Re: Various questions on encrypted partitions
On Thu, Apr 24, 2008 at 08:00:39AM -0500, Jordi Guti?rrez Hermoso wrote: So when I installed Debian, I told d-i to wipe the hard disk and encrypt my lappy's hard drive. My tinfoil-hatted heart loves it. They'll never take me or my data alive. Hee hee. I'm more paranoid than you because I don't trust the hash algorithm (that maps the password into a bit vector) not to introduce statistical bias. I've agitated a little bit on the luks mailing list for a feature that allows the key to be entered directly as a hexadecimal number but wasn't able to drum up any support. Another missing feature is to have the exit code from cryptsetup encode the number of the keyslot as part of a defense against rubber hose attacks. When the attacker compels you to surrender the key, you provide an alternative to the usual one, which decrypts the disk normally but is detected during the boot sequence by a script that feeds him disinformation by altering particularly sensitive files in advance. An attacker who's aware of this countermeasure could defeat it by mounting the root volume from a rescue cd, but it may find a niche in the U.S.. Prosecutors there have been trying lately to subvert the fifth amendment right of non-self-incrimination by compelling a defendant to perform the decryption himself rather than telling them the key. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Various questions on encrypted partitions
So when I installed Debian, I told d-i to wipe the hard disk and encrypt my lappy's hard drive. My tinfoil-hatted heart loves it. They'll never take me or my data alive. I am curious, though, as to the exact nature of the encryption. I'd rtfm, but I don't know where to begin. I understand the encryption is AES-256, supposedly good enough to keep spooks at bay, but how exactly does it work? I chose a ridiculous 25-character random printable ASCII password that I have committed to my cerebellum and muscle memory, because I thought that AES-256 actually uses my password to encrypt the hard drive. Is this true? I also see that it uses something called LUKS, and I understand that LUKS is the way to change my encryption password. How does that work, exactly, at the mathematical level? If I change the encryption password, does the hard drive get reencrypted a different way, or what? My last question is about potential data loss. Is an encrypted hard drive more vulnerable to data loss than an unencrypted one? Suppose I have a hardware failure or something. Will the encryption make it harder to recover my data than if I weren't using encryption? That is, if a few bytes are off, can AES-256 still decrypt gracefully? Thanks, - Jordi G. H. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Various questions on encrypted partitions
n Thu, Apr 24, 2008 at 08:00:39AM -0500, Jordi Guti0xe9rrez Hermoso wrote: So when I installed Debian, I told d-i to wipe the hard disk and encrypt my lappy's hard drive. My tinfoil-hatted heart loves it. They'll never take me or my data alive. I am curious, though, as to the exact nature of the encryption. I'd rtfm, but I don't know where to begin. I understand the encryption is AES-256, supposedly good enough to keep spooks at bay, but how exactly does it work? I chose a ridiculous 25-character random printable ASCII password that I have committed to my cerebellum and muscle memory, because I thought that AES-256 actually uses my password to encrypt the hard drive. Is this true? I also see that it uses something called LUKS, and I understand that LUKS is the way to change my encryption password. How does that work, exactly, at the mathematical level? If I change the encryption password, does the hard drive get reencrypted a different way, or what? My last question is about potential data loss. Is an encrypted hard drive more vulnerable to data loss than an unencrypted one? Suppose I have a hardware failure or something. Will the encryption make it harder to recover my data than if I weren't using encryption? That is, if a few bytes are off, can AES-256 still decrypt gracefully? Thanks, - Jordi G. H. try looking at the manual entries for cryptsetup and luksformat... The encryption algorithm used will depend on the options you chose when you setup your filesystems. I think it defaults to AES-256. And no, it doesn't use your password to encrypt all the data. It generates a random key for that. Your password is used to encrypt the random key, and the resuld stored in the LUKS header. So when you change your password, all that happens is the random key gets re-encrypted with the new password and replaced. It even allows you to assign multiple passwords, by storing multiple copies of the random key, encrypted by each of the passwords. I think the man pages above, and the other resouces they site, should answer your other questions. Regards, DigbyT -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]