|
|
Subscribe / Log in / New account

Security

TrueCrypt abruptly shuts down

By Nathan Willis
May 29, 2014

The TrueCrypt disk-encryption software project has abruptly shut down, leaving only a vague warning message that users should not entrust their data to it and should migrate to another platform. If the shutdown was made in response to a recently-discovered security flaw, then there is indeed cause for concern, but the enigmatic nature of the announcement—and the project itself—make the circumstances more puzzling.

The TrueCrypt project is just over ten years old; the first release was made in February 2004. Its emphasis has always been on full-disk encryption for Windows machines, though it has also offered some features rarely found in competing programs, such as the creation of encrypted "hidden volumes" within other volumes. There have also been third-party projects to support TrueCrypt volumes on Linux and other operating systems. Performance was generally regarded as good, and it supported a range of different ciphers.

But TrueCrypt has always been a peculiar project. It has had licensing issues for many years that prevent it from actually being considered open source or free software. The TrueCrypt License (which, as of this week's shutdown, is no longer available on the web, including the Wayback Machine and Google cache, but can be found in the project's downloadable packages) was submitted to the Open Source Initiative (OSI) in 2006, but OSI determined that it did not meet the open source definition; it is also not on the Free Software Foundation's (FSF) list of free-software licenses. That is why official Linux releases from the project are not included in any mainstream distributions, but the third-party efforts are. The project continued to make its periodic releases and, interestingly enough, did so without ever revealing the identities of the team members.

On May 28, many users were surprised to discover that the project's previous URL truecrypt.org was suddenly redirecting visitors to truecrypt.sourceforge.net, where a page announced that development on TrueCrypt had ended and that TrueCrypt was not secure. The full text of the announcement reads:

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.

Beneath the message are instructions for migrating a TrueCrypt-encrypted volume to BitLocker, plus a link to a new, signed Windows executable labeled TrueCrypt 7.2 (although source is also available from the SourceForge project files page). The signature on the new release does validate, and it was made with the same key used to sign previous releases. The 7.2 executable, however, does not encrypt; it can only decrypt TrueCrypt volumes.

The statement tying the project shutdown to Microsoft's end-of-life for Windows XP is more or less plausible, since subsequent Windows releases have other encryption options. Linux, of course, has full-disk encryption options of its own as well, such as Linux Unified Key Setup (LUKS) and dm-crypt. But the sudden disappearance of TrueCrypt is troubling for other reasons.

First, a longstanding criticism of TrueCrypt was that it had never been subjected to a real security audit. The site istruecryptauditedyet.com was set up and a crowdfunding campaign was launched in October 2013 to hire an auditor. The campaign was successful, and in April 2014 an initial report [PDF] was published, covering an analysis of the overall application. Cryptographer Matthew Green was handling the second phase of the audit, an in-depth analysis of the core encryption routines.

On May 29, Green told security blogger Brian Krebs that he still intends to complete the audit—and that he believes that the project shutdown was a move made by the real TrueCrypt developers, not a hijacking of the project's domain. The question then becomes whether or not the shutdown was related to the audit—for example, if there is a backdoor or serious vulnerability that the TrueCrypt developers anticipate Green will discover.

At this point, of course, such a discovery is purely speculation. Social media channels and discussion forums are filled with debates about other possibilities, such as government intervention like that which precipitated the sudden shutdowns of Lavabit and Silent Circle in August of 2013. Without further explanation from the TrueCrypt team, the community may never know for sure, and the team (as always) seems not to be speaking publicly.

But regardless of what led to the shutdown, TrueCrypt fans are left with a dilemma on their hands. If TrueCrypt had been released under a standard open-source or free-software license, then the community could easily take the last release and pick up development where the original authors left off. But the TrueCrypt license is not merely non-standard, it is confusing. As Richard Fontana noted in his summary of the OSI's consideration of the license, it even includes a provision that suggests anyone who does not understand whether or not they are in compliance with the license does not have the right to redistribute the code. Tom Callaway also noted that the TrueCrypt developers seem to intentionally reserve the right to sue for copyright infringement even if they remain in compliance with the license, a provision that makes the TrueCrypt source code not merely inconvenient, but perhaps even dangerous to work with.

