From: freeman.zhang1992@gmail.com (Freeman Zhang)
To: kernelnewbies@lists.kernelnewbies.org
Subject: [Help] How to Replace File Operations in File System?
Date: Mon, 24 Feb 2014 09:52:13 +0800 [thread overview]
Message-ID: <530AA5CD.4060601@gmail.com> (raw)
In-Reply-To: <52206.1392910334@turing-police.cc.vt.edu>
Hi,
Sorry about the delayed response. To be frank, I haven't think over
these stuff
seriously. I didn't expect too much about the module at first. Now I
know I was
wrong. I shouldn't get through it rashly-people are watching on me!
And I believe I can make it with the help and advice I got from all of
you.
Thank you!
> The first question is - what are you trying to protect against? The
> answer to that will influence your design.
>
> As Bruce Schneier said in the intro to Applied Cryptography:
>
> There are two kinds of cryptography in this world: cryptography that will stop
> your kid sister from reading your files, and cryptography that will stop major
> governments from reading your files. This book is about the latter.
>
> It's one thing to write a silly kernel module that will rot13 your
> files. It's totally another to design a complete system that works.
>
> Do you need to worry about a directory being open for access to encrypted
> files, and another rogue process on the system simply going and reading
> the files and the crypto doesn't matter? (This is an issue for cryptLUKS,
> for instance - it defends against somebody stealing a powered-off laptop,
> but not against processes that get access to a running system. You may wish
> to think for a bit about what security is provided by a system that is
> suspended, rather than powered off - particularly in the case of
> cold-boot attacks....)
>
> Do you need to worry about somebody replacing the binary that prompts
> the user for the passphrase before loading it into the kernel, with a
> version that saves the passphrase for later, after the device has been
> "recovered" via theft or similar? (And yes, this *has* been used before,
> see 'FBI v Scarfo', where they installed a keylogger to snag a PGP passphrase:
>
> https://epic.org/crypto/scarfo.html
>
> Do you need to worry about other more generic keystroke loggers?
>
> Do you need to worry about the fact that most user passphrases won't
> have enough entropy to be used directly as crypto keys? If you merely
> use the passphrase for salting a randomized key (such as the way gpg,
> ssh, and cryptLUKS use your passphrase), how do you address the problem
> of insufficient random entropy at key generation time?
>
> That's just the obvious stuff you will need to worry about. :)
>
Regards
Freeman Zhang
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20140224/a55c2815/attachment-0001.html
next prev parent reply other threads:[~2014-02-24 1:52 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-02-13 2:10 [Help] How to Replace File Operations in File System? freeman
2014-02-13 6:44 ` Abhijit Chandrakant Pawar
2014-02-13 6:59 ` Saket Sinha
2014-02-13 11:47 ` Rishi Agrawal
2014-02-13 13:28 ` freeman
2014-02-17 8:06 ` Rishi Agrawal
2014-02-18 4:34 ` freeman
[not found] ` <CADDndfPhe=iHKtB0_eTYpoAAUJDTkOchUakbOyKveVdkAOLrMQ@mail.gmail.com>
2014-02-20 1:32 ` freeman
2014-02-20 7:31 ` Rishi Agrawal
2014-02-20 8:57 ` freeman
2014-02-20 9:10 ` SandeepKsinha
2014-02-20 9:48 ` freeman
2014-02-20 9:51 ` SandeepKsinha
2014-02-20 15:32 ` Valdis.Kletnieks at vt.edu
2014-02-24 1:52 ` Freeman Zhang [this message]
2014-02-13 13:26 ` freeman
2014-02-14 22:49 ` Valdis.Kletnieks at vt.edu
2014-02-17 0:59 ` freeman
2014-02-17 2:50 ` Saket Sinha
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=530AA5CD.4060601@gmail.com \
--to=freeman.zhang1992@gmail.com \
--cc=kernelnewbies@lists.kernelnewbies.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.