Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-07-01 Thread u
Hi,

 Hi, random lurker speaking up here with a question.
 
 I don't mean to distract from the topic, but regarding
 interoperability, what about FreeOTFE? It's source was available,
 and someone else has picked it up and forked it on GitHub as
 DoxBox: https://github.com/t-d-k/doxbox

Looks like this would be Windows only, so I can't see the relevance of
this tool for Tails.

 Is there any consideration underway to support this solution and
 its development? I know it wouldn't solve all of the issues with
 the absence of TrueCrypt, but it certainly would broaden the
 relevance of LUKS.

Cheers
u.


 
 gl
 
 
 
 On Thu, 02 Apr 2015 19:39:15 + sajolida
 sajol...@pimienta.org wrote:
 intrigeri:
  sajolida wrote (20 Mar 2015 12:34:35 GMT) :
  I think that our long-term objective is to have people move out
 of
  using TrueCrypt technologies in general (be it the software,
 the
  volumes, or the containers).
 
  Now you make me curious: why do you think we should get rid of
 the
  TrueCrypt on-disk format?
 
 I was saying this because I thought it was our vision when getting
 rid
 of TrueCrypt, but I have no strong argument against TrueCrypt on-
 disk
 format as such myself. My understanding was basically that we had
 no
 good reasons for supporting it as we had LUKS already.
 
  The way I see it, we're stuck between a rock and a hard place:
 
  Ideally we'd like to be able to fully replace TrueCrypt volumes
 (I'm
  assuming that I'm missing information that makes you think we
 should)
  with something else, but nothing equivalent exists yet. Sadly,
 I'm not
  aware of any plan (let alone serious effort) towards making this
  a reality, when one takes into account the need for:
 
   - inter-operability (which I'm tempted to disregard as a
 dangerous
 way to share data with an untrusted OS, but then if we don't
 support TrueCrypt volumes at all, perhaps users who
 won't/can't
 fully give up proprietary software will just be forced to
 either
 store and share the very same data in cleartext, or to use
 something less safe than Tails)
 
   - hidden volumes (which may be a false promise in TrueCrypt,
 but
 still people want that and AFAIK there's nothing even
 approaching
 it, be it in terms of peer-review of existing production-
 quality
 implementations)
 
 Thanks to Jasper we can add containers to that list.
 
 All those are usability and interoperability issues that have real
 but
 non-obvious security implications (not in terms of crypto but in
 terms
 of user scenario). I'm not really convinced by containers and
 hidden
 volumes as such in the context of a pure Tails setup, so we're
 left with
 interoperability as the most interesting feature.
 
  With this in mind, supporting the TrueCrypt on-disk format (even
  minimally) still makes sense for the time being IMO. I doubt
 we'll
  actively patch out the corresponding code from cryptsetup, so I
 take
  for granted that we'll keep this support in Tails as long as
  cryptsetup has it.
 
 Agreed.
 
  We had good reasons to get rid of the TrueCrypt software itself,
 but
  no existing GUI for TrueCrypt volumes is satisfying right now,
 in the
  context of Tails.
 
  Now, of course a CLI-only interface isn't encouraging for Tails
 users
  to go on using TrueCrypt volumes. This has both advantages (as
  a long-term strategy, hopefully it'll encourage people to either
 fully
  replace TrueCrypt volumes with a better design), and drawbacks
 (until
  our fancy long-term plans are made real by $someone $some_day,
 Tails
  users have the choice between using something we claim we don't
 really
  support, with poor usability, and doing something even worse).
 
  So, the question I'm coming to is: assuming there *was*
 satisfying GUI
  support for the TrueCrypt on-disk format (in GNOME Disks,
 Nautilus,
  etc.), would we want to explicitly support that, or still depict
 it as
  a suboptimal feature, and call it unsupported because we think
 it
  should ideally be replaced by something else on the long term?
 
 We have a long tradition of advertising only one tool for one job.
 So
 what would we advertise TrueCrypt for? Exchanging encrypted data
 with
 other operating systems? With big fat warnings? Maybe...
 
