public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* encryption
@ 2015-02-16 17:19 Henry Noack
  2015-02-18 11:03 ` encryption Stefan Hajnoczi
  0 siblings, 1 reply; 3+ messages in thread
From: Henry Noack @ 2015-02-16 17:19 UTC (permalink / raw)
  To: kvm

Hello you guys,


it is possible to decrypt a kvm volume only by using the command line 
after starting it?


Best regards
Henry

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: encryption
  2015-02-16 17:19 encryption Henry Noack
@ 2015-02-18 11:03 ` Stefan Hajnoczi
  2015-02-18 11:58   ` encryption Markus Armbruster
  0 siblings, 1 reply; 3+ messages in thread
From: Stefan Hajnoczi @ 2015-02-18 11:03 UTC (permalink / raw)
  To: Henry Noack; +Cc: kvm

[-- Attachment #1: Type: text/plain, Size: 750 bytes --]

On Mon, Feb 16, 2015 at 06:19:04PM +0100, Henry Noack wrote:
> it is possible to decrypt a kvm volume only by using the command line after
> starting it?

Encryption can be done at 3 levels:

1. Inside the guest.  Just like you do on a physical machine with LUKS
   (dm-crypt), ecryptfs, TrueCrypt, etc.

2. In QEMU with qcow2, although this feature is not widely used and not
   up to modern disk encryption standards.

3. On the host using LUKS (dm-crypt), ecryptfs, TrueCrypt, etc or on the
   storage appliance.

It depends what you are trying to achieve.

Keep in mind that encrypting the disk image does not stop the host from
seeing inside the guest.  The host is always trusted, today's
virtualization technology has this limitation.

Stefan

[-- Attachment #2: Type: application/pgp-signature, Size: 473 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: encryption
  2015-02-18 11:03 ` encryption Stefan Hajnoczi
@ 2015-02-18 11:58   ` Markus Armbruster
  0 siblings, 0 replies; 3+ messages in thread
From: Markus Armbruster @ 2015-02-18 11:58 UTC (permalink / raw)
  To: Stefan Hajnoczi; +Cc: Henry Noack, kvm

Stefan Hajnoczi <stefanha@gmail.com> writes:

> On Mon, Feb 16, 2015 at 06:19:04PM +0100, Henry Noack wrote:
>> it is possible to decrypt a kvm volume only by using the command line after
>> starting it?
>
> Encryption can be done at 3 levels:
[...]
> 2. In QEMU with qcow2, although this feature is not widely used and not
>    up to modern disk encryption standards.

Quoting the fine manual:

          The use of encryption in qcow and qcow2 images is considered
          to be flawed by modern cryptography standards, suffering from
          a number of design problems:

             − The AES-CBC cipher is used with predictable
               initialization vectors based on the sector number.  This
               makes it vulnerable to chosen plaintext attacks which can
               reveal the existence of encrypted data.
             − The user passphrase is directly used as the encryption
               key.  A poorly chosen or short passphrase will compromise
               the security of the encryption.
             − In the event of the passphrase being compromised there is
               no way to change the passphrase to protect data in any
               qcow images.  The files must be cloned, using a different
               encryption passphrase in the new file.  The original file
               must then be securely erased using a program like shred,
               though even this is ineffective with many modern storage
               technologies.

          Use of qcow / qcow2 encryption is thus strongly discouraged.
          Users are recommended to use an alternative encryption
          technology such as the Linux dm-crypt / LUKS system.

[...]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-02-18 11:58 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-02-16 17:19 encryption Henry Noack
2015-02-18 11:03 ` encryption Stefan Hajnoczi
2015-02-18 11:58   ` encryption Markus Armbruster

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox