Re: safety of encrypted filesystems

2005-06-28 Thread martin f krafft
also sprach martin f krafft <[EMAIL PROTECTED]> [2005.06.17.0944 +0200]: > also sprach Michael Buchholz <[EMAIL PROTECTED]> [2005.06.17.0857 +0200]: > > And also, when you write any block, you have to reencrypt all the > > remaining blocks. > > Yes, don't you? From all I can tell, this is the cas

Re: safety of encrypted filesystems

2005-06-23 Thread Phillip Hofmeister
On Wed, 22 Jun 2005 at 06:32:08PM -0400, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > You could always run tripwire on the mounted file system, unmount it, > > change your block, remount it, and run a tripwire check. This should > > identify *WHICH* file changed. > > he

Re: safety of encrypted filesystems

2005-06-22 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > You could always run tripwire on the mounted file system, unmount it, > change your block, remount it, and run a tripwire check. This should > identify *WHICH* file changed. he has only one file and this was unaltered, the question is why. Bernd --

Re: safety of encrypted filesystems

2005-06-22 Thread Phillip Hofmeister
On Fri, 17 Jun 2005 at 06:01:02AM -0400, martin f krafft wrote: > also sprach Horst Pflugstaedt <[EMAIL PROTECTED]> [2005.06.17.1018 +0200]: > > encrypt /dev/hda7, mount, fill it with some hundred small files > > (with known content), unmount, change one bit/byte/block on > > /dev/hda7 (using dd),

Re: safety of encrypted filesystems

2005-06-20 Thread Max Vozeler
On Fri, Jun 17, 2005 at 12:59:14PM -0700, Ben Pfaff wrote: > martin f krafft <[EMAIL PROTECTED]> writes: > > > However, doesn't CBC or EBC make sure that every block is > > chained to its predecessor, making even the very last block of > > a file dependent on the bits of the very first block? > >

Re: safety of encrypted filesystems

2005-06-18 Thread martin f krafft
also sprach Bernd Eckenfels <[EMAIL PROTECTED]> [2005.06.18.0253 +0200]: > have you unmounted the file before writing to it? perhaps you > changes was overwritten with the blok from cache Yes. And my simulated broken blocks were still there after checking the integrity and unmounting again. -- P

Re: safety of encrypted filesystems

2005-06-17 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > Nope. Someone raised the point of a file with all zeroes being > possibly sparse, but I don't think that's the case if I wrote it > with have you unmounted the file before writing to it? perhaps you changes was overwritten with the blok from cache --

Re: safety of encrypted filesystems

2005-06-17 Thread Ben Pfaff
martin f krafft <[EMAIL PROTECTED]> writes: > However, doesn't CBC or EBC make sure that every block is > chained to its predecessor, making even the very last block of > a file dependent on the bits of the very first block? Yes and no. If you change the first block in a set of CBC-chained block

Re: safety of encrypted filesystems

2005-06-17 Thread Isaac To
> "martin" == martin f krafft <[EMAIL PROTECTED]> writes: >> And also, when you write any block, you have to reencrypt all >> the remaining blocks. martin> Yes, don't you? Didn't you realize that if that is the case, every single-byte write would means writing, on average, half t

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Michael Buchholz <[EMAIL PROTECTED]> [2005.06.17.1242 +0200]: > fd = open ("empty_file", O_WRONLY, 0666); > lseek (fd, 2^23, SEEK_SET); > write (fd, "?", 1); > close (fd); dd if=/dev/zero of=file bs=1 count=1 seek=8388607 -- Please do not send copies of list mail to me; I read the li

Re: safety of encrypted filesystems

2005-06-17 Thread Michael Buchholz
On Fri, 17 Jun 2005 12:30:58 +0200 martin f krafft <[EMAIL PROTECTED]> wrote: > Nope. Someone raised the point of a file with all zeroes being > possibly sparse, but I don't think that's the case if I wrote it > with > > dd if=/dev/zero of=file bs=8M count=1 > > right? Right. This file contai