  In other words: how hard should we push for adding support for
 the
  TrueCrypt on-disk format in udisks and friends? (Until 15
 minutes ago,
  I was convinced that it was the way to go, and prepared to go
 ping the
  right folks about it, but now you've planted some non-negligible
  amount of doubt in my mind, so I'm a bit lost in terms of
 strategy.)
 
 Me too :)
 
 --
 sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-04-27 Thread sajolida

ghostla...@hush.com:
 On Sun, 05 Apr 2015 20:01:44 + sajolida
 sajol...@pimienta.org wrote:
 I'm replacing this in the thread it belongs. ghostlands, please do
 Reply to this email if you want to stay in the loop.
 
 PS: And please reply inline (below the quote) as we usually do.
 
 ghostla...@hush.com:
 Hi, random lurker speaking up here with a question.

 I don't mean to distract from the topic, but regarding
 interoperability, what about FreeOTFE? It's source was
 available,
 and someone else has picked it up and forked it on GitHub as
 DoxBox: https://github.com/t-d-k/doxbox

 Is there any consideration underway to support this solution and
 its development? I know it wouldn't solve all of the issues with
 the absence of TrueCrypt, but it certainly would broaden the
 relevance of LUKS.
 
 Right, if we're left with interoperability as the main reason to
 stick
 with the TrueCrypt disk format, then we might as well look at this
 option the other way around and advertise tools to open LUKS on
 other operating systems.
 
 How's this? :)
 
 No interest in my DoxBox suggestion/question, though? I'm curious
 if anyone here thinks this is code worth using or even just paying
 attention to. It is literally the only serious LUKS implementation
 for Windows, it seems possibly important.

Hi, and sorry for not answering better your previous email.

I knew about FreeOFTE but I didn't knew it was taken over by doxbox,
thanks for that info.

Indeed, I think having better LUKS tools in other operating systems
would also be a valid way to go. Doxbox seems to be quite fresh still
but active. I hope it lives long. Ah, and we would also need an
implementation for Mac OS X.

-- 
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-04-21 Thread ghostlands
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



On Sun, 05 Apr 2015 20:01:44 + sajolida
sajol...@pimienta.org wrote:
I'm replacing this in the thread it belongs. ghostlands, please do
Reply to this email if you want to stay in the loop.

PS: And please reply inline (below the quote) as we usually do.

ghostla...@hush.com:
 Hi, random lurker speaking up here with a question.

 I don't mean to distract from the topic, but regarding
 interoperability, what about FreeOTFE? It's source was
available,
 and someone else has picked it up and forked it on GitHub as
 DoxBox: https://github.com/t-d-k/doxbox

 Is there any consideration underway to support this solution and
 its development? I know it wouldn't solve all of the issues with
 the absence of TrueCrypt, but it certainly would broaden the
 relevance of LUKS.

Right, if we're left with interoperability as the main reason to
stick
with the TrueCrypt disk format, then we might as well look at this
option the other way around and advertise tools to open LUKS on
other
operating systems.

--
sajolida

How's this? :)

No interest in my DoxBox suggestion/question, though? I'm curious
if anyone here thinks this is code worth using or even just paying
attention to. It is literally the only serious LUKS implementation
for Windows, it seems possibly important.

ghostlands
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wsBcBAEBAgAGBQJVNfQAAAoJEJRqj8F0y8k5o0IH/3FTuY/Vg2vyDQdfjfxD9f63JPNm
nT+a+K07/amYz7WSVKCR/ZjvrUXeKxZ1TWpt7zZwsw1JTTbW0h48S171iyqFNg/UAJ20
Ghs5KIi1mV+xxXxKxxJs3lfoitT4NlUx5evgEWR8deJpy8b3Q3qq1O+8vZVh99dvrhec
JQj0YlL7qxZ36WJK5NZHsUSxuVtNNOlccmTn2Im3i4RU76coLyzBASu7Hb8L26sj/ZNb
ye2NIOSE0cuwibBbIpkeK5ZhBRkVw6YqZpqpS0SR+QADkw2JxZ/G31rCePIRsDykB5vW
Rb506Rj4gmlVpRfgLJ5OIogAQwoOXv50N/3LVXvpr6k=
=1aTn
-END PGP SIGNATURE-

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-04-06 Thread intrigeri
Hi,

sajolida wrote (01 Apr 2015 11:08:49 GMT) :
 intrigeri:
 sajolida wrote (20 Mar 2015 12:34:35 GMT) :
 I think that our long-term objective is to have people move out of
 using TrueCrypt technologies in general (be it the software, the
 volumes, or the containers).
 