In all likelihood, the community will move away from TrueCrypt and replace it with something else. Should Green's security audit or other subsequent investigations reveal a heretofore unknown explanation for the project's abrupt shutdown, that will be news in and of itself. But considering how well the TrueCrypt developers have managed to keep to themselves over the years, the odds are low that simple, clear explanation for these events is on its way.

Comments (2 posted)

Brief items

Security quotes of the week

Many critics claim that blanket surveillance amounts to treating everyone like a criminal, but I wonder if it goes deeper than that. I think maybe it makes us feel like prey.
Peter Watts [PDF] (worth reading in full)

But the judge created a loophole: without a hearing, I was never given the opportunity to object, let alone make any any substantive defense, to the contempt [charge]. Without any objection (because I wasn't allowed a hearing), the appellate court waived consideration of the substantive questions my case raised – and upheld the contempt charge, on the grounds that I hadn't disputed it in court. Since the US supreme court traditionally declines to review [cases] decided on wholly procedural grounds, I will be permanently denied justice.
— Lavabit's Ladar Levison

I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview.
— US FBI Director James B. Comey grapples with his hiring policies

Science fiction writers are suppose to go beyond predicting the automobile; we’re supposed to take the next step and predict smog alerts. So here’s a smog alert for you:

How long before local offline storage becomes either widely unavailable, or simply illegal?

Peter Watts (also worth reading in full)

Comments (19 posted)

Unsafe cookies leave WordPress accounts open to hijacking, 2-factor bypass (Ars Technica)

Ars Technica is reporting on a WordPress bug that allows attackers to use a captured, unencrypted cookie to break into an account. "[Electronic Frontier Foundation staff technologist Yan] Zhu snagged a cookie for her own account the same way a malicious hacker might and then pasted it into a fresh browser profile. When she visited WordPress she was immediately logged in—without having to enter her credentials and even though she had enabled two-factor authentication. She was then able to publish blog posts, read private posts and blog stats, and post comments that were attributed to her account. As if that wasn't enough, she was able to use the cookie to change the e-mail address assigned to the account and, if two-factor authentication wasn't already in place, set up the feature. That means a hacker exploiting the vulnerability could lock out a vulnerable user. When the legitimate user tried to access the account, the attempt would fail, since the one-time passcode would be sent to a number controlled by the attacker. Remarkably, the pilfered cookie will remain valid for three years, even if the victim logs out of the account before then."

Comments (16 posted)

Exim 4.82.1 security release

The developers of the Exim mail transport agent have issued an urgent security release fixing a remote code execution vulnerability. Most users are probably not vulnerable, though: to be affected, a site must (1) be running the 4.82 release, and (2) have enabled the non-default EXPERIMENTAL_DMARC feature. Sites meeting those criteria should update immediately; everybody else can probably wait.

Full Story (comments: none)

"TrueCrypt is not secure," official SourceForge page abruptly warns (Ars Technica)

Ars Technica reports that the SourceForge-hosted web page for the TrueCrypt encryption program suddenly changed to carry a prominent security warning. It indicates that the program may "contain unfixed security issues" and "is not secure". A new version of TrueCrypt, 7.2, has been released, but with some major differences: "The SourceForge page, which was delivered to people trying to view truecrypt.org pages, contained a new version of the program that, according to this "diff" analysis [.diff.gz], appears to contain changes warning that the program isn't safe to use. Curiously, the new release also appeared to let users decrypt encrypted data but not create new volumes. Significantly, TrueCrypt version 7.2 was certified with the official TrueCrypt private signing key, suggesting that the page warning that TrueCrypt isn't safe wasn't a hoax posted by hackers who managed to gain unauthorized access. After all, someone with the ability to sign new TrueCrypt releases probably wouldn't squander that hack with a prank."