Re: safety of encrypted filesystems

2005-06-17 Thread Søren Hansen
fre, 17 06 2005 kl. 12:30 +0200, skrev martin f krafft: > Nope. Someone raised the point of a file with all zeroes being > possibly sparse, but I don't think that's the case if I wrote it > with > > dd if=/dev/zero of=file bs=8M count=1 > > right? Right. Files are only sparse if you seek to so

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Michael Buchholz <[EMAIL PROTECTED]> [2005.06.17.1218 +0200]: > Is there something in the logfiles? Maybe the cryptoloop is a little > verbose about errors... Nope. Someone raised the point of a file with all zeroes being possibly sparse, but I don't think that's the case if I wrote it

Re: safety of encrypted filesystems

2005-06-17 Thread Michael Buchholz
On Fri, 17 Jun 2005 12:01:02 +0200 martin f krafft <[EMAIL PROTECTED]> wrote: > devices, mounting... no errors. > > **And the file is still all zeroes...** > > So I guess there is error correction happening? Is there something in the logfiles? Maybe the cryptoloop is a little verbose about erro

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Horst Pflugstaedt <[EMAIL PROTECTED]> [2005.06.17.1018 +0200]: > encrypt /dev/hda7, mount, fill it with some hundred small files > (with known content), unmount, change one bit/byte/block on > /dev/hda7 (using dd), remount, look for the remaining files and > their contents. I've tried

Re: safety of encrypted filesystems

2005-06-17 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > So encrypted block devices are not really more dangerous than > clear-text in the end... I suppose with AES you end up losing at > least 64 bytes of data, which could be less without encryption... You lose much more with RAID-5, yes. Greetings Bernd -

Re: safety of encrypted filesystems

2005-06-17 Thread Horst Pflugstaedt
On Fri, Jun 17, 2005 at 09:03:57AM +0200, martin f krafft wrote: > also sprach Florian Weimer <[EMAIL PROTECTED]> [2005.06.17.0848 +0200]: > > These are *cipher* blocks, and they are chained only within > > a *block device* block. > > Who guarantees that? If Cipherblock CB_x depends on CB_(x-1), t

Re: safety of encrypted filesystems

2005-06-17 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > Of course blocks are small, e.g. 64 bytes. However, doesn't CBC or > EBC make sure that every block is chained to its predecessor, making > even the very last block of a file dependent on the bits of the very > first block? It is therefore better to use

Re: safety of encrypted filesystems

2005-06-17 Thread Alexander Zangerl
On Fri, 17 Jun 2005 09:36:07 +0200, Michael Buchholz writes: >On Fri, 17 Jun 2005 17:15:32 +1000 >Alexander Zangerl <[EMAIL PROTECTED]> wrote: > >> no, this is subtly wrong. the *encrypted* block affects the decryption >> of the block following it, not the cleartext block. > >That's a possible, but

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Alexander Zangerl <[EMAIL PROTECTED]> [2005.06.17.0915 +0200]: > no, this is subtly wrong. the *encrypted* block affects the decryption of the > block following it, not the cleartext block. > > one dead block spills junk all over the block+1 when decrypted, > but the (undamaged) encr

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Michael Buchholz <[EMAIL PROTECTED]> [2005.06.17.0857 +0200]: > If it would be that way, it would allways be necessary to decrypt > the whole filesystem, when you want to read the last block. Or you > have to store a decrypted version in memory... No, it would not. You only need access

Re: safety of encrypted filesystems

2005-06-17 Thread Michael Buchholz
On Fri, 17 Jun 2005 17:15:32 +1000 Alexander Zangerl <[EMAIL PROTECTED]> wrote: > no, this is subtly wrong. the *encrypted* block affects the decryption > of the block following it, not the cleartext block. That's a possible, but unsecure way to do that. This way, an attacker can try to decrypt a

