Re: [swsusp] encrypt suspend data for

2005-07-27 Thread Andreas Steinmetz
[EMAIL PROTECTED] wrote: > HI! IF I TEACH YOU HO TO DO RESUME FROM INITRD, WILL YOU TEST IT AND PROPERLY > DOCUMENT? :-) --P My Pleasure! I can test on x86_64 and I am willing to document. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-27 Thread Andreas Steinmetz
Pavel Machek wrote: > Hi! > > 2) An attacker breaks into your machine remotely while you're using it. He has access to all your RAM, which if you're actually using it, very likely including the same IPSEC, dm_crypt, and ssh-agent keys as are saved on suspend. Further, he can

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-27 Thread Pavel Machek
Hi! > > > 2) An attacker breaks into your machine remotely while you're using > > > it. He has access to all your RAM, which if you're actually using it, > > > very likely including the same IPSEC, dm_crypt, and ssh-agent keys as > > > are saved on suspend. Further, he can trivially capture your

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-27 Thread Pavel Machek
Hi! 2) An attacker breaks into your machine remotely while you're using it. He has access to all your RAM, which if you're actually using it, very likely including the same IPSEC, dm_crypt, and ssh-agent keys as are saved on suspend. Further, he can trivially capture your

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-27 Thread Andreas Steinmetz
Pavel Machek wrote: Hi! 2) An attacker breaks into your machine remotely while you're using it. He has access to all your RAM, which if you're actually using it, very likely including the same IPSEC, dm_crypt, and ssh-agent keys as are saved on suspend. Further, he can trivially capture your

Re: [swsusp] encrypt suspend data for

2005-07-27 Thread Andreas Steinmetz
[EMAIL PROTECTED] wrote: HI! IF I TEACH YOU HO TO DO RESUME FROM INITRD, WILL YOU TEST IT AND PROPERLY DOCUMENT? :-) --P My Pleasure! I can test on x86_64 and I am willing to document. -- Andreas Steinmetz SPAMmers use [EMAIL PROTECTED] - To unsubscribe from this list:

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Wed, Jul 27, 2005 at 01:12:49AM +0200, Pavel Machek wrote: > Hi! > > > > Well, "how long are my keys going to stay in swap after > > > swsusp"... that's pretty scary. > > > > Either they're likely in RAM _anyway_ and are thus already trivially > > accessible to the attacker (for things like

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! > > Well, "how long are my keys going to stay in swap after > > swsusp"... that's pretty scary. > > Either they're likely in RAM _anyway_ and are thus already trivially > accessible to the attacker (for things like dm_crypt or IPSEC or > ssh-agent), or the application took care to zero them

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Wed, Jul 27, 2005 at 12:14:46AM +0200, Pavel Machek wrote: > Hi! > > > > > the attached patches are acked by Pavel and signed off by me > > > > > > OK, well I queued this up, without a changelog. Because you didn't send > > > one. Please do so. As it adds a new feature, quite a bit of info

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! > > > the attached patches are acked by Pavel and signed off by me > > > > OK, well I queued this up, without a changelog. Because you didn't send > > one. Please do so. As it adds a new feature, quite a bit of info is > > relevant. > > I don't like this patch. It reinvents a fair amount

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! > > > the attached patches are acked by Pavel and signed off by me > > > > OK, well I queued this up, without a changelog. Because you didn't send > > one. Please do so. As it adds a new feature, quite a bit of info is > > relevant. > > I don't like this patch. It reinvents a fair amount

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Mon, Jul 25, 2005 at 08:10:36PM -0700, Andrew Morton wrote: > Andreas Steinmetz <[EMAIL PROTECTED]> wrote: > > > > the attached patches are acked by Pavel and signed off by me > > OK, well I queued this up, without a changelog. Because you didn't send > one. Please do so. As it adds a new

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Mon, Jul 25, 2005 at 08:10:36PM -0700, Andrew Morton wrote: Andreas Steinmetz [EMAIL PROTECTED] wrote: the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature,

