* encryption
@ 2015-02-16 17:19 Henry Noack
2015-02-18 11:03 ` encryption Stefan Hajnoczi
0 siblings, 1 reply; 3+ messages in thread
From: Henry Noack @ 2015-02-16 17:19 UTC (permalink / raw)
To: kvm
Hello you guys,
it is possible to decrypt a kvm volume only by using the command line
after starting it?
Best regards
Henry
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: encryption
2015-02-16 17:19 encryption Henry Noack
@ 2015-02-18 11:03 ` Stefan Hajnoczi
2015-02-18 11:58 ` encryption Markus Armbruster
0 siblings, 1 reply; 3+ messages in thread
From: Stefan Hajnoczi @ 2015-02-18 11:03 UTC (permalink / raw)
To: Henry Noack; +Cc: kvm
[-- Attachment #1: Type: text/plain, Size: 750 bytes --]
On Mon, Feb 16, 2015 at 06:19:04PM +0100, Henry Noack wrote:
> it is possible to decrypt a kvm volume only by using the command line after
> starting it?
Encryption can be done at 3 levels:
1. Inside the guest. Just like you do on a physical machine with LUKS
(dm-crypt), ecryptfs, TrueCrypt, etc.
2. In QEMU with qcow2, although this feature is not widely used and not
up to modern disk encryption standards.
3. On the host using LUKS (dm-crypt), ecryptfs, TrueCrypt, etc or on the
storage appliance.
It depends what you are trying to achieve.
Keep in mind that encrypting the disk image does not stop the host from
seeing inside the guest. The host is always trusted, today's
virtualization technology has this limitation.
Stefan
[-- Attachment #2: Type: application/pgp-signature, Size: 473 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: encryption
2015-02-18 11:03 ` encryption Stefan Hajnoczi
@ 2015-02-18 11:58 ` Markus Armbruster
0 siblings, 0 replies; 3+ messages in thread
From: Markus Armbruster @ 2015-02-18 11:58 UTC (permalink / raw)
To: Stefan Hajnoczi; +Cc: Henry Noack, kvm
Stefan Hajnoczi <stefanha@gmail.com> writes:
> On Mon, Feb 16, 2015 at 06:19:04PM +0100, Henry Noack wrote:
>> it is possible to decrypt a kvm volume only by using the command line after
>> starting it?
>
> Encryption can be done at 3 levels:
[...]
> 2. In QEMU with qcow2, although this feature is not widely used and not
> up to modern disk encryption standards.
Quoting the fine manual:
The use of encryption in qcow and qcow2 images is considered
to be flawed by modern cryptography standards, suffering from
a number of design problems:
− The AES-CBC cipher is used with predictable
initialization vectors based on the sector number. This
makes it vulnerable to chosen plaintext attacks which can
reveal the existence of encrypted data.
− The user passphrase is directly used as the encryption
key. A poorly chosen or short passphrase will compromise
the security of the encryption.
− In the event of the passphrase being compromised there is
no way to change the passphrase to protect data in any
qcow images. The files must be cloned, using a different
encryption passphrase in the new file. The original file
must then be securely erased using a program like shred,
though even this is ineffective with many modern storage
technologies.
Use of qcow / qcow2 encryption is thus strongly discouraged.
Users are recommended to use an alternative encryption
technology such as the Linux dm-crypt / LUKS system.
[...]
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2015-02-18 11:58 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-02-16 17:19 encryption Henry Noack
2015-02-18 11:03 ` encryption Stefan Hajnoczi
2015-02-18 11:58 ` encryption Markus Armbruster
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox