From: Florian Junghanns <florian.junghanns@gmail.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] nuke password to delete luks header
Date: Thu, 16 Jan 2014 14:09:49 +0100 [thread overview]
Message-ID: <52D7DA1D.2070309@gmail.com> (raw)
In-Reply-To: <CAEherqDu9ufycoVtbj_a+n=aNrJ9JkLb8rS075td28=WrDGoPw@mail.gmail.com>
On 01/16/2014 11:30 AM, Thomas Bastiani wrote:
> Hi guys,
>
> I've been following this discussion for a few days. And I feel like giving
> my opinion... :-)
Hello everyone,
I'm feeling the same way as Thomas does. Please see below for my
explanation and proposal.
>
> On 16 January 2014 09:50, Ondrej Kozina <okozina@redhat.com> wrote:
>
>> On 01/15/2014 09:27 PM, Milan Broz wrote:
>>
[...]
>>
>> But what I really want to avoid is that every distribution will
>>> add some random patches implementing something like this.
>>>
>>> It is perhaps better to implement and document this upstream.
>>>
>>
> I would argue that it's really independent from any actual crypto logic.
> The only thing that need's to be done is wrap the password/key prompt and
> check the password against a known salted hash or PBKDF (same as all Linux
> distros do). Then "nuking" the container is actually quite simple. Just
> erase the LUKS header by zeroing it. This is not any more complex than what
> distros already have to do to support root-on-LUKS.
>
> Actually this functionality is simple enough that anyone actually wanting
> it can just write their own password prompt wrapper script.
>
> I would point out that this doesn't require any more information from LUKS
> internals than mouting a block device from /etc/crypttab would. And so it's
> entirely possible to keep the code layered and simple. KISS applies.
>
> Moreover, I think it's wrong to assume that distros don't share any of
> their code. Proof is, they fork each other. It wouldn't have to be
> implemented a dozen times.
>
It is my opinion as well that this should be solved by external wrappers
of the Linux distribution used. Also, I do not see how this is a
different area than e.g. caching the passphrase for mounting multiple
encrypted volumes on boot, a functionality that is provided e.g. by the
Debian distribution (not by dm-crypt). The functionality to make the
LUKS header unusable is provided by the 'dd' command with correct
parameters. IFF you want to provide the functionality of making the LUKS
header unusable via dm-crypt, I believe the *addition of a 'force' flag
to luksHeaderRestore* in order to enable a file that is not a LUKS
header backup file to be used as source is more sensible, e.g.
*'cryptsetup luksHeaderRestore /dev/sda1 -f
--header-backup-file=/dev/zero'*. This is a clear maintenance operation
which is - in my opinion - a saner solution than adding this very
unusual 'nuke' functionality. If you're still going to implement it, I
strongly feel it should be called something like 'destroy' instead of
'nuke'. Even better would be 'overwrite' or 'disable', since - as
discussed before - on e.g. SSD drives this does not necessarily 'nuke'
the header rather than 'displace'/'unlink' it from the former position
in the block register.
As already indicated above, I feel that this is a maintenance operation.
Without putting yourself in danger, there are two use cases when you
will want to 'nuke' your header. The one is before you depart from your
original location. Then you have your device booted and can use the
normal system tools ('dd', or - if the -f flag is implemented -
luksHeaderRestore) to disable the LUKS header. The other situation is
that you are short on time and cannot manage to boot your device without
e.g. missing your flight. In that case, you need the option to disable
the header without actually booting the device. This however is not the
core functionality and responsibility of dm-crypt but rather of the
distribution in use which can do this with a wrapper script just like
Debian does already for caching passphrases.
Any other use case I can think of is - as discussed to some extent in
the last few days - either stupid or heavily endangering yourself or
both. It is not the task of dm-crypt to enable people to do such things.
Best regards,
Florian
next prev parent reply other threads:[~2014-01-16 13:10 UTC|newest]
Thread overview: 71+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-01-14 2:10 [dm-crypt] nuke password to delete luks header Jim O'Gorman
2014-01-14 2:41 ` .. ink ..