Comments (48 posted)

New vulnerabilities

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2014-2706
Created:May 26, 2014 Updated:May 29, 2014
Description: From the Ubuntu advisory:

Yaara Rozenblum discovered a race condition in the Linux kernel's Generic IEEE 802.11 Networking Stack (mac80211). Remote attackers could exploit this flaw to cause a denial of service (system crash). (CVE-2014-2706)

Alerts:
Oracle ELSA-2015-0290 kernel 2015-03-12
SUSE SUSE-SU-2014:1316-1 Linux kernel 2014-10-22
SUSE SUSE-SU-2014:1319-1 Linux kernel 2014-10-23
Oracle ELSA-2014-1392 kernel 2014-10-21
openSUSE openSUSE-SU-2014:1246-1 kernel 2014-09-28
Red Hat RHSA-2014:1101-01 kernel 2014-08-27
CentOS CESA-2014:0981 kernel 2014-07-31
Scientific Linux SLSA-2014:0981-1 kernel 2014-07-29
Oracle ELSA-2014-0981 kernel 2014-07-29
Oracle ELSA-2014-1023 kernel 2014-08-06
CentOS CESA-2014:1023 kernel 2014-08-06
Red Hat RHSA-2014:1023-01 kernel 2014-08-06
Red Hat RHSA-2014:0981-01 kernel 2014-07-29
Red Hat RHSA-2014:0557-01 kernel-rt 2014-05-27
Ubuntu USN-2227-1 linux-ti-omap4 2014-05-27
Ubuntu USN-2225-1 linux-lts-saucy 2014-05-27
Ubuntu USN-2224-1 linux-lts-raring 2014-05-27
Ubuntu USN-2223-1 linux-lts-quantal 2014-05-27
Ubuntu USN-2228-1 kernel 2014-05-27
Ubuntu USN-2221-1 kernel 2014-05-26
Mandriva MDVSA-2014:124 kernel 2014-06-13

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2014-2673
Created:May 27, 2014 Updated:May 29, 2014
Description: From the CVE entry:

The arch_dup_task_struct function in the Transactional Memory (TM) implementation in arch/powerpc/kernel/process.c in the Linux kernel before 3.13.7 on the powerpc platform does not properly interact with the clone and fork system calls, which allows local users to cause a denial of service (Program Check and system crash) via certain instructions that are executed with the processor in the Transactional state.

Alerts:
Oracle ELSA-2015-0290 kernel 2015-03-12
Oracle ELSA-2014-1023 kernel 2014-08-06
CentOS CESA-2014:1023 kernel 2014-08-06
Red Hat RHSA-2014:1023-01 kernel 2014-08-06
Ubuntu USN-2225-1 linux-lts-saucy 2014-05-27
Ubuntu USN-2228-1 kernel 2014-05-27

Comments (none posted)

mod-wsgi: two vulnerabilities

Package(s):mod-wsgi CVE #(s):CVE-2014-0240 CVE-2014-0242
Created:May 26, 2014 Updated:December 15, 2014
Description: From the Ubuntu advisory:

Róbert Kisteleki discovered mod_wsgi incorrectly checked setuid return values. A malicious application could use this issue to cause a local privilege escalation when using daemon mode. (CVE-2014-0240)

Buck Golemon discovered that mod_wsgi used memory that had been freed. A remote attacker could use this issue to read process memory via the Content-Type response header. This issue only affected Ubuntu 12.04 LTS. (CVE-2014-0242)

Alerts:
Gentoo 201412-21 mod_wsgi 2014-12-13
Oracle ELSA-2014-1091 mod_wsgi 2014-08-25
CentOS CESA-2014:1091 mod_wsgi 2014-08-25
Red Hat RHSA-2014:1091-01 mod_wsgi 2014-08-25
Mandriva MDVSA-2014:137 apache-mod_wsgi 2014-07-11
Scientific Linux SLSA-2014:0788-1 mod_wsgi 2014-06-25
Oracle ELSA-2014-0788 mod_wsgi 2014-06-25
CentOS CESA-2014:0788 mod_wsgi 2014-06-25
Red Hat RHSA-2014:0789-01 python27-mod_wsgi, python33-mod_wsgi 2014-06-25
Red Hat RHSA-2014:0788-01 mod_wsgi 2014-06-25
Fedora FEDORA-2014-6938 mod_wsgi 2014-06-17
Fedora FEDORA-2014-6944 mod_wsgi 2014-06-17
Debian DSA-2937-1 mod-wsgi 2014-05-27
Ubuntu USN-2222-1 mod-wsgi 2014-05-26
openSUSE openSUSE-SU-2014:0782-1 apache2-mod_wsgi 2014-06-12

Comments (none posted)

mumble: multiple vulnerabilities

Package(s):mumble CVE #(s):CVE-2014-3755 CVE-2014-3756
Created:May 23, 2014 Updated:May 30, 2014
Description:

From the openSUSE advisory:

The Mumble client did not properly HTML-escape some external strings before using them in a rich-text (HTML) context (CVE-2014-3756).

