Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-19 Thread Chris Palmer
"Mere" accidents like disk errors are the most common and likely problem, and by themselves justify strong integrity protection. Hence ZFS. License problems mean you'll never boot Linux from it, but FreeBSD can, and OS X supports it. Linux' answer is btrfs or something like that. On Jan 19, 2011 6:

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-19 Thread travis+ml-rbcryptography
Jon and Ian, unless I'm mistaken, I think you both don't understand the threat model. The threat model is someone with temporary access to the encrypted storage device. This happens in many ways; in hotel rooms, when you leave home, if you host with an untrusted data center, if you pass through c

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-19 Thread travis+ml-rbcryptography
On Sun, Jan 16, 2011 at 10:42:22AM -0800, Jon Callas wrote: > Moreover, disk systems are hard to write and when you have a nasty bug, you lose people's data. People don't like having their data lost. Simplicity is a virtue in all security systems, as well as in others. I couldn't resist ment

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-16 Thread Ian G
On 14/01/11 5:40 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: So does anyone know off the top of their head whether dm-crypt or TrueCrypt (or other encrypted storage things) promise data integrity in any way, shape or form? I'm assuming they're just encrypting, but figured I'd ask befor

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-16 Thread Jon Callas
On Jan 15, 2011, at 5:53 AM, Marsh Ray wrote: > On 01/14/2011 06:13 PM, Jon Callas wrote: >> >> This depends on what you mean by data integrity. > > How about "an attacker with write access to the disk is unable to modify the > protected data without detection"? Yes, that's the strict definit

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-16 Thread Jeffrey Schiller
On Sat, 2011-01-15 at 17:08 +0200, Alexander Klimov wrote: > > As I understand it, the Playstation 3 filesystem crypto was defeated > > by simply deleting the encrypted files, filling up the disk with > > movies and then placing the cyphertext in the movie data stream > > (they may have had to ensu

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-16 Thread Jeffrey Schiller
Another completely different approach is to use a filesystem which does its own integrity checking. ZFS is a good example. If you run ZFS on top of an encrypted loop device, most corruption should be detected because ZFS does its own cryptographic checksum of data blocks. This checksum is stored in

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Jon Callas
On Jan 15, 2011, at 4:23 PM, Ivan Krstić wrote: > On Jan 14, 2011, at 4:13 PM, Jon Callas wrote: >> XTS in particular is a wide-block mode that takes a per-block tweak. This >> means that if you are using an XTS block of 512 bytes, then a single-bit >> change to the ciphertext causes the whole

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Ivan Krstić
On Jan 14, 2011, at 4:13 PM, Jon Callas wrote: > XTS in particular is a wide-block mode that takes a per-block tweak. This > means that if you are using an XTS block of 512 bytes, then a single-bit > change to the ciphertext causes the whole block to decrypt incorrectly. If > you're using a 4K d

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Darren Lasko
On Fri, Jan 14, 2011 at 5:13 PM, Jon Callas wrote: > > On Jan 13, 2011, at 10:40 AM, > travis+ml-rbcryptogra...@subspacefield.orgwrote: > > However -- a number of storage things (including TrueCrypt) are using modes > like XTS-AES. These modes are sometimes called "PMA" modes for "Poor Man's > A

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Steven Bellovin
On Jan 15, 2011, at 8:53 44AM, Marsh Ray wrote: > On 01/14/2011 06:13 PM, Jon Callas wrote: >> >> This depends on what you mean by data integrity. > > How about "an attacker with write access to the disk is unable to modify the > protected data without detection"? > >> In a strict, formal >>

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Alexander Klimov
On Sat, 15 Jan 2011, Marsh Ray wrote: > > This depends on what you mean by data integrity. > > How about "an attacker with write access to the disk is unable to modify > the protected data without detection"? What about reverting (a part of) the storage to one of the previously valid states? > As

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-15 Thread Marsh Ray
On 01/14/2011 06:13 PM, Jon Callas wrote: This depends on what you mean by data integrity. How about "an attacker with write access to the disk is unable to modify the protected data without detection"? In a strict, formal way, where you'd want to have encryption and a MAC, the answer is n

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-14 Thread Jon Callas
On Jan 13, 2011, at 10:40 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: > * PGP Signed by an unknown key > > So does anyone know off the top of their head whether dm-crypt or > TrueCrypt (or other encrypted storage things) promise data integrity > in any way, shape or form? This depends

Re: [cryptography] encrypted storage, but any integrity protection?

2011-01-13 Thread markus reichelt
* travis+ml-rbcryptogra...@subspacefield.org wrote: > So does anyone know off the top of their head whether dm-crypt or > TrueCrypt (or other encrypted storage things) promise data > integrity in any way, shape or form? I've heard that geli does. -- left blank, right bald pgpWPLfKZA5z2.pgp De

[cryptography] encrypted storage, but any integrity protection?

2011-01-13 Thread travis+ml-rbcryptography
So does anyone know off the top of their head whether dm-crypt or TrueCrypt (or other encrypted storage things) promise data integrity in any way, shape or form? I'm assuming they're just encrypting, but figured I'd ask before digging into source and design docs. It's important to understand the