 Now you make me curious: why do you think we should get rid of the
 TrueCrypt on-disk format?

 I was saying this because I thought it was our vision when getting rid
 of TrueCrypt,

This doesn't match my memories, quite the contrary. There must have
been a fair amount of misunderstanding along the way. See e.g.:
https://mailman.boum.org/pipermail/tails-dev/2014-April/005596.html

Now, I can very well imagine having contradicted myself somewhere
else, or another thread having lead us collectively to the vision
you're referring to, that I really can't remember.

 but I have no strong argument against TrueCrypt on-disk
 format as such myself.

Thanks for clarifying!

 The way I see it, we're stuck between a rock and a hard place:
 
 Ideally we'd like to be able to fully replace TrueCrypt volumes (I'm
 assuming that I'm missing information that makes you think we should)
 with something else, but nothing equivalent exists yet. Sadly, I'm not
 aware of any plan (let alone serious effort) towards making this
 a reality, when one takes into account the need for:
 
  - inter-operability (which I'm tempted to disregard as a dangerous
way to share data with an untrusted OS, but then if we don't
support TrueCrypt volumes at all, perhaps users who won't/can't
fully give up proprietary software will just be forced to either
store and share the very same data in cleartext, or to use
something less safe than Tails)
 
  - hidden volumes (which may be a false promise in TrueCrypt, but
still people want that and AFAIK there's nothing even approaching
it, be it in terms of peer-review of existing production-quality
implementations)

 Thanks to Jasper we can add containers to that list.

 All those are usability and interoperability issues that have real but
 non-obvious security implications (not in terms of crypto but in terms
 of user scenario). I'm not really convinced by containers and hidden
 volumes as such in the context of a pure Tails setup, so we're left with
 interoperability as the most interesting feature.

Agreed.

 With this in mind, supporting the TrueCrypt on-disk format (even
 minimally) still makes sense for the time being IMO. I doubt we'll
 actively patch out the corresponding code from cryptsetup, so I take
 for granted that we'll keep this support in Tails as long as
 cryptsetup has it.

 Agreed.

:)

 We had good reasons to get rid of the TrueCrypt software itself, but
 no existing GUI for TrueCrypt volumes is satisfying right now, in the
 context of Tails.
 
 Now, of course a CLI-only interface isn't encouraging for Tails users
 to go on using TrueCrypt volumes. This has both advantages (as
 a long-term strategy, hopefully it'll encourage people to either fully
 replace TrueCrypt volumes with a better design), and drawbacks (until
 our fancy long-term plans are made real by $someone $some_day, Tails
 users have the choice between using something we claim we don't really
 support, with poor usability, and doing something even worse).
 
 So, the question I'm coming to is: assuming there *was* satisfying GUI
 support for the TrueCrypt on-disk format (in GNOME Disks, Nautilus,
 etc.), would we want to explicitly support that, or still depict it as
 a suboptimal feature, and call it unsupported because we think it
 should ideally be replaced by something else on the long term?

 We have a long tradition of advertising only one tool for one job. So
 what would we advertise TrueCrypt for? Exchanging encrypted data with
 other operating systems? With big fat warnings? Maybe...

I don't think that the only one tool for one job argument is very
relevant here. First, because the scenario you're replying to is about
adding support for the TrueCrypt on-disk format to existing tools
(GNOME Disks and friends). Secondly, because GNOME Disks and friends
support more than one filesystem, more than one partition table
format, etc., so supporting another on-disk encryption format is no
big deal as I see it. Third, because the same reason that led us to
document keyringer (basically: it doesn't solve _exactly_ the same use
case as KeePassX) applies just fine here too.

