From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] nuke password to delete luks header
Date: Tue, 14 Jan 2014 15:34:03 +0100 [thread overview]
Message-ID: <20140114143403.GA22711@tansi.org> (raw)
In-Reply-To: <CAFnMBaTnugEuOSt9Fwi-SZCye2g4Pa5_5=dt9WkuWcV7=4w9yw@mail.gmail.com>
On Tue, Jan 14, 2014 at 13:05:32 CET, .. ink .. wrote:
[...]
> > No, if you crypto-blank it, it will not. But you need to protect
> > the additional container against overwriting in some way. One
> > way is to not write the outer container at all. This is obvious,
> > as it is going to be either old and not written for a long time
> > or brand-new, i.e. container has been creatded for the border-
> > crossing. The way TC does it by preventing writes to that
> > area is likely to leacve traces of the failed writes.
> >
> >
> Its possible to use the first volume normally without harming the hidden
> one by not filling up the out volume
> to near capacity.If you dont cross past 30% volume utilization of the outer
> volume,then the hidden volume will be
> safe.This assumes using a proper file system and fat seem to be the best
> one to use since its the most advanced
> among the simplest file systems.
While I have not looked at it for some time, the last time I looked,
FAT did a create-at-end Strategy. This way the data "wanders" over
the partition towrds the end. ext2/3/4 will create files all over
the disk in the first place.
> The scenario i am working with says something like this,you are at a border
> cross with a external hard drive and there are 10 other people with
> external hard drives and there is a government agent who is tasked with
> examining external hard drives.What he may do is ask everybody to put their
> hard drives in a bucket and he may go through them one by one.He will take
> one,plug it in to a computer and look into it by doing file searches,then
> go to the next one and do the same.If they reach yours,plug it in and get a
> LUKS prompt,then they will call you up and ask you to open it,they will
> probably be annoyed at you for slowing them down too.Once there,bringing up
> the fifth amendment to the constitution or any other privacy related
> explanation will probably not do you any good.The more you delay them,the
> more they will be unhappy with you and the more unpleasant they will be.
>
> If they have no reason to suspect you have an encrypted volume hidden at
> the back of a regular file system,they will not look for it or ask you
> about it and will just go past your hard drive uneventfully,the only time
> they will examine your hard drive forensically is if you are already at the
> backroom being interrogated while your possessions are being closely
> scrutinized and they will do this most likely because they already know who
> you are and what you could be carrying and you did something stupid to draw
> suspicion to your hard drive.
>
> If asked if the drive has a hidden volume,you could then answer "yes" and
> proceed to do what you would have done if asked to unlock a LUKS volume or
> any other encrypted volume.
Well, if you are willing to give up a hidden volume, that would
work, I guess.
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
There are two ways of constructing a software design: One way is to make it
so simple that there are obviously no deficiencies, and the other way is to
make it so complicated that there are no obvious deficiencies. The first
method is far more difficult. --Tony Hoare
next prev parent reply other threads:[~2014-01-14 14:34 UTC|newest]
Thread overview: 71+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-01-14 2:10 [dm-crypt] nuke password to delete luks header Jim O'Gorman
2014-01-14 2:41 ` .. ink ..
2014-01-14 2:52 ` Jim O'Gorman
2014-01-14 4:04 ` .. ink ..
2014-01-14 4:36 ` Arno Wagner
2014-01-14 5:00 ` .. ink ..
2014-01-14 7:11 ` Arno Wagner
2014-01-14 12:05 ` .. ink ..
2014-01-14 14:34 ` Arno Wagner [this message]
2014-01-14 19:22 ` .. ink ..
2014-01-15 19:36 ` Milan Broz
2014-01-16 11:50 ` Arno Wagner
2014-01-14 4:30 ` Arno Wagner
2014-01-14 5:01 ` Jim O'Gorman
2014-01-14 7:39 ` [dm-crypt] Re2: " Arno Wagner
2014-01-14 22:42 ` Jonas Meurer
2014-01-15 6:01 ` Arno Wagner
2014-01-15 10:00 ` Jonas Meurer
2014-01-15 10:47 ` Arno Wagner
2014-01-15 11:39 ` Matthias Schniedermeyer
2014-01-15 12:40 ` Arno Wagner
2014-01-15 12:59 ` Matthias Schniedermeyer
2014-01-15 13:38 ` .. ink ..
2014-01-15 20:27 ` [dm-crypt] " Milan Broz
2014-01-16 9:50 ` Ondrej Kozina
2014-01-16 10:30 ` Thomas Bastiani
2014-01-16 13:09 ` Florian Junghanns
2014-01-16 19:33 ` Milan Broz
2014-01-16 20:09 ` helices
2014-01-16 20:11 ` Iggy
2014-01-16 21:36 ` Matthias Schniedermeyer
2014-01-16 21:55 ` Arno Wagner
2014-01-16 22:49 ` Claudio Moretti
2014-01-17 8:17 ` Thomas Bastiani
2014-01-17 23:18 ` Claudio Moretti
2014-01-18 8:43 ` Arno Wagner
2014-01-18 12:42 ` Claudio Moretti
2014-01-18 19:18 ` Arno Wagner
2014-01-16 20:18 ` Matthias Schniedermeyer
2014-01-16 20:28 ` .. ink ..
2014-01-16 21:02 ` Brian
2014-01-16 21:24 ` Arno Wagner
2014-01-16 20:59 ` Milan Broz
2014-01-16 21:43 ` Arno Wagner
2014-01-17 12:43 ` Jonas Meurer
2014-01-17 13:12 ` Arno Wagner
2014-01-17 14:27 ` Jonas Meurer
2014-01-17 15:16 ` Matthias Schniedermeyer
2014-01-17 14:32 ` Rick Moritz
2014-01-17 14:32 ` Jonas Meurer
2014-01-17 14:57 ` Arno Wagner
2014-01-17 14:51 ` Heiko Rosemann
2014-01-17 15:10 ` Arno Wagner
2014-01-16 12:01 ` Arno Wagner
2014-01-16 11:59 ` Arno Wagner
2014-01-21 22:40 ` Jonas
2014-01-23 21:26 ` Milan Broz
2014-01-23 22:11 ` .. ink ..
2014-01-23 22:30 ` Milan Broz
2014-01-23 23:43 ` Arno Wagner
2014-01-27 9:04 ` Jonas Meurer
2014-01-27 12:44 ` Arno Wagner
2014-01-27 20:30 ` Milan Broz
2014-01-28 10:28 ` Jonas Meurer
-- strict thread matches above, loose matches on Subject: below --
2014-01-06 21:01 R3s1stanc3
2014-01-06 21:39 ` Heinz Diehl
2014-01-06 21:44 ` R3s1stanc3
2014-01-06 23:33 ` Claudio Moretti
2014-01-06 23:38 ` R3s1stanc3
2014-01-07 0:03 ` Arno Wagner
2014-01-07 0:01 ` Arno Wagner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140114143403.GA22711@tansi.org \
--to=arno@wagner.name \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.