Pete,
   
   A brute force attack on an AES-256 encrypted drive that has a STRONG
"Password" or Key would take years.  Of course, no one could prevent a
brute-force attack if the attacker gained physical access to the drive in
question - however if the users password (and thus the key) isn't 12345678
or some other Dilbertian string, then it's realistically impossible to
retrieve the key in a reasonable time frame.
   
   
   Regards,
   Michael
   ________________________
   Michael Jardine
   SECUDE IT Security - Seattle
   
   
   -----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Pete Jansson
Sent: Monday, July 23, 2007 9:44 AM
To: [email protected]
Subject: Re: [FDE] Data at Rest, Data in Transit, and Data in Use
   
   If someone gets physical custody of the drive, even without the keys,
   what's to prevent brute-force attacks against the assets?  I don't
   understand why "losing" the keys is considered a data protection
   strategy.
   
   On 7/23/07, Garrett M. Groff <[EMAIL PROTECTED]> wrote:
   > To extend on my last email, I wonder why people think there is a need
to use
   > secure deletion/wiping utilities on devices that are
full-disk-encrypted.
   > Clearing the paging files and doing freespace wipes seem unnecessary to
me
   > if the device itself contains only ciphertext anyway. One could argue
that a
   > full disk wipe is still necessary when de-commissioning drives... but
why is
   > that necessary? It seems more than sufficient to just delete the keys
that
   > allow access to that device, making the data stored on that drive no
more
   > useful than random bits. If there is a concern that a key has been
   > compromised, then I recommend changing the key and revoking the old
key, not
   > doing a full disk wipe.
   >
   > Given the availability and affordability of good FDE solutions, the
more
   > intricate and tedious solutions of the past seem unnecessary and less
   > efficient.
   >
   > - Garrett
   >
   >
   > ----- Original Message -----
   > From: "Garrett M. Groff" <[EMAIL PROTECTED]>
   > To: <[email protected]>
   > Sent: Monday, July 23, 2007 12:04 PM
   > Subject: Re: [FDE] Data at Rest, Data in Transit, and Data in Use
   >
   >
   > > Using an FDE solution on the primary drive (on which the OS is
installed)
   > > would resolve the problem of temporary files, paging files, and the
   > > hibernation file since the data in those files (and all other files
on the
   > > disk) will be encrypted. Any secondary drives should also be
encrypted if
   > > they contain confidential data. Further, removable drives and USB
   > > solid-state devices can be encrypted (probably with the same FDE
solution
   > > used to encrypt the primary drive). Hence, any data written to those
   > > devices
   > > is also encrypted, affording a high level of security.
   > >
   > >
   > > ----- Original Message -----
   > > From: "Curt Wilson" <[EMAIL PROTECTED]>
   > > To: <[email protected]>
   > > Sent: Monday, July 23, 2007 10:51 AM
   > > Subject: Re: [FDE] Data at Rest, Data in Transit, and Data in Use
   > >
   > >
   > >>
   > >>>> This means two things: ... save only the encrypted files long
term,
   > >>>> >AND use a full disk file scrubbing utility
   > >>>> >religiously, to get rid of all of the temp files and other
garbage as
   > >>>> >quickly as possible.
   > >>>
   > >>> Encrypted virtual partitions automatically accomplish the first of
   > >>> these and obviate the need for the second.
   > >>>
   > >>
   > >> I appreciate the discussion however this last message appears to
gloss
   > >> over some details, or perhaps I just don't understand deeply enough.
   > >>
   > >> How exactly does an encrypted virtual partition obviate the need for
the
   > >> second ("get rid of temp files")? Doesn't Windows and various
Windows
   > >> apps stash temp files in the various "Documents and Settings" (XP),
and
   > >> "Users" directories? And also stash items in the page file? Do you
   > >> suggest encrypting the page file within an encrypted virtual
partition?
   > >> How about the hibernation file? Clearing the pagefile at shutdown
works,
   > >> and protects against a "data at rest" attack, but what about while
the
   > >> OS is running and in-use?
   > >>
   > >> Perhaps there is a way to protect the data with encrypted virtual