Now, regarding the advertising part: yes, I think it should be
documented (if at all) only for interoperability purposes.
I'm writting if at all because people who want to use TrueCrypt
volumes can create them on their other OS, and then all we need on our
side is documenting how to unlock/open such volumes in Tails. The good
news is that we already have a perfect place for that, which is
doc/encryption_and_privacy/truecrypt :)

 In other words: how hard should we push for adding support for the
 TrueCrypt on-disk format in udisks and friends? (Until 15 

Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-04-05 Thread sajolida
I'm replacing this in the thread it belongs. ghostlands, please do
Reply to this email if you want to stay in the loop.

PS: And please reply inline (below the quote) as we usually do.

ghostla...@hush.com:
 Hi, random lurker speaking up here with a question.

 I don't mean to distract from the topic, but regarding
 interoperability, what about FreeOTFE? It's source was available,
 and someone else has picked it up and forked it on GitHub as
 DoxBox: https://github.com/t-d-k/doxbox

 Is there any consideration underway to support this solution and
 its development? I know it wouldn't solve all of the issues with
 the absence of TrueCrypt, but it certainly would broaden the
 relevance of LUKS.

Right, if we're left with interoperability as the main reason to stick
with the TrueCrypt disk format, then we might as well look at this
option the other way around and advertise tools to open LUKS on other
operating systems.

-- 
sajolida

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-31 Thread sajolida
Jasper:
 On Fri, 20 Mar 2015 12:40:07 +
 sajolida sajol...@pimienta.org wrote:
 
 intrigeri:
 Jasper wrote (19 Mar 2015 23:46:09 GMT) :
 right now you only (graphically) support luks partitions, not
 luks containers.

 I've not checked in Tails/Wheezy, but FYI Jessie's GNOME Disks has
 an Attach disk image function.

 Thanks for sharing your concerns regarding partitions vs containers. I
 think that they make a lot of sense and I didn't think about that in
 this way before.

 Still, I would need to mature that idea in my head before being sure
 that this is a desirable feature in the context of Tails.

 Because, for example, using containers imply have other unencrypted
 data on the same partition, right? So that would probably encourage
 mixing up data from different identities on the same disk. Then this
 data would be equally available to Tails (and its possible targeted
 attacks) and could deanonymise you. Of course, you can also do that
 with LUKS partitions... but what I want to say is that your idea that
 containers makes it easier to manipulate encrypted files for the user
 might actually make things more complicated conceptually in the
 context of Tails.
 
 thank you for clarifying the conceptual approach of Tails in regard to
 persistence. I agree that providing the least possible amount of
 information in case of a successful attack is the only sane way if you
 consider the giant target that Tails paints on its back. as you said,
 the tradeoff is the same with partitions .. I read your instructions on
 using/creating encrypted volumes but should have also read the explicit
 warnings to be found in the instructions on persistence. what about
 having a link to those warnings from the using/creating encrypted
 volumes page as well?

Sure, the relevant parts would be:

* Storing sensitive documents
* Opening the persistent volume from other operating systems

I'll create a ticket for that.

 I have to admit, the only usecase I evaluated Tails for might be a bit
 specific: secure communication between a lawyer friend of mine and some
 of his clients. he thought about giving them Tails on a usb-stick
 preconfigured with pgp and otr messaging. obviously working with
 documents that will deanonymise you is needed in this case. probably a
 clean separation between the communication layer and the workspace
 using a preconfigured whonix environment will be a approach more suited
 for this usecase. thankfully computers are a lot less expensive these
 days..

I think that Tails with a preconfigured persistence would work fine in
the case as well. They can store their sensitive documents in the
persistent volume. The only thing they should be careful about is to not
mix other documents from other identities or facets of their lives in
there, and not open the persistent volume from another operating system.

-- 
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-29 Thread intrigeri
Jasper wrote (22 Mar 2015 19:23:59 GMT) :
 aye, the disk utils code is were you traditionally look for
 specifications when it comes to new udisks dbus calls. [...]
 whether creating a new encrypted luks image with udisks is possible
 today remains a mistery until it eventually gets supported by gnome
 disks.

