public inbox for dm-crypt@saout.de
 help / color / mirror / Atom feed
* [dm-crypt] Mastery Key and RAM burn-in
@ 2019-10-23 22:23 procmem
  2019-10-24  0:16 ` Arno Wagner
  0 siblings, 1 reply; 3+ messages in thread
From: procmem @ 2019-10-23 22:23 UTC (permalink / raw)
  To: dm-crypt, whonix-devel-owner

Hi. I've read Gutmann's papers about how data held persistently in DRAM
can cause physical "burn-in" that makes master encryption key recovery
trivial. His suggestion was to makes sure it is re-written/moved around
every few minutes. [1] loop-aes had such a mitigation implemented,
though it unfortunately aids cold boot attack key recovery.[2]

Does dm-crypt have mitigations for this in place?

[1] https://www.cs.jhu.edu/~astubble/600.412/s-c-papers/remanence.pdf

[2] https://www.lorentzcenter.nl/lc/web/2010/383/presentations/Heninger.pdf

^ permalink raw reply	[flat|nested] 3+ messages in thread
* [dm-crypt] Mastery Key and RAM burn-in
@ 2019-10-25  0:00 procmem
  0 siblings, 0 replies; 3+ messages in thread
From: procmem @ 2019-10-25  0:00 UTC (permalink / raw)
  To: dm-crypt, whonix-devel-owner

[-- Attachment #1: Type: text/plain, Size: 938 bytes --]

> Hi,
>
> I would suggest that Gutmann's insights (which were pretty 
> good when published) are pretty much outdated 18 years later.
> Manufacturing processes have changed and cell stability is
> vastly better than it was (or DRAMs would not survive very 
> long). It is not clear whether these attacks still work and
> how much effort they would be. 
>
> This attack is not a widespread concern in the security 
> community these days though. As far as I am aware (correct
> me if I am wrong), there is not a single instance where
> this attack was used successfully. 
>
> Anyways, this is not a LUKS or dm-Crypt issue. This is an
> issue with the kernel crypto services, I believe. loop-AES
> is kind of historic and still did its own crypto. That is
> not how things work these days.
>
> Regards,
> Arno
Alright thanks for making it clear. The only instance of a successful
attack was with a machine using SRAM which is antiquated.



[-- Attachment #2: Type: text/html, Size: 1189 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-10-25  0:01 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-10-23 22:23 [dm-crypt] Mastery Key and RAM burn-in procmem
2019-10-24  0:16 ` Arno Wagner
  -- strict thread matches above, loose matches on Subject: below --
2019-10-25  0:00 procmem

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox