All of lore.kernel.org
 help / color / mirror / Atom feed
From: Milan Broz <gmazyland@gmail.com>
To: Cpp <tzornik@gmail.com>, "dm-crypt@saout.de" <dm-crypt@saout.de>
Subject: Re: [dm-crypt] Quick dm-crypt questions
Date: Tue, 28 Oct 2014 10:48:54 +0100	[thread overview]
Message-ID: <544F6686.1020601@gmail.com> (raw)
In-Reply-To: <CAHeB2Anm7U-Jktch6npvgCzYpvYUhKVyRxR0P5g=UK6co=91DA@mail.gmail.com>

On 10/28/2014 10:15 AM, Cpp wrote:
> - Does dm-crypt/LUKS employ any RAM anti-forensics? In particular,
> what is the danger of a master key being "burnt-in" into the RAM, if a
> certain container is mounted for an extended period of time (a few
> years)? Is the master key being periodically moved around in RAM (this
> acts like a screen-saver or rather a RAM-saver) or does it reside at a
> static location after the container is mounted?

No. And because dm-crypt just block processing wrapper around kernel crypto API
it is more problem in cipher implementation there than in dmcrypt.
(IIRC the key is duplicated several times there because of parallel processing
on separate CPUs.)

But I do not believe this is real problem at all. BTW you can run
luksSuspend which should wipe all keys and reinstate them later, this will
"refresh" the memory area, at least partially.

(BTW If anyone have some reliable papers about this, please send a links, thanks.)

> - Is it possible to separate the LUKS header from the encrypted data?
> Normally when a partition is luksFormat-ted it will generate a LUKS
> header on that partition at the very beginning of space. But I was
> wondering, if it's possible to have only the encrypted data on the
> partition, and move the LUKS header somewhere else i.e. a file on a
> USB stick?

Yes. See --header option and "detached metadata" in cryptsetup man.

In this mode you should also use data payload offset to 0 bytes,
so the data device contains only encrypted data. (Or you can have random
data instead on LUKS header area on data device and use separate device
or file with LUKS header).

Milan

  reply	other threads:[~2014-10-28  9:48 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-10-28  9:15 [dm-crypt] Quick dm-crypt questions Cpp
2014-10-28  9:48 ` Milan Broz [this message]
2014-10-28 11:13 ` Arno Wagner
2014-10-29  9:24   ` Cpp
2014-10-29 10:33     ` Ralf Ramsauer
2014-10-29 14:59       ` Arno Wagner
2014-10-29 15:30         ` Ralf Ramsauer
2014-10-29 15:46         ` Ingo Schmitt
2014-10-29 16:21           ` Arno Wagner
2014-10-29 16:50             ` Milan Broz
2014-10-30  0:19               ` Sven Eschenberg
2014-10-29 15:53         ` Cpp
2014-10-29 16:30           ` Arno Wagner
2014-10-29 14:56     ` Arno Wagner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=544F6686.1020601@gmail.com \
    --to=gmazyland@gmail.com \
    --cc=dm-crypt@saout.de \
    --cc=tzornik@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.