dm-devel.redhat.com archive mirror
 help / color / mirror / Atom feed
* [RFC] dm-thin: Random block placement strategy?
@ 2012-07-19 21:49 Alex Elsayed
  2012-07-20  9:50 ` Joe Thornber
  0 siblings, 1 reply; 2+ messages in thread
From: Alex Elsayed @ 2012-07-19 21:49 UTC (permalink / raw)
  To: dm-crypt-4q3lyFh4P1g; +Cc: dm-devel-H+wXaHxf7aLQT0dZR+AlfA

This may be insufficiently useful to justify implementing, but I thought it 
was an interesting concept.

One of the current issues with dm-crypt and discard is that enabling it can 
leak information about the filesystem and usage patterns of the disk[1].

If a dm-thin device with a random block placement strategy is layered on top 
of dm-crypt however, this could solve some of the issues involved and 
partially mitigate others.

Such a random block placement strategy would heavily disguise any layout 
patterns that could be used to identify the filesystem, most likely to the 
point of being completely unrecognizable.

Issues arising from discarded blocks being nonzero are avoided by default 
due to dm-thin pre-zeroing allocations (unless skip_block_zeroing is 
enabled).

However, some issues would still be present:

While the *distribution* of unused sectors would be concealed, their 
existence and how many there are would still be detectable.

In addition, the issues with trim and a hidden device are still present.

[1] http://asalor.blogspot.com/2011/08/trim-dm-crypt-problems.html

_______________________________________________
dm-crypt mailing list
dm-crypt-4q3lyFh4P1g@public.gmane.org
http://www.saout.de/mailman/listinfo/dm-crypt

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [RFC] dm-thin: Random block placement strategy?
  2012-07-19 21:49 [RFC] dm-thin: Random block placement strategy? Alex Elsayed
@ 2012-07-20  9:50 ` Joe Thornber
  0 siblings, 0 replies; 2+ messages in thread
From: Joe Thornber @ 2012-07-20  9:50 UTC (permalink / raw)
  To: device-mapper development; +Cc: dm-crypt

On Thu, Jul 19, 2012 at 02:49:51PM -0700, Alex Elsayed wrote:
> This may be insufficiently useful to justify implementing, but I thought it 
> was an interesting concept.
> 
> One of the current issues with dm-crypt and discard is that enabling it can 
> leak information about the filesystem and usage patterns of the disk[1].
> 
> If a dm-thin device with a random block placement strategy is layered on top 
> of dm-crypt however, this could solve some of the issues involved and 
> partially mitigate others.
> 
> Such a random block placement strategy would heavily disguise any layout 
> patterns that could be used to identify the filesystem, most likely to the 
> point of being completely unrecognizable.

A couple of things spring to mind.

- If you're using a spindle device this will destroy performance,
  unless you use large block size (which I suspect you don't want
  to do because you're trying to disguise access patterns).

- How expensive will acquiring a cryptographically secure random
  destination be?

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2012-07-20  9:50 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-07-19 21:49 [RFC] dm-thin: Random block placement strategy? Alex Elsayed
2012-07-20  9:50 ` Joe Thornber

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).