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature, quite a bit of info is relevant. I don't like this patch. It reinvents a fair amount of dm_crypt

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature, quite a bit of info is relevant. I don't like this patch. It reinvents a fair amount of dm_crypt

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Wed, Jul 27, 2005 at 12:14:46AM +0200, Pavel Machek wrote: Hi! the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature, quite a bit of info is

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Pavel Machek
Hi! Well, how long are my keys going to stay in swap after swsusp... that's pretty scary. Either they're likely in RAM _anyway_ and are thus already trivially accessible to the attacker (for things like dm_crypt or IPSEC or ssh-agent), or the application took care to zero them out, or

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-26 Thread Matt Mackall
On Wed, Jul 27, 2005 at 01:12:49AM +0200, Pavel Machek wrote: Hi! Well, how long are my keys going to stay in swap after swsusp... that's pretty scary. Either they're likely in RAM _anyway_ and are thus already trivially accessible to the attacker (for things like dm_crypt or IPSEC

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-25 Thread Andrew Morton
Andreas Steinmetz <[EMAIL PROTECTED]> wrote: > > the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature, quite a bit of info is relevant. It should include a description

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-25 Thread Andrew Morton
Andreas Steinmetz [EMAIL PROTECTED] wrote: the attached patches are acked by Pavel and signed off by me OK, well I queued this up, without a changelog. Because you didn't send one. Please do so. As it adds a new feature, quite a bit of info is relevant. It should include a description of

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-17 Thread Andreas Steinmetz
Andrew Morton wrote: > Pavel Machek <[EMAIL PROTECTED]> wrote: > >>To prevent data gathering from swap after resume you can encrypt the >>suspend image with a temporary key that is deleted on resume. Note >>that the temporary key is stored unencrypted on disk while the system >>is suspended...

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-17 Thread Andreas Steinmetz
Andrew Morton wrote: Pavel Machek [EMAIL PROTECTED] wrote: To prevent data gathering from swap after resume you can encrypt the suspend image with a temporary key that is deleted on resume. Note that the temporary key is stored unencrypted on disk while the system is suspended... still it means

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Grzegorz Kulewski
On Wed, 6 Jul 2005, Pavel Machek wrote: Hi! To prevent data gathering from swap after resume you can encrypt the suspend image with a temporary key that is deleted on resume. Note that the temporary key is stored unencrypted on disk while the system is suspended... still it means that saved

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Pavel Machek
Hi! > > To prevent data gathering from swap after resume you can encrypt the > > suspend image with a temporary key that is deleted on resume. Note > > that the temporary key is stored unencrypted on disk while the system > > is suspended... still it means that saved data are wiped from disk > >

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Andrew Morton
Pavel Machek <[EMAIL PROTECTED]> wrote: > > To prevent data gathering from swap after resume you can encrypt the > suspend image with a temporary key that is deleted on resume. Note > that the temporary key is stored unencrypted on disk while the system > is suspended... still it means that saved

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Andrew Morton
Pavel Machek [EMAIL PROTECTED] wrote: To prevent data gathering from swap after resume you can encrypt the suspend image with a temporary key that is deleted on resume. Note that the temporary key is stored unencrypted on disk while the system is suspended... still it means that saved data

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Pavel Machek
Hi! To prevent data gathering from swap after resume you can encrypt the suspend image with a temporary key that is deleted on resume. Note that the temporary key is stored unencrypted on disk while the system is suspended... still it means that saved data are wiped from disk during

Re: [swsusp] encrypt suspend data for easy wiping

2005-07-06 Thread Grzegorz Kulewski
On Wed, 6 Jul 2005, Pavel Machek wrote: Hi! To prevent data gathering from swap after resume you can encrypt the suspend image with a temporary key that is deleted on resume. Note that the temporary key is stored unencrypted on disk while the system is suspended... still it means that saved