On Sun, Aug 22, 2010 at 1:12 PM, Edward Ned Harvey <lop...@nedharvey.com> wrote:
>> From: tech-boun...@lopsa.org [mailto:tech-boun...@lopsa.org] On Behalf
>> Of Brian Mathis
>>
>> Acronis and other disk imaging tools should have no problem with FDE.
>> The FDE drivers work at a layer below the OS and filesystem, and
>
> Sorry, that's not correct.  First of all, I tested it here today, with
> TrueImage and TrueCrypt.  After encrypting the whole disk with truecrypt,
> poor little trueimage won't even run ... So I checked acronis support, and
> they acknowledge all over the place that it doesn't work.
>
> They say your options are:  (a) Decrypt the drive, perform a backup, and
> re-encrypt the drive, or (b) perform a byte-for-byte image of the drive, in
> which case, the entire drive including empty space will be backed up, and
> you can't do incrementals.
>
> This seems to be the general case.  General WDE / FDE solutions are not
> compatible with general complete system backups.  There are some exceptions
> ... There is a Casper backup product which is made explicitly to work with
> PGP, for example.
>
> What I'm looking for are those cases ... Which WDE/FDE solutions are
> compatible with which complete-system incremental backup solutions.


OK, maybe there's a qualification here... the tools I've successfully
used operate inside the OS after its booted.  If you're trying to
image from a separate boot disk or something, that's not going to
work.


>> I have made images many times using the built-in Complete PC Backup,
>> and restored them with no problem.  The only issue is that the image
>> you make is not encrypted, so that media is vulnerable, as well as
>> when you restore the image you need to re-encrypt the disk.
>
> That is valuable information.  I assume you're talking about Backup &
> Restore center, in Windows 7 Pro/Ultimate, right?  What are you using for
> encryption?


Yes, I've been using the built-in Windows tools since they are free*
and so far I have not had any problems.  I'm not doing complex image
management, just backups and restores of systems in the case of
hardware failure, etc...  I have used both CompuSec Free and Truecrypt
with the same results, though it's been a while since using Compusec.


> ...
> Since you said the encryption is taking place below the OS level, I wanted
> to expand upon my reply on that:
>
> The encryption is somehow happening both *before* the OS starts, and also
> *inside* the OS.  But the encryption does not stay below the OS while the OS
> is running.  This is evidenced by several facts:  (a) when I benchmark my
> system with encryption on it, I see the "System" process consuming a large
> amount of CPU.  This would not happen, for example, if my OS were a guest in
> a virtualization setup where the host was handling encryption outside of my
> OS.  So I conclude, my OS is performing the encryption, probably in a
> driver.  (b) If the encryption were happening underneath the OS, then the OS
> would be free to do whatever it likes ... repartition, reformat, or install
> any OS you wish.  This would imply you can install any OS you wish, and
> there is no encryption software that I can find, which is compatible with
> all OSes.
>
> I suspect that the truecrypt bootloader is able to decrypt enough to launch
> the NT kernel, and then the NT kernel is loading a special driver to handle
> the encrypted disk instead of the generic / standard sata disk driver.


I said below the file system and VSS, not OS.  Anything running on a
system needs to be inside the OS somewhere.  The Truecrypt is indeed
running as a device driver inside the kernel, which is why you see CPU
usage inside the "System" process (kernel).  I think your description
of the boot process is pretty accurate.

_______________________________________________
Tech mailing list
Tech@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to