mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-13 11:50:10 +01:00
synced with wiki
This commit is contained in:
78
FAQ
78
FAQ
@@ -37,6 +37,11 @@ A. Contributors
|
|||||||
such a disaster! In particular, make sure you have a current header
|
such a disaster! In particular, make sure you have a current header
|
||||||
backup before doing any potentially dangerous operations.
|
backup before doing any potentially dangerous operations.
|
||||||
|
|
||||||
|
SSDs/FLASH DRIVES: SSDs and Flash are different. Currently it is
|
||||||
|
unclear how to get LUKS or plain dm-crypt to run on them with the
|
||||||
|
full set of security features intact. This may or may not be a
|
||||||
|
problem, depending on the attacher model. See Section 5.17.
|
||||||
|
|
||||||
BACKUP: Yes, encrypted disks die, just as normal ones do. A full
|
BACKUP: Yes, encrypted disks die, just as normal ones do. A full
|
||||||
backup is mandatory, see Section "6. Backup and Data Recovery" on
|
backup is mandatory, see Section "6. Backup and Data Recovery" on
|
||||||
options for doing encrypted backup.
|
options for doing encrypted backup.
|
||||||
@@ -98,7 +103,7 @@ A. Contributors
|
|||||||
This issue has been acknowledged by the Ubuntu dev team, see here:
|
This issue has been acknowledged by the Ubuntu dev team, see here:
|
||||||
http://launchpad.net/bugs/420080
|
http://launchpad.net/bugs/420080
|
||||||
|
|
||||||
Update 7/2012: I am unsure whether this has been fixed bu now, best
|
Update 7/2012: I am unsure whether this has been fixed by now, best
|
||||||
be careful.
|
be careful.
|
||||||
|
|
||||||
|
|
||||||
@@ -183,6 +188,10 @@ A. Contributors
|
|||||||
|
|
||||||
* 2.1 What is the difference between "plain" and LUKS format?
|
* 2.1 What is the difference between "plain" and LUKS format?
|
||||||
|
|
||||||
|
First, unless you happen to understand the cryptographic background
|
||||||
|
well, you should use LUKS. It does protect the user from a lot of
|
||||||
|
common mistakes. Plain dm-crypt is for experts.
|
||||||
|
|
||||||
Plain format is just that: It has no metadata on disk, reads all
|
Plain format is just that: It has no metadata on disk, reads all
|
||||||
parameters from the commandline (or the defaults), derives a
|
parameters from the commandline (or the defaults), derives a
|
||||||
master-key from the passphrase and then uses that to de-/encrypt
|
master-key from the passphrase and then uses that to de-/encrypt
|
||||||
@@ -1061,6 +1070,73 @@ A. Contributors
|
|||||||
foot, you can figure out how to do it yourself.
|
foot, you can figure out how to do it yourself.
|
||||||
|
|
||||||
|
|
||||||
|
* 5.17 What about SSDs or Flash Drives?
|
||||||
|
|
||||||
|
The problem is that you cannot reliably erase parts of these
|
||||||
|
devices, mainly due to wear-leveling and possibly defect
|
||||||
|
management.
|
||||||
|
|
||||||
|
Basically, when overwriting a sector (of 512B), what the device
|
||||||
|
does is to move an internal sector (may be 128kB or even larger) to
|
||||||
|
some pool of discarded, not-yet erased unused sectors, take a
|
||||||
|
fresh empty sector from the empty-sector pool and copy the old
|
||||||
|
sector over with the changes to the small part you wrote. This is
|
||||||
|
done in some fashion so that larger writes do not cause a lot of
|
||||||
|
small internal updates.
|
||||||
|
|
||||||
|
The thing is that the mappings between outside-adressable sectors
|
||||||
|
and inside sectors is arbitrary (and the vendors are not talking).
|
||||||
|
Also the discarded sectors are not necessarily erased immediately.
|
||||||
|
They may linger a long time.
|
||||||
|
|
||||||
|
For plain dm-crypt, the consequences are that older encrypted data
|
||||||
|
may be lying around in some internal pools of the device. Thus may
|
||||||
|
or may not be a problem and depends on the application. Remember
|
||||||
|
the same can happen with a filesystem if consecutive writes to the
|
||||||
|
same area of a file can go to different sectors.
|
||||||
|
|
||||||
|
However, for LUKS, the worst case is that key-slots and LUKS
|
||||||
|
header may end up in these internal pools. This means that password
|
||||||
|
management functionality is compromised (the old passwords may
|
||||||
|
still be around, potentially for a very long time) and that fast
|
||||||
|
erase by overwriting the header and key-slot area is insecure.
|
||||||
|
|
||||||
|
Also keep in mind that the discarded/used pool may be large. For
|
||||||
|
example, a 240GB SSD has about 16GB of spare area in the chips that
|
||||||
|
it is free to do with as it likes. You would need to make each
|
||||||
|
individual key-slot larger than that to allow reliable overwriting.
|
||||||
|
And that assumes the disk thinks all other space is in use.
|
||||||
|
Reading the internal pools using forensic tools is not that hard,
|
||||||
|
but may involve some soldering.
|
||||||
|
|
||||||
|
What to do?
|
||||||
|
|
||||||
|
If you trust the device vendor (you probably should not...) you can
|
||||||
|
try an ATA "secure erase" command for SSDs. That does not work for
|
||||||
|
USB keys though. And if it finishes after a few seconds, it was
|
||||||
|
possibly faked by the SSD.
|
||||||
|
|
||||||
|
If you can do without password management and are fine with doing
|
||||||
|
physical destruction for permenently deleting data (allways after
|
||||||
|
one or several full overwrites!), you can use plain dm-crypt or
|
||||||
|
LUKS.
|
||||||
|
|
||||||
|
If you want or need the original LUKS security features to work,
|
||||||
|
you can use a detached LUKS header and put that on a conventional,
|
||||||
|
magnetic disk. That leaves potentially old encrypted data in the
|
||||||
|
pools on the disk, but otherwise you get LUKS with the same
|
||||||
|
security as on a magnetic disk.
|
||||||
|
|
||||||
|
If you are concerned about your laptop being stolen, you are likely
|
||||||
|
fine using LUKS on an SSD. An attacker would need to have access
|
||||||
|
to an old passphrase (and the key-slot for this old passphrase
|
||||||
|
would actually need to still be somewhere in the SSD) for your
|
||||||
|
data to be at risk. So unless you pasted your old passphrase all
|
||||||
|
over the Internet or the attacker has knowledge of it from some
|
||||||
|
other source and does a targetted laptop theft to get at your
|
||||||
|
data, you should be fine.
|
||||||
|
|
||||||
|
|
||||||
6. Backup and Data Recovery
|
6. Backup and Data Recovery
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user