From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c3F6dobmqE8x for ; Thu, 1 Aug 2013 09:43:54 +0200 (CEST) Received: from mail-ee0-x234.google.com (mail-ee0-x234.google.com [IPv6:2a00:1450:4013:c00::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mail.saout.de (Postfix) with ESMTPS for ; Thu, 1 Aug 2013 09:43:53 +0200 (CEST) Received: by mail-ee0-f52.google.com with SMTP id c41so816499eek.25 for ; Thu, 01 Aug 2013 00:43:52 -0700 (PDT) Message-ID: <51FA1198.6040406@gmail.com> Date: Thu, 01 Aug 2013 09:43:20 +0200 From: Milan Broz MIME-Version: 1.0 References: <20130801003458.GA1093@tansi.org> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [dm-crypt] dm-crypt "inverted" usage (i.e. exporting an "encrypted" image of a block device) List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Ciprian Dorin Craciun Cc: dm-crypt@saout.de, ".. ink .." On 1.8.2013 9:00, Ciprian Dorin Craciun wrote: > As said, I guess this can be obtained in two ways: > * either if there is a "backward" mode for dm-crypt; (which I'm > not aware of;) No, there is not. I hope I understand your use case correctly, bu if so, this mode (transport over network) _cannot_ be secure. Imagine reply attack - anyone on the way can replace old ciphertext and you have no chance to detect it. An example of this (very simplified) attack: Imagine user removal. The tool (userdel) first reads /etc/shadow and then writes it (with user removed). Listener can e.g. revert user removal without key knowledge, he only need to detect correct packets for this transaction and replace content to previous version (so files remains unchanged). No key needed, just reply manipulation with ciphertext. Proper network encryption will detect this. If you mean this as some experiment, good (but I think it is not possible without switching encrypt/decrypt in dmcrypt code or in encryption cipher module, but will think about it more later :-) But if you mean this seriously - do not do it. Use encrypted connection (ipsec/vpn/ssh tunnel whatever). Only these tools are designed for newtork connection protection. BTW I use this as a classic example of misuse of FDE... http://mbroz.fedorapeople.org/talks/DevConf2012/img8.jpg Milan