From: Milan Broz <gmazyland@gmail.com>
To: Cpp <tzornik@gmail.com>, dm-crypt@saout.de
Subject: Re: [dm-crypt] Some questions about cryptsetup 1.6.x
Date: Wed, 12 Feb 2014 17:20:18 +0100 [thread overview]
Message-ID: <52FB9F42.7030107@gmail.com> (raw)
In-Reply-To: <CAHeB2AkF00MADGMEbypPnVcenKa-NeVbaMbRMQjcP1r2QvmPOA@mail.gmail.com>
Hi,
just adding few facts, the discussion is already elsewhere in thread:)
On 02/12/2014 10:49 AM, Cpp wrote:
> Next I'd like to ask about the memory management of the master key.
> Suppose I mounted a volume using luksOpen (or --type luks open). What
> happens when I invoke luksClose (close) on that container? Does the
> master key get securely erased from memory (several overwrites with
> random data) or is it simply blanked out (single overwrite with
> zeros)?
The luksClose / dmsetup remove or any other correct dmcrypt device close
will cause removal of key from memory, with simple zeroing that part.
> How is the master key stored in memory? I read somewhere that having
> the same data in the exact same location in RAM for an extended period
> of time (like a 24/7 server) can "burn in" the data into the RAM
> module, which can be later recovered. Is this of any concern with
> current cryptsetup i.e. for attacks like cold boot?
In fact, it is stored in memory in several places. First, copy of
it in dmcrypt internal structures and then inside crypto API
(usually several times - depend on level of parallelism of crypto module).
> Finally I'm interested to know about removing all the keyslots.
> Suppose I mounted a container and erased every available keyslot
> (please don't ask why). I know this would in theory make the data
> irrecoverble, but the container is still mounted for the time being.
> Assuming that the power doesn't disappear, is there a way to
> reintroduce a new key slot into the LUKS container after all slots
> have been erased, provided that the container is mounted and I can
> read the master key from memory?
Yes. You can recreate LUKS header, I wrote some script to do this,
it is part of cryptsetup source code
http://code.google.com/p/cryptsetup/source/browse/misc/luks-header-from-active
(I hope is still works though ;-)
Milan
prev parent reply other threads:[~2014-02-12 16:20 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-02-12 9:49 [dm-crypt] Some questions about cryptsetup 1.6.x Cpp
2014-02-12 14:19 ` Arno Wagner
2014-02-12 14:30 ` Thomas Bächler
2014-02-12 15:59 ` Arno Wagner
2014-02-12 16:10 ` Milan Broz
2014-02-13 5:57 ` Arno Wagner
2014-02-12 15:04 ` Matthias Schniedermeyer
2014-02-12 15:57 ` Arno Wagner
2014-02-12 16:29 ` Matthias Schniedermeyer
2014-02-12 17:25 ` Arno Wagner
2014-02-12 16:20 ` Milan Broz [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=52FB9F42.7030107@gmail.com \
--to=gmazyland@gmail.com \
--cc=dm-crypt@saout.de \
--cc=tzornik@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox