Hardware is not really the solution. The problem is layered but the main
problem here is physical security. If you have a system and all of its
components to encrypt and decrypt are right there in one piece and
people can connect debuggers to it or analyze it they could break
anything you do. But if the system is not complete without something
else like a private key that needs to be retrieved remotely then you
have some extra security. Then you can control the process by seeing if
physical security is compromised you just don't send that private key
and the system is incomplete. For true secure solutions you need to
layer, then separate, then control access to each layer and component.
So in the case of hard drive encryption if an FBI person gets your drive
and you can bet they can find out everything on it if they care enough. 

Security is really just a level of comfort you can deal with. EVERYTHING
can be compromised in some way.

Thanks,
------------------------------------------
Ali Mesdaq (CISSP, GIAC-GREM)
Security Researcher II
Websense Security Labs
http://www.WebsenseSecurityLabs.com
------------------------------------------

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of j maccraw
Sent: Friday, February 22, 2008 2:24 AM
To: [email protected]
Subject: Re: [H] Breaking Disk Encryption

Nice find Ali!

sorry this long, by I feel passionate about this...

Yet another disturbing insight into how exploitable the modern PC is. To
be fair, peaking into RAM of running systems has been PoC'd more than a
few times (as have a countermeasure or 2) all useless against a fully
unpowered system. 
Scary to have powered vs. not redefined though!

When I 1st started toying 10+ years ago with Norton Your Eyes Only, E4M
& later DriveCrypt it seemed the biggest issue after what cipher, what
app, was OS swapping RAM to disk either pagefile or for hibernation. Yet
for for years Crypto experts like Bruce Schneier and others have been
saying that no matter what, using general purpose computers to run
encryption software is flawed & exploitable.

It would seem that ultimately noting short of both full RAM & storage
encryption is going to prevent a running system from having it's brains
sucked out & scrutinized. We know of attempts with M$ XBOX, HDCP, or
HD-DVD/BluRay to secure against scrutiny. While they are seeing varying
degrees of success locking US out very little is coming in the form of
letting us lock THEM out. Obviously it's possible to build systems that
once set-in-motion, encrypt and continue to run leaving no "keys" in ram
to sniff since only the system knows what it's using to crypt/decrypt
like Colossus & Guardian talking to each other in a language only they
knew!

Until then, on running systems, manual user intervention is needed where
auto-dismount is not practical. Passwords/phrases must die, keys must be
tied to a secure physical token so that removing it means there are no
keys. Removal of token should trigger memory wiping so keydata is not
cached. Some of this must already exist? I won't even go into EFS, it's
default lame option of obscuring the master keys in the registry, or the
fact that mode
3 only works with floppies!

Now any system that can be suspended has got to be easier to protect
IMHO. If RAM sniffing an issue, then OTFE software needs to add key
flush on on suspend followed by re-authentication to retrieve keys from
external source (read not on the PC's RAM, HDD, SDD) on resume rather
use RAM cached copies. Don't know how easy that is to tie in, but I
assume under the current model apps have to wait for storage drivers to
come back online after suspend anyway so I imagine it how this hole gets
closed. Personally I'd like to have a encrypted hibernation file tied to
a physical token for "plug & boot"
authentication.

Bottom line is time has come for *affordable*, faster, dedicated
hardware solutions to be made available. Either in the form of TPM's in
motherboards, storage devices, host controllers, or even inline black
boxes between device & host using a tamper-proof hardware solution. A
solution like the IronKey USB flash drive has between it's USB interface
& flash RAM. Give me a bunch of those modules in the form of SATA
go-betweens & programmable hardware security token I'd have all my SATA
drives encrypted!


Mesdaq, Ali wrote:
> Interesting read for those into disk encryption
> 
> http://www.news.com/8301-13578_3-9876060-38.html
> 
> Thanks,
> ------------------------------------------
> Ali Mesdaq (CISSP, GIAC-GREM)
> Security Researcher II
> Websense Security Labs
> http://www.WebsenseSecurityLabs.com
> ------------------------------------------
> 
> 
>  Protected by Websense Messaging Security --
www.websense.com 
> 
> 


 
________________________________________________________________________
____________
Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs

Reply via email to