   > >> partitions but how does it address these particular concerns?
Perhaps
   > >> Windows, and every app, could be tweaked to use some environment
vars
   > >> for temp location (maybe this is already done) and we could modify
that
   > >> location to be within the encrypted virtual partition. We might then
   > >> have to activate the encrypted virtual partition at boot, in case
the OS
   > >> wants to also use that space and can't find it because it's not yet
   > >> decrypted. Perhaps that's where a hardware token would come into
play
   > >> post-boot, pre-login?
   > >>
   > >> Clearly FDE has it's place for protecting data at rest.
   > >>
   > >> If vendors are going to respond to me privately, please address
these
   > >> questions specifically. Thanks
   > >>
   > >> Have a great day
   > >>
   > >>
   > >>
   > >>
   > >> Mike Markowitz wrote:
   > >>> Bob: I quite enjoyed your last note... sounds like it'll be an
   > >>> worthwhile
   > >>> talk. I'd like to see you add one idea, though...
   > >>>
   > >>> At 01:33 PM 7/20/2007, Robert Jueneman wrote:
   > >>>> FDE is probably the only solution for the Data at Rest
   > >>>> problem that everyone is currently focused on, i.e., when the
computer
   > >>>> is turned off.
   > >>>
   > >>> Not quite: encryption of a virtual disk containing all sensitive
data
   > >>> on the system would also work. (There are good reasons NOT to
encrypt
   > >>> the
   > >>> OS and program files.)
   > >>>
   > >>>> make sure that there is NO plaintext exposed
   > >>>> on the computer for any longer than is absolutely necessary.
   > >>>
   > >>> Exactly the reason to use an encrypted virtual partition with a
device
   > >>> driver that only presents plaintext to applications (running under
an
   > >>> authorized user's login process) *via RAM* and ensures that only
   > >>> ciphertext is written to disk. You simply 'mount' the partition
when
   > >>> you need access to the data and 'unmount' it when you're finished.
   > >>> (If you're really clever, you automate the mounting and unmounting
   > >>> processes, possibly with integrated user authentication.)
   > >>>
   > >>>> This means two things: ... save only the encrypted files long
term,
   > >>>> AND use a full disk file scrubbing utility
   > >>>> religiously, to get rid of all of the temp files and other garbage
as
   > >>>> quickly as possible.
   > >>>
   > >>> Encrypted virtual partitions automatically accomplish the first of
   > >>> these and obviate the need for the second.
   > >>>
   > >>>> [with regard to file encryption] Unfortunately, really large files
can
   > >>>> become rather cumbersome to deal with, and particularly the .pst
files
   > >>>> created by Outlook - some of which can grow to 4 GB.
   > >>>
   > >>> Bob, I love you! This is the BEST reason to use a device driver
that
   > >>> performs application-transparent decryption 'on the fly' for all
*block*
   > >>> reads (by authorized applications), and encryption for block
writes.
   > >>> This way there's never any need to need decrypt an entire file.
   > >>>
   > >>> Always happy to see you motivating the adoption and use of our
products!
   > >>>
   > >>> Regards,
   > >>>
   > >>> -mjm
   > >>>
   > >>> _______________________________________________
   > >>> FDE mailing list
   > >>> [email protected]
   > >>> http://www.xml-dev.com/mailman/listinfo/fde
   > >>>
   > >>
   > >>
   > >> --
   > >> Curt Wilson
   > >> IT Network Security Officer
   > >> Southern Illinois University Carbondale
   > >> 618-453-6237
   > >>
   > >> GnuPG key: http://www.infotech.siu.edu/security/curtw.pub.asc
   > >>
   > >> _______________________________________________
   > >> FDE mailing list
   > >> [email protected]
   > >> http://www.xml-dev.com/mailman/listinfo/fde
   > >>
   > >
   > > _______________________________________________
   > > FDE mailing list
   > > [email protected]
   > > http://www.xml-dev.com/mailman/listinfo/fde
   > >
   >
   > _______________________________________________
   > FDE mailing list
   > [email protected]
   > http://www.xml-dev.com/mailman/listinfo/fde
   >
   _______________________________________________
   FDE mailing list
   [email protected]
   http://www.xml-dev.com/mailman/listinfo/fde

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to