I've found the UDisks documentation quite helpful (although sometimes
lacking clarity or details) when porting stuff to UDisks2 recently:

   http://udisks.freedesktop.org/docs/latest/

The Format method from org.freedesktop.UDisks2.Block allows creating
encrypted filesystems, and in theory it should work on loop devices
as well. I've not tried this myself, though.

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-22 Thread Jasper
On Fri, 20 Mar 2015 12:40:07 +
sajolida sajol...@pimienta.org wrote:

 intrigeri:
  Jasper wrote (19 Mar 2015 23:46:09 GMT) :
  right now you only (graphically) support luks partitions, not
  luks containers.
  
  I've not checked in Tails/Wheezy, but FYI Jessie's GNOME Disks has
  an Attach disk image function.
 
 Thanks for sharing your concerns regarding partitions vs containers. I
 think that they make a lot of sense and I didn't think about that in
 this way before.
 
 Still, I would need to mature that idea in my head before being sure
 that this is a desirable feature in the context of Tails.
 
 Because, for example, using containers imply have other unencrypted
 data on the same partition, right? So that would probably encourage
 mixing up data from different identities on the same disk. Then this
 data would be equally available to Tails (and its possible targeted
 attacks) and could deanonymise you. Of course, you can also do that
 with LUKS partitions... but what I want to say is that your idea that
 containers makes it easier to manipulate encrypted files for the user
 might actually make things more complicated conceptually in the
 context of Tails.

thank you for clarifying the conceptual approach of Tails in regard to
persistence. I agree that providing the least possible amount of
information in case of a successful attack is the only sane way if you
consider the giant target that Tails paints on its back. as you said,
the tradeoff is the same with partitions .. I read your instructions on
using/creating encrypted volumes but should have also read the explicit
warnings to be found in the instructions on persistence. what about
having a link to those warnings from the using/creating encrypted
volumes page as well?

I have to admit, the only usecase I evaluated Tails for might be a bit
specific: secure communication between a lawyer friend of mine and some
of his clients. he thought about giving them Tails on a usb-stick
preconfigured with pgp and otr messaging. obviously working with
documents that will deanonymise you is needed in this case. probably a
clean separation between the communication layer and the workspace
using a preconfigured whonix environment will be a approach more suited
for this usecase. thankfully computers are a lot less expensive these
days..

anyways, thanks for clarification and the effort you put into Tails -
very much appreciated!

cheers,
jasper


signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-22 Thread Jasper

 In other words: how hard should we push for adding support for the
 TrueCrypt on-disk format in udisks and friends? (Until 15 minutes ago,
 I was convinced that it was the way to go, and prepared to go ping the
 right folks about it, but now you've planted some non-negligible
 amount of doubt in my mind, so I'm a bit lost in terms of strategy.)

if you want to ease your mind, all information needed regarding both
on-disk formats are to be found in the cryptsetup wiki[1][2]. in short:
on most systems LUKS with default settings offers a bit better
protection against brute force/dictionary attacks on low entropy
passphrases. the main difference is TrueCrypt fancying obscurity while
LUKS is providing an unencrypted header. other than that its just a
different combination of well known crypto - its the implementation
that matters, the format itself seems alright. more certainty after the
results of a complete crypto audit will finally be available this
spring[3]

regarding dbus calls to udisks for TrueCrypt support via cryptsetup:
imho this doesn't help too much unless your aim is to stall development
in userspace even further. from the remains of TrueCrypt another
slightly different on-disk format has been established already
(VeraCrypt, support will be in cryptsetup 1.7) more interesting are
developments like TOTP authentication.[4] recreating the cryptsetup api
on top of dbus/udisks is of course possible .. a much more flexible
approach would be controlled access to the device mapper from userspace
(see [5] and the linked discussion from dm-devel) since udisks and
device mapper are very close friends at redhat I'd be eager to hear the
pong to your ping - this is not rhetorical either ;)

cheers,
jasper

[1]https://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions
[2]https://code.google.com/p/cryptsetup/wiki/TrueCryptOnDiskFormat
[3]https://cryptoservices.github.io/fde/2015/02/18/truecrypt-phase-two.html
[4]http://tools.ietf.org/html/rfc6238
[5]https://code.google.com/p/cryptsetup/issues/detail?id=208



signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-22 Thread Jasper
On Fri, 20 Mar 2015 08:35:42 +0100
intrigeri intrig...@boum.org wrote:

 Jasper wrote (19 Mar 2015 23:46:09 GMT) :
  right now you only (graphically) support luks partitions, not
  luks containers.
 
