Hi Dan,

Your first two interpretations are correct.

I like the idea of netbooting but unfortunately, although a good idea, it
doesn't fit with the details of our use case - we temporarily take our
system to a trusted location, use it and then remove it, so we do not have a
permanent presence at the trusted locations (other than our base location).
This means that providing the netboot environment is effectively the same
problem, as anything on the same network as the data becomes subject to the
same rules regarding protection.

Putting the boot system on the key media isn't quite the same as
transporting the key on media alone - the key media can be read-only/only
used at boot to authenticate, whereas the boot system is on writable media.
(I have already considered read-only boot images on DVD but due to the low
numbers of systems and the need to make permanent changes to the system, I
do not consider this approach operable.)

Regarding tampering and tamper detection, when the disks are transported, we
do not rely on an IT approach to these issues.

Regards,
Rob

-----Original Message-----
From: Daniel Carosone [mailto:d...@geek.com.au]
Sent: 28 April 2011 03:21
To: Rob O'Leary
Cc: Troels N?rgaard Nielsen; zfs-crypto-discuss@opensolaris.org
Subject: Re: Booting from encrypted ZFS WAS: RE: How to mount
encryptedfile system at boot? Why no pass phraserequesed


If I understood correctly:

 - there is no requirement for the system to boot (or be bootable)
   outside of your secure locations.

 - you are willing to accept separate tracking and tagging of removable
   media, e.g. for key distribution.

Consider, at least for purposes of learning from the comparison:

 - having the machines netboot only, and provide the netboot
   environment only within the secure locations.

 - having the system disks on the removable media that is handled
   separately, not just the keys.

Both of these share the property that the physical chassis being
transported contains only encrypted disks, leaving you to make other
tradeoffs with respect to risks and handling of the bootstrapping data
(including keys).

My primary interest in "encrypted zfs boot" for the OS is more around
the integrity of the boot media, for devices that may be exposed to
tampering of various kinds.  This is a complex issue that can only be
partly addressed by ZFS, even with such additional features.

Do these sorts of concerns apply to your environment?  If someone was
to intercept one of these machines in transit, and tamper with OS and
system executables in such a way as to disclose information/keys or
otherwise alter their operation when next booted in the "secure"
environment, would that be a concern?

--
Dan.

_______________________________________________
zfs-crypto-discuss mailing list
zfs-crypto-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-crypto-discuss

Reply via email to