From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from web.reniced.net (web.reniced.net [176.9.187.188]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Wed, 29 Oct 2014 16:53:15 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by web.reniced.net (Postfix) with ESMTP id 43932119F83 for ; Wed, 29 Oct 2014 16:46:11 +0100 (CET) Received: from web.reniced.net ([127.0.0.1]) by localhost (web.reniced.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c-xu8IiQAcc1 for ; Wed, 29 Oct 2014 16:46:10 +0100 (CET) Received: from [192.168.1.101] (dslb-178-004-127-194.178.004.pools.vodafone-ip.de [178.4.127.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: ingo.schmitt@binarysignals.net) by web.reniced.net (Postfix) with ESMTPSA id 7A512119F80 for ; Wed, 29 Oct 2014 16:46:10 +0100 (CET) Message-ID: <54510BC2.6010501@binarysignals.net> Date: Wed, 29 Oct 2014 16:46:10 +0100 From: Ingo Schmitt MIME-Version: 1.0 References: <20141028111351.GA23722@tansi.org> <5450C274.6020909@ramses-pyramidenbau.de> <20141029145900.GC11970@tansi.org> In-Reply-To: <20141029145900.GC11970@tansi.org> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Subject: Re: [dm-crypt] Quick dm-crypt questions List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On 10/29/14 15:59, * wrote: > If an attacker has access on that level, they can probaly just do > a memory-freeze attack or a fire-wire attack. Remember that > disk encryption does not protect data while the system is running > and has the data decrypted. I thought, AES NI makes cold boot attacks almost impossible because the master key will be hold in CPU's cache and not in system RAM. Since I read that mail thread, I'm not sure about that anymore. Pls enlighten me ;) -- -- \__________________________________________________ ingo.schmitt@binarysignals.net - GnuPG ID: 0xAFD687D2 | FP: 7418 77A6 4B59 AF90 4A11 1CCE 91C9 FF1B AFD6 87D2 |