 I've not checked in Tails/Wheezy, but FYI Jessie's GNOME Disks has an
 Attach disk image function.

aye, the disk utils code is were you traditionally look for
specifications when it comes to new udisks dbus calls. never managed
to mount an encrypted file with write access though, but that might as
well be a udev config issue in debian (dont have a recent fedora vm for
testing)

whether creating a new encrypted luks image with udisks is possible
today remains a mistery until it eventually gets supported by gnome
disks. don't bother checking wheezy since it uses the abandoned
udisks-daemon as backend, jessie is running udisksd from udisks2

cheers,
jasper


signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-20 Thread intrigeri
Jasper wrote (19 Mar 2015 23:46:09 GMT) :
 right now you only (graphically) support luks partitions, not
 luks containers.

I've not checked in Tails/Wheezy, but FYI Jessie's GNOME Disks has an
Attach disk image function.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-20 Thread intrigeri
Hi,

sajolida wrote (20 Mar 2015 12:34:35 GMT) :
 I think that our long-term objective is to have people move out of
 using TrueCrypt technologies in general (be it the software, the
 volumes, or the containers).

Now you make me curious: why do you think we should get rid of the
TrueCrypt on-disk format?

(That's *not* a rhetorical question -- seriously, I've no idea.
There were issues with hidden volumes, but IIRC most of them either
don't apply in Tails, or were implementation problems more than
weaknesses in the on-disk format. I didn't look into this recently, so
it's entirely possible that I'm mistaken.)

 Our documentation was conceived as a migration path -- we provide people
 with instructions to move their data from TrueCrypt to LUKS -- and not
 as a way of going on using TrueCrypt encryption forever.

Indeed.

The way I see it, we're stuck between a rock and a hard place:

Ideally we'd like to be able to fully replace TrueCrypt volumes (I'm
assuming that I'm missing information that makes you think we should)
with something else, but nothing equivalent exists yet. Sadly, I'm not
aware of any plan (let alone serious effort) towards making this
a reality, when one takes into account the need for:

 - inter-operability (which I'm tempted to disregard as a dangerous
   way to share data with an untrusted OS, but then if we don't
   support TrueCrypt volumes at all, perhaps users who won't/can't
   fully give up proprietary software will just be forced to either
   store and share the very same data in cleartext, or to use
   something less safe than Tails)

 - hidden volumes (which may be a false promise in TrueCrypt, but
   still people want that and AFAIK there's nothing even approaching
   it, be it in terms of peer-review of existing production-quality
   implementations)

With this in mind, supporting the TrueCrypt on-disk format (even
minimally) still makes sense for the time being IMO. I doubt we'll
actively patch out the corresponding code from cryptsetup, so I take
for granted that we'll keep this support in Tails as long as
cryptsetup has it.

We had good reasons to get rid of the TrueCrypt software itself, but
no existing GUI for TrueCrypt volumes is satisfying right now, in the
context of Tails.

Now, of course a CLI-only interface isn't encouraging for Tails users
to go on using TrueCrypt volumes. This has both advantages (as
a long-term strategy, hopefully it'll encourage people to either fully
replace TrueCrypt volumes with a better design), and drawbacks (until
our fancy long-term plans are made real by $someone $some_day, Tails
users have the choice between using something we claim we don't really
support, with poor usability, and doing something even worse).

So, the question I'm coming to is: assuming there *was* satisfying GUI
support for the TrueCrypt on-disk format (in GNOME Disks, Nautilus,
etc.), would we want to explicitly support that, or still depict it as
a suboptimal feature, and call it unsupported because we think it
should ideally be replaced by something else on the long term?

