public inbox for dm-crypt@saout.de
 help / color / mirror / Atom feed
From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: [dm-crypt] Re: reg: Question on LUKS device's content exposure
Date: Sat, 16 Oct 2021 22:15:41 +0200	[thread overview]
Message-ID: <20211016201541.GA18893@tansi.org> (raw)
In-Reply-To: <6c699b29-90ac-49c9-894f-3f9050cf9037@localhost>

On Thu, Oct 14, 2021 at 21:56:06 CEST, Michael Kjörling wrote:
> On 13 Oct 2021 08:41 +0000, from samsapi01@protonmail.ch (sami0l):
> > Suppose my VPS provider wants to view contents of
> > /mnt/sdb1_crypt_files, will they be able to mount the device file
> > /dev/sda to view the contents at /dev/mapper/sdb1_crypt or
> > /mnt/sdb1_crypt_files? Meaning, since /dev/mapper/sdb1_crypt,
> > /dev/sdb1 or /mnt/sdb1_crypt_files are *within* the main or root
> > /dev/sda will they get access to the files which is within the LUKS
> > device (and decrypted at /dev/mapper/sdb1_crypt) too?
> 
> Anyone who is in control of the hypervisor will be able to inspect the
> VM's portion of the host's RAM, and extract from it anything they
> wish, including cryptographic keys or other relevant material (or just
> copy it wholesale).
[...] 

I completely agree.  

You cannot protect a VM against the hypervisor it is running under 
and you cannot protect against the admin of that hypervisor. 

Even things like CPUs encrypting RAM only serve to protect against
other VMs on the same hardware, not against the hypervisor. 

As to the idea with a dedicated, alerted rack, I know of real-world
installations that do exectly that. This will fail with a competent
attacker as well though, as physical locks and tamper-detection 
switches are not that secure as well.

Regards,
Arno

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list -- dm-crypt@saout.de
To unsubscribe send an email to dm-crypt-leave@saout.de

  reply	other threads:[~2021-10-16 20:18 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <uM6-PtHBQkbrEyvAQeucVxnm9WiQA5NZVwPYOWjDhauBu6LELGKBNgkDMaJL18hVDEVimjXygTsCclr8MJsTTlJ5pungtSGkIAYXBPi6xg4=@protonmail.ch>
2021-10-14 19:56 ` [dm-crypt] Re: reg: Question on LUKS device's content exposure Michael Kjörling
2021-10-16 20:15   ` Arno Wagner [this message]
2021-10-17 10:20     ` Michael Kjörling

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20211016201541.GA18893@tansi.org \
    --to=arno@wagner.name \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox