* [RFC] dm-thin: Random block placement strategy?
@ 2012-07-19 21:49 Alex Elsayed
2012-07-20 9:50 ` Joe Thornber
0 siblings, 1 reply; 2+ messages in thread
From: Alex Elsayed @ 2012-07-19 21:49 UTC (permalink / raw)
To: dm-crypt-4q3lyFh4P1g; +Cc: dm-devel-H+wXaHxf7aLQT0dZR+AlfA
This may be insufficiently useful to justify implementing, but I thought it
was an interesting concept.
One of the current issues with dm-crypt and discard is that enabling it can
leak information about the filesystem and usage patterns of the disk[1].
If a dm-thin device with a random block placement strategy is layered on top
of dm-crypt however, this could solve some of the issues involved and
partially mitigate others.
Such a random block placement strategy would heavily disguise any layout
patterns that could be used to identify the filesystem, most likely to the
point of being completely unrecognizable.
Issues arising from discarded blocks being nonzero are avoided by default
due to dm-thin pre-zeroing allocations (unless skip_block_zeroing is
enabled).
However, some issues would still be present:
While the *distribution* of unused sectors would be concealed, their
existence and how many there are would still be detectable.
In addition, the issues with trim and a hidden device are still present.
[1] http://asalor.blogspot.com/2011/08/trim-dm-crypt-problems.html
_______________________________________________
dm-crypt mailing list
dm-crypt-4q3lyFh4P1g@public.gmane.org
http://www.saout.de/mailman/listinfo/dm-crypt
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [RFC] dm-thin: Random block placement strategy?
2012-07-19 21:49 [RFC] dm-thin: Random block placement strategy? Alex Elsayed
@ 2012-07-20 9:50 ` Joe Thornber
0 siblings, 0 replies; 2+ messages in thread
From: Joe Thornber @ 2012-07-20 9:50 UTC (permalink / raw)
To: device-mapper development; +Cc: dm-crypt
On Thu, Jul 19, 2012 at 02:49:51PM -0700, Alex Elsayed wrote:
> This may be insufficiently useful to justify implementing, but I thought it
> was an interesting concept.
>
> One of the current issues with dm-crypt and discard is that enabling it can
> leak information about the filesystem and usage patterns of the disk[1].
>
> If a dm-thin device with a random block placement strategy is layered on top
> of dm-crypt however, this could solve some of the issues involved and
> partially mitigate others.
>
> Such a random block placement strategy would heavily disguise any layout
> patterns that could be used to identify the filesystem, most likely to the
> point of being completely unrecognizable.
A couple of things spring to mind.
- If you're using a spindle device this will destroy performance,
unless you use large block size (which I suspect you don't want
to do because you're trying to disguise access patterns).
- How expensive will acquiring a cryptographically secure random
destination be?
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2012-07-20 9:50 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-07-19 21:49 [RFC] dm-thin: Random block placement strategy? Alex Elsayed
2012-07-20 9:50 ` Joe Thornber
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).