdriveCORRECTION the data on the HDD IS Protected!!! I concede your points. My frustration is not with Secude's hardware+software solution specifically. In fact, I think hardware-based encryption (like the Momentus drive) is the way to go in the long haul (hardware+software attacks are typically more difficult than software-only attacks). Just a bit frustrated that I can't sleep as easy at night knowing that the "theoretical" RAM analysis technique will (soon?) be used by more than a group of researchers at Princeton, realistically. - Garrett ----- Original Message ----- From: Larry Massey <mailto:[EMAIL PROTECTED]> To: [email protected] Sent: Friday, February 29, 2008 3:30 PM Subject: Re: [FDE] DRAM attack - not thwarted at all by Seagate's driveCORRECTION the data on the HDD IS Protected!!! Garrett: Glad you "conveniently" received that email...J Yes, you may be a bit too picky. Our solution is to solve a Data At Rest problem that in pure Software Laptop Encryption products is broken by exposing the encryption key residing in PC DRAM and NOT to solve the problem of securing the contents of DRAM which would a different data exposure problem, of course. We make no claim to solve the problem of data exposed in DRAM, simply to not put data in DRAM at a point in time that it could be exposed and used to defeat HDD on board encryption technology. You may want to spend some time learning more about the Seagate drive, as it is quite an interesting and secure technology. If any of you will be attending the Data Protection Summit in LA next month, we will have a presentation on this specific topic (again DAR only), I will also be attending and would love to meet any members of this very enjoyable although overly cloaked group on this blog. Maybe we can even get together for a dinner one evening. I am sure that some of this blogs under cover vendors might even be willing to foot the bill. Regards, Larry ___________________________________________________ Larry Massey President SECUDE IT Security, LLC 380 Sundown Drive Dawsonville, GA 30534 USA Tel : +1 706 216 8609 Fax: +1 706 216 4696 Mobile : +1 706 215 3854 [EMAIL PROTECTED] www.secude.com <http://www.secude.com/> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Garrett M. Groff Sent: Friday, February 29, 2008 2:07 PM To: [email protected] Subject: [FDE] DRAM attack - not thwarted at all by Seagate's drive I conveniently got an email from Secude in my inbox. One of the closing paras had the following: As you continue your investigation of disk-encryption technologies, I invite you to contact us to learn more about our partnership with Seagate and other hard drive manufacturers and how we eliminate the types of vulnerabilities found in DRAM attacks. By encrypting data at the drive level, we are able to offer you the highest level of protection. Of course, that's not true at all. The vulnerability of data residing in DRAM still exists. That will be the case until we get "secure RAM," or something along those lines. However, it is true that the particular attack involving reading the FDE key directly from RAM is defeated since that key is never written to RAM. Maybe I'm being too picky here, but looking ahead, this technique could be used to read information from any application that happens to be open at the moment using software that looks for juicy keywords (like "confidential" or "password"). Doesn't that seem like the next logical threat once the "low-hanging fruit" (such as it is) of cold-boot key discovery is patched? I mean, how long are we going to have secure disks with wide-open RAM chips? - Garrett ________________________________ _______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
_______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