Re: safety of encrypted filesystems

2005-06-17 Thread Alexander Zangerl
On Fri, 17 Jun 2005 17:15:32 +1000, Alexander Zangerl writes: (bloody hell: can't even type anymore. weekend is calling...) >>also sprach Alexander Zangerl <[EMAIL PROTECTED]> [2005.06.17.0835 +0200]: >>> no - with cbd, dud blocks effect only decryption of the block itself >>> and the one directly

Re: safety of encrypted filesystems

2005-06-17 Thread Alexander Zangerl
On Fri, 17 Jun 2005 09:02:05 +0200, martin f krafft writes: >also sprach Alexander Zangerl <[EMAIL PROTECTED]> [2005.06.17.0835 +0200]: >> no - with cbd, dud blocks effect only decryption of the block itself >> and the one directly following it. > >... and that one affects the one directly followin

Re: safety of encrypted filesystems

2005-06-17 Thread Michael Buchholz
On Fri, 17 Jun 2005 09:03:57 +0200 martin f krafft <[EMAIL PROTECTED]> wrote: > Who guarantees that? If Cipherblock CB_x depends on CB_(x-1), then > CB_last will indirectly depend on CB_first. If the data are large > enough to span multiple block device blocks, damage to the beginning > of the cip

Re: safety of encrypted filesystems

2005-06-17 Thread Florian Weimer
* martin f. krafft: > also sprach Florian Weimer <[EMAIL PROTECTED]> [2005.06.17.0848 +0200]: >> These are *cipher* blocks, and they are chained only within >> a *block device* block. > > Who guarantees that? If Cipherblock CB_x depends on CB_(x-1), then > CB_last will indirectly depend on CB_firs

Re: safety of encrypted filesystems

2005-06-17 Thread martin f krafft
also sprach Florian Weimer <[EMAIL PROTECTED]> [2005.06.17.0848 +0200]: > These are *cipher* blocks, and they are chained only within > a *block device* block. Who guarantees that? If Cipherblock CB_x depends on CB_(x-1), then CB_last will indirectly depend on CB_first. If the data are large enoug

Re: safety of encrypted filesystems

2005-06-16 Thread Michael Buchholz
On Fri, 17 Jun 2005 08:46:03 +0200 martin f krafft <[EMAIL PROTECTED]> wrote: > Of course blocks are small, e.g. 64 bytes. However, doesn't CBC or > EBC make sure that every block is chained to its predecessor, making > even the very last block of a file dependent on the bits of the very > first b

Re: safety of encrypted filesystems

2005-06-16 Thread Florian Weimer
* martin f. krafft: >> A corrupt sector corrupts the remaining part of the block. Block >> sizes are much smaller than 1 GB because when part of a block is >> changed, all the following bytes have to be rewritten (if a reasonable >> the cipher mode is used). > > Of course blocks are small, e.g. 6

Re: safety of encrypted filesystems

2005-06-16 Thread martin f krafft
also sprach Florian Weimer <[EMAIL PROTECTED]> [2005.06.17.0834 +0200]: > > Encrypted filesystems are hip these days, [...] > > Are they? I thought most of the fuzz was about encrypted block > devices. That's what I mean. > > If such a bad block occurs and renders a small part of the encrypted

Re: safety of encrypted filesystems

2005-06-16 Thread Florian Weimer
* martin f. krafft: > Encrypted filesystems are hip these days, [...] Are they? I thought most of the fuzz was about encrypted block devices. > If such a bad block occurs and renders a small part of the encrypted > file unreadable, wouldn't the entire partition and all its data be > effectively

safety of encrypted filesystems

2005-06-16 Thread martin f krafft
Encrypted filesystems are hip these days, and that's good. One of the reasons why I have not jumped on the waggon is a concern about their safety. When using a block cipher such as AES or similar to encode e.g. a file of 1024 Mb, the blocks of the ciphertext are in relation to each other. This is