In other words: how hard should we push for adding support for the
TrueCrypt on-disk format in udisks and friends? (Until 15 minutes ago,
I was convinced that it was the way to go, and prepared to go ping the
right folks about it, but now you've planted some non-negligible
amount of doubt in my mind, so I'm a bit lost in terms of strategy.)

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-20 Thread sajolida
intrigeri:
 Jasper wrote (19 Mar 2015 23:46:09 GMT) :
 right now you only (graphically) support luks partitions, not
 luks containers.
 
 I've not checked in Tails/Wheezy, but FYI Jessie's GNOME Disks has an
 Attach disk image function.

Thanks for sharing your concerns regarding partitions vs containers. I
think that they make a lot of sense and I didn't think about that in
this way before.

Still, I would need to mature that idea in my head before being sure
that this is a desirable feature in the context of Tails.

Because, for example, using containers imply have other unencrypted data
on the same partition, right? So that would probably encourage mixing up
data from different identities on the same disk. Then this data would be
equally available to Tails (and its possible targeted attacks) and could
deanonymise you. Of course, you can also do that with LUKS partitions...
but what I want to say is that your idea that containers makes it easier
to manipulate encrypted files for the user might actually make things
more complicated conceptually in the context of Tails.

-- 
sajolida

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-20 Thread sajolida


intrigeri:
 Hi,
 
 sajolida wrote (10 Mar 2015 16:08:41 GMT) :
 We had been trying to get rid of TrueCrypt for many reasons and for
 years before we actually managed to do so in Tails 1.2.1. So I'm pretty
 sure that we don't want to make it easier for people to go on
 using it.
 
 I think you're mixing up using the TrueCrypt software and using
 TrueCrypt volumes. Let's clarify.

I didn't miss that but I probably explained myself not clearly enough. I
think that our long-term objective is to have people move out of using
TrueCrypt technologies in general (be it the software, the volumes, or
the containers).

Our documentation was conceived as a migration path -- we provide people
with instructions to move their data from TrueCrypt to LUKS -- and not
as a way of going on using TrueCrypt encryption forever. That's why I
think that having a graphical interface to do that is counterproductive;
or at least we shouldn't put effort into it ourselves.

-- 
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-19 Thread Jasper
sorry, intented to drop in on irc for a while, but being a bit busy atm.
spot on with the clarification between the TrueCrypt application and the
encryption format, let me in turn clarify the difference between
encrypted partitions and encrypted containers

tltr:
partions put another level of abstraction between user and use case - a
difficulty that a vast majority of the users wont be able to handle
unless you provide first class (graphical) support .. see the evolution
of installers for linux distros as an example: partitioning is so much
easier nowadays but it is still the main hurdle for people to give
linux a try. most users dont fully understand partitions and are afraid
to break things

from the users perspective, the TrueCrypt format is similar to FAT32 -
probably the worst of all widespread disk encryption formats (especially
if you dont use keyslots) but also the only one thats accessible from
windows, osx and linux alike. odds are this wont change anytime soon.
regular users wont be able to use TrueCrypt containers/partitions
without a GUI - your documentation on how to use containers on the
command line is fine, but only for the ~5% of users that have to
confidence to actually use the command line

while I share your concerns about alienating users with too many
different GUIs, right now you only (graphically) support luks
partitions, not luks containers. what probably adds to the confusion is
that the TrueCrypt format is rarely used with partitions (although you
can do that as well) but mostly with containers. the name might sound a
bit more general but luckyluks is only about luks containers - since
luks partitions are already covered eg by udisks2/gnome disks

advantages of encrypted containers:
- No need to deal with partition table wizardry when creating an
encrypted container, you basically create a file on a harddrive, it
doesn't matter if its an internal one or an external usbstick etc..
- Backup is straightforward as well, just copy the file somewhere else
- sharing confidential information: again, copy the container
file. similar to gpg encrypted archives but easier to handle:
unlock/view or modify data/lock again
- You can easily add some encrypted private data to an unencrypted
external harddrive without repartitioning
- Lots of users are already quite familiar with all this, because
their first touch with data encryption has been TrueCrypt which uses
the encrypted container approach

