On Mar 18, 2013, at 5:00 PM, Kyle <li...@lolwut.org> wrote:
> 
> I'm doubtful that encryption would be as effective as what Chris Mason was 
> suggesting, which is to either find and use a disk with secure erase trim or 
> rotate out the drives and securely erase them so that the data is destroyed 
> entirely rather than encrypted.

Well, I'll argue it's more effective in that it's more likely to be used than 
it is to be cracked in the time frame of the data mattering if the proper setup 
is being used.

> 
> Simply having the data exist on a disk, even if it's encrypted, still leaves 
> it open to various attacks. For instance, multiple side channel attacks exist 
> which could reveal the decryption key, permitting all data on the disk to be 
> read including deleted but not yet overwritten files.

Not if you're using LUKS with either a high entropy passphrase, or increasing 
PBKDF2 iterations, or both. LUKS and at least Opal SEDs don't store keys or 
passphrases in plaintext. If you're using plain dmcrypt (without LUKS) then you 
be concerned.


> Physical access to the machine may not even be required: A remote attacker 
> able to exploit the machine and read the disk blocks would be able to recover 
> the data as well.

If it's an HDD, or the SSD's garbage collection after trim is issue is slow, 
yes anyone who has either file system or block level access can obtain 
unencrypted data from a mapped encrypted block device. But if the fall back 
position to a remote take over is counting on deleted files being 
irrecoverable, well, you still have a remote attacker stealing visible files. 
Chances are if the deleted files are that sensitive, the non-deleted files are 
too. So I don't see the gain of going to extraordinary lengths to zero the data 
in released blocks for active use drives.

> 
> Granted these types of attacks are rare, however ultimately the only way to 
> secure unneeded sensitive data against a determined attacker is to destroy it 
> outright.

This is probably specious. It's sorta like saying the only way to secure a 
computer containing sensitive data is to disconnect it from the internet. Or 
from the wall outlet.

> Hugo made the point that a multitude of other data-leakage paths exist, and 
> while this is true, at a minimum one should be able to destroy individual 
> files beyond recovery so that should data leakage occur in the future, 
> previously securely erased data is not recoverable. At least, in an ideal 
> world.

Well at the moment we are SOL on that front with either SSDs or COW file 
systems. You'd need to use HDDs and a file system that'll support overwriting 
files with random data and then marking them as deleted.

I think the overwhelming concern is someone gaining physical access to the 
drive: theft of a laptop, or disposal of a dead drive (for which ATA security 
erase unit commands aren't going to work). And for that encryption is quite 
useful and important.

Chris Murphy--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to