All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] nuke password to delete luks header
@ 2014-01-06 21:01 R3s1stanc3
  2014-01-06 21:39 ` Heinz Diehl
  2014-01-07  0:01 ` Arno Wagner
  0 siblings, 2 replies; 62+ messages in thread
From: R3s1stanc3 @ 2014-01-06 21:01 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 1244 bytes --]


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi
today I read this post by the developers of Kali Linux:
http://www.kali.org/how-to/emergency-self-destruction-luks-kali/

I think, this is a really great feature and should be officially added
to the cryptsetup source.
So I wrote Milan and he told me, that there would be no additional
security, because an "attacker will simple first backup header and then
use this (or will use key from memory if device is mounted)."
He also told me to move the discussion to the mailinglist and if we
would find some valuable use case, they would think about it.
So now I'm here
In my opinion, a valuable use case would be the following case:
If you got the possibility to access your computer for a few seconds,
before an attacker does, you simply could enter your nuke password and
delete the luks header. This would be much faster, than entering your
real password, booting your system and deleting the header, using the
system's tools

Are there any other ideas of valuable use cases?

greets R3s1stanc3
-----BEGIN PGP SIGNATURE-----

iF4EAREKAAYFAlLLGcQACgkQUaCkMJCt6r7pMAD/ahtaUWTCmuw4Q8QwdlpD/dZM
SSDgTw2U/fM6mZH618AA/0MuHeitb94r+mNVFniPBiKVz53ZtoguFXnXsczx7Qs4
=f/OJ
-----END PGP SIGNATURE-----


[-- Attachment #2: 0xDBCB4A0A.asc --]
[-- Type: application/pgp-keys, Size: 21034 bytes --]

[-- Attachment #3: 0xDBCB4A0A.asc.sig --]
[-- Type: application/pgp-signature, Size: 96 bytes --]

^ permalink raw reply	[flat|nested] 62+ messages in thread
* Re: [dm-crypt] nuke password to delete luks header
@ 2014-01-14  2:10 Jim O'Gorman
  2014-01-14  2:41 ` .. ink ..
  0 siblings, 1 reply; 62+ messages in thread
From: Jim O'Gorman @ 2014-01-14  2:10 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 2891 bytes --]

> Hi
> today I read this post by the developers of Kali Linux:
> http://www.kali.org/how-to/emergency-self-destruction-luks-kali/
...
> Are there any other ideas of valuable use cases?
>
> greets R3s1stanc3

Hi there! We were just pointed to this discussion so thought we would chime in.

The practical application of this functionality is real for us. This is not an academic issue for us, as we will often travel in the real world with large amounts of encrypted data to areas where high speed internet is not accessible. Please check a common use case we deploy very often, that we documented at http://www.kali.org/how-to/nuke-kali-linux-luks/

In that, we mention:

> Our main purpose for introducing this feature in Kali Linux is to simplify the process of securely traveling with confidential client information. While “LUKS Nuking” your drive will result in an inaccessible disk, it is possible to backup your keyslots beforehand and restore them after the fact. What this allows us to do is to “brick” our sensitive laptops before any travel, separate ourselves from the restoration keys (which we encrypt), and then “restore” them to the machines once back in a safe location. This way, if our hardware is lost or otherwise accessed midway through our travels, no one is able to restore the data on it, including ourselves.
>
> There are other ways to delete your keyslots, however the advantage of the Nuke option is it is quick, easy, and does not require you to fully login to your Kali installation. If you maintain a backup of your header, you can Nuke the keyslots whenever you feel uncomfortable. Then conduct a restoration when you feel secure.

This situation is very common for us in situations where systems may be inspected by parties that may not be friendly to us. Border crossings are a common example of this.

I am not a big believer in the concept of providing the nuke password to this unfriendly third party, but more of using it yourself without having to fully log into the system (with the assumption that you travel with the systems fully powered off). The Nuke option, for us makes this process of deleting the keys quick, simple, and error proof. Having the ability to restore the data later on makes this practical to do on a regular basis. 