advantages of encrypted partitions:
- partition tables can be scanned automatically, so integration into
automounting tools can be possible

there is support for encrypted (luks, encfs) partitions in automounting
tools because it is straightforward to implement. unfortunately with
encrypted containers/partitons using the TrueCrypt format this is not
possible. they can only be verified as such if you successfully open
them with your password. btw, that would probably be the answer if
somebody from the udisks team finally finds some time to respond to the
bugreport from 2013 you've been referring to

hope you dont feel like I want to sell you a tool just because I put a
bit of effort into writing it ;) if I'd like to promote anything it is
the reduced complexity that encrypted containers offer for casual
users. maybe give it a thought - happy to discuss things

cheers,
jasper

On Thu, 19 Mar 2015 19:48:15 +0100
intrigeri intrig...@boum.org wrote:

 Hi,
 
 sajolida wrote (10 Mar 2015 16:08:41 GMT) :
  We had been trying to get rid of TrueCrypt for many reasons and for
  years before we actually managed to do so in Tails 1.2.1. So I'm
  pretty sure that we don't want to make it easier for people to go on
  using it.
 
 I think you're mixing up using the TrueCrypt software and using
 TrueCrypt volumes. Let's clarify.
 
 We stopped shipping the TrueCrypt software for good reasons, but we
 still support TrueCrypt volumes (as you know, since you wrote part of
 the documentation). For interoperability purposes (not mentioning the
 hidden volume feature, which I'm less sure about), IMO it would be
 good to support such volumes graphically.
 
 Now, introducing yet another frontend would feel inconsistent IMO
 (especially one that also supports LUKS, that we already have good
 support for) = I believe the needed support should be added to
 udisks first (that's #6337), so that GNOME Disks can support it as
 well some day, in the very same interface as LUKS :)
 
 Cheers,



signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-19 Thread intrigeri
Hi,

sajolida wrote (10 Mar 2015 16:08:41 GMT) :
 We had been trying to get rid of TrueCrypt for many reasons and for
 years before we actually managed to do so in Tails 1.2.1. So I'm pretty
 sure that we don't want to make it easier for people to go on
 using it.

I think you're mixing up using the TrueCrypt software and using
TrueCrypt volumes. Let's clarify.

We stopped shipping the TrueCrypt software for good reasons, but we
still support TrueCrypt volumes (as you know, since you wrote part of
the documentation). For interoperability purposes (not mentioning the
hidden volume feature, which I'm less sure about), IMO it would be
good to support such volumes graphically.

Now, introducing yet another frontend would feel inconsistent IMO
(especially one that also supports LUKS, that we already have good
support for) = I believe the needed support should be added to
udisks first (that's #6337), so that GNOME Disks can support it as
well some day, in the very same interface as LUKS :)

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] GUI for encrypted volumes from LUKS/TrueCrypt container files

2015-03-10 Thread sajolida
Jasper:
 hello everyone,

Hi Jasper,

 I'm the developer of a little graphical application that helps with
 creating and using LUKS and TrueCrypt container files called luckyLUKS.
 It was brought to life to offer an equivalent to the Windows TrueCrypt
 application for some friends that are not too keen on using the command
 line. luckyLUKS follows a keep-it-simple philosophy that aims to keep
 users from shooting themselves in the foot when typing commands with
 administrative privileges. You can find more information and a little
 screencast on the homepage: https://github.com/jas-per/luckyLUKS

Thanks for the link and for the proposal.

We had been trying to get rid of TrueCrypt for many reasons and for
years before we actually managed to do so in Tails 1.2.1. So I'm pretty
sure that we don't want to make it easier for people to go on using it.

And, for LUKS devices, we are happy with the GUI interface offered by
GNOME Disks.

 I'm also looking for a sponsor to get the application into Debian,
 would be great if you could help finding a debian developer who might
 be interested. I'd like to maintain the package myself so hopefully
 there wont be too much work involved:
 https://mentors.debian.net/package/luckyluks
 Reviews welcome!

I'm not so much into Debian myself, so I'll let others answer this part.

-- 
sajolida

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.