2014-01-14 2:52 ` Jim O'Gorman
2014-01-14 4:04 ` .. ink ..
2014-01-14 4:36 ` Arno Wagner
2014-01-14 5:00 ` .. ink ..
2014-01-14 7:11 ` Arno Wagner
2014-01-14 12:05 ` .. ink ..
2014-01-14 14:34 ` Arno Wagner
2014-01-14 19:22 ` .. ink ..
2014-01-15 19:36 ` Milan Broz
2014-01-16 11:50 ` Arno Wagner
2014-01-14 4:30 ` Arno Wagner
2014-01-14 5:01 ` Jim O'Gorman
2014-01-14 7:39 ` [dm-crypt] Re2: " Arno Wagner
2014-01-14 22:42 ` Jonas Meurer
2014-01-15 6:01 ` Arno Wagner
2014-01-15 10:00 ` Jonas Meurer
2014-01-15 10:47 ` Arno Wagner
2014-01-15 11:39 ` Matthias Schniedermeyer
2014-01-15 12:40 ` Arno Wagner
2014-01-15 12:59 ` Matthias Schniedermeyer
2014-01-15 13:38 ` .. ink ..
2014-01-15 20:27 ` [dm-crypt] " Milan Broz
2014-01-16 9:50 ` Ondrej Kozina
2014-01-16 10:30 ` Thomas Bastiani
2014-01-16 13:09 ` Florian Junghanns [this message]
2014-01-16 19:33 ` Milan Broz
2014-01-16 20:09 ` helices
2014-01-16 20:11 ` Iggy
2014-01-16 21:36 ` Matthias Schniedermeyer
2014-01-16 21:55 ` Arno Wagner
2014-01-16 22:49 ` Claudio Moretti
2014-01-17 8:17 ` Thomas Bastiani
2014-01-17 23:18 ` Claudio Moretti
2014-01-18 8:43 ` Arno Wagner
2014-01-18 12:42 ` Claudio Moretti
2014-01-18 19:18 ` Arno Wagner
2014-01-16 20:18 ` Matthias Schniedermeyer
2014-01-16 20:28 ` .. ink ..
2014-01-16 21:02 ` Brian
2014-01-16 21:24 ` Arno Wagner
2014-01-16 20:59 ` Milan Broz
2014-01-16 21:43 ` Arno Wagner
2014-01-17 12:43 ` Jonas Meurer
2014-01-17 13:12 ` Arno Wagner
2014-01-17 14:27 ` Jonas Meurer
2014-01-17 15:16 ` Matthias Schniedermeyer
2014-01-17 14:32 ` Rick Moritz
2014-01-17 14:32 ` Jonas Meurer
2014-01-17 14:57 ` Arno Wagner
2014-01-17 14:51 ` Heiko Rosemann
2014-01-17 15:10 ` Arno Wagner
2014-01-16 12:01 ` Arno Wagner
2014-01-16 11:59 ` Arno Wagner
2014-01-21 22:40 ` Jonas
2014-01-23 21:26 ` Milan Broz
2014-01-23 22:11 ` .. ink ..
2014-01-23 22:30 ` Milan Broz
2014-01-23 23:43 ` Arno Wagner
2014-01-27 9:04 ` Jonas Meurer
2014-01-27 12:44 ` Arno Wagner
2014-01-27 20:30 ` Milan Broz
2014-01-28 10:28 ` Jonas Meurer
-- strict thread matches above, loose matches on Subject: below --
2014-01-06 21:01 R3s1stanc3
2014-01-06 21:39 ` Heinz Diehl
2014-01-06 21:44 ` R3s1stanc3
2014-01-06 23:33 ` Claudio Moretti
2014-01-06 23:38 ` R3s1stanc3
2014-01-07 0:03 ` Arno Wagner
2014-01-07 0:01 ` Arno Wagner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=52D7DA1D.2070309@gmail.com \
--to=florian.junghanns@gmail.com \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.