Additionally it is important to be realistic about who your adversary is. Is it really a nation state? Or is it simply a customs agent? We don't think its practical to cover all threats with a function like this, and we don't believe that "if you can't do it all, its better to do nothing". Remember, that in most cases when you can't/won't give up an encryption password in the US the hardware is simply taken from you. You don't go right to jail unless there is other suspicion to justify incarceration. 

Thanks everyone!
-- 
Jim O'Gorman
jim@offensive-security.com


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 710 bytes --]

^ permalink raw reply	[flat|nested] 62+ messages in thread

end of thread, other threads:[~2014-01-28 10:31 UTC | newest]

Thread overview: 62+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-01-06 21:01 [dm-crypt] nuke password to delete luks header R3s1stanc3
2014-01-06 21:39 ` Heinz Diehl
2014-01-06 21:44   ` R3s1stanc3
2014-01-06 23:33     ` Claudio Moretti
2014-01-06 23:38       ` R3s1stanc3
2014-01-07  0:03     ` Arno Wagner
2014-01-07  0:01 ` Arno Wagner
  -- strict thread matches above, loose matches on Subject: below --
2014-01-14  2:10 Jim O'Gorman
2014-01-14  2:41 ` .. ink ..
2014-01-14  2:52   ` Jim O'Gorman
2014-01-14  4:04     ` .. ink ..
2014-01-14  4:36       ` Arno Wagner
2014-01-14  5:00         ` .. ink ..
2014-01-14  7:11           ` Arno Wagner
2014-01-14 12:05             ` .. ink ..
2014-01-14 14:34               ` Arno Wagner
2014-01-14 19:22                 ` .. ink ..
2014-01-15 19:36                   ` Milan Broz
2014-01-16 11:50                     ` Arno Wagner
2014-01-14  4:30     ` Arno Wagner
2014-01-14  5:01       ` Jim O'Gorman
2014-01-15 20:27       ` Milan Broz
2014-01-16  9:50         ` Ondrej Kozina
2014-01-16 10:30           ` Thomas Bastiani
2014-01-16 13:09             ` Florian Junghanns
2014-01-16 19:33             ` Milan Broz
2014-01-16 20:09               ` helices
2014-01-16 20:11               ` Iggy
2014-01-16 21:36                 ` Matthias Schniedermeyer
2014-01-16 21:55                   ` Arno Wagner
2014-01-16 22:49                     ` Claudio Moretti
2014-01-17  8:17                       ` Thomas Bastiani
2014-01-17 23:18                         ` Claudio Moretti
2014-01-18  8:43                           ` Arno Wagner
2014-01-18 12:42                             ` Claudio Moretti
2014-01-18 19:18                               ` Arno Wagner
2014-01-16 20:18               ` Matthias Schniedermeyer
2014-01-16 20:28                 ` .. ink ..
2014-01-16 21:02                   ` Brian
2014-01-16 21:24                   ` Arno Wagner
2014-01-16 20:59                 ` Milan Broz
2014-01-16 21:43                   ` Arno Wagner
2014-01-17 12:43                 ` Jonas Meurer
2014-01-17 13:12                   ` Arno Wagner
2014-01-17 14:27                     ` Jonas Meurer
2014-01-17 15:16                       ` Matthias Schniedermeyer
2014-01-17 14:32                     ` Rick Moritz
2014-01-17 14:32                     ` Jonas Meurer
2014-01-17 14:57                       ` Arno Wagner
2014-01-17 14:51                     ` Heiko Rosemann
2014-01-17 15:10                       ` Arno Wagner
2014-01-16 12:01           ` Arno Wagner
2014-01-16 11:59         ` Arno Wagner
2014-01-21 22:40         ` Jonas
2014-01-23 21:26           ` Milan Broz
2014-01-23 22:11             ` .. ink ..
2014-01-23 22:30               ` Milan Broz
2014-01-23 23:43             ` Arno Wagner
2014-01-27  9:04             ` Jonas Meurer
2014-01-27 12:44               ` Arno Wagner
2014-01-27 20:30               ` Milan Broz
2014-01-28 10:28                 ` Jonas Meurer

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.