SVG images with local file references could trigger client DoS (CVE-2014-3755).

Alerts:
Gentoo 201406-06 mumble 2014-06-06
Mageia MGASA-2014-0245 mumble 2014-05-30
Fedora FEDORA-2014-6470 mumble 2014-05-28
Fedora FEDORA-2014-6472 mumble 2014-05-28
openSUSE openSUSE-SU-2014:0706-1 mumble 2014-05-23

Comments (none posted)

openstack-neutron: access restriction bypass

Package(s):openstack-neutron CVE #(s):CVE-2014-0187
Created:May 29, 2014 Updated:August 21, 2014
Description: From the Red Hat bugzilla entry:

Stephen Ma from Hewlett Packard and Christoph Thiel from Deutsche Telekom reported a vulnerability in Neutron security groups. By creating a security group rule with an invalid CIDR, an authenticated user may break openvswitch-agent process, preventing further rules from being applied on the host. Note: removal of the faulty rule is not enough, the openvswitch-agent must be restarted. All Neutron setups using Open vSwitch are affected.

Alerts:
openSUSE openSUSE-SU-2014:1051-1 openstack-neutron 2014-08-21
Red Hat RHSA-2014:0899-01 openstack-neutron 2014-07-17
Ubuntu USN-2255-1 neutron 2014-06-25
Fedora FEDORA-2014-6520 openstack-neutron 2014-05-28

Comments (none posted)

perl-LWP-Protocol-https: SSL certificate verification botch

Package(s):perl-LWP-Protocol-https CVE #(s):CVE-2014-3230
Created:May 22, 2014 Updated:June 9, 2014
Description: From the Red Hat bugzilla entry:

It was reported that libwww-perl (LWP), when using IO::Socket::SSL (the default) and when the HTTPS_CA_DIR or HTTPS_CA_FILE environment variables were set, would disable server certificate verification. Judging by the commit, the intention was to disable only hostname verification for compatibility with Crypt::SSLeay, but the resultant effect is that SSL_verify_mode is set to 0. This code was introduced in LWP::Protocol::https in version 6.04, so earlier versions are not vulnerable.

Alerts:
Ubuntu USN-2292-1 liblwp-protocol-https-perl 2014-07-17
Mageia MGASA-2014-0257 perl-LWP-Protocol-https 2014-06-06
Fedora FEDORA-2014-6369 perl-LWP-Protocol-https 2014-05-23
openSUSE openSUSE-SU-2014:0710-1 perl-LWP-Protocol-https 2014-05-23
Fedora FEDORA-2014-6303 perl-LWP-Protocol-https 2014-05-21

Comments (none posted)

PostfixAdmin: SQL command execution

Package(s):PostfixAdmin CVE #(s):CVE-2014-2655
Created:May 27, 2014 Updated:May 29, 2014
Description: From the CVE entry:

SQL injection vulnerability in the gen_show_status function in functions.inc.php in Postfix Admin (aka postfixadmin) before 2.3.7 allows remote authenticated users to execute arbitrary SQL commands via a new alias.

Alerts:
openSUSE openSUSE-SU-2014:0715-1 PostfixAdmin 2014-05-27

Comments (none posted)

rubygem-openshift-origin-node: code execution

Package(s):rubygem-openshift-origin-node CVE #(s):CVE-2014-0233
Created:May 22, 2014 Updated:May 29, 2014
Description: From the Red Hat advisory:

A command injection flaw was found in rubygem-openshift-origin-node. A remote, authenticated user permitted to run cartridges via the web interface could use this flaw to execute arbitrary code with root privileges on the Red Hat OpenShift node server. (CVE-2014-0233)

Alerts:
Red Hat RHSA-2014:0529-01 rubygem-openshift-origin-node 2014-05-21
Red Hat RHSA-2014:0530-01 rubygem-openshift-origin-node 2014-05-21

Comments (none posted)

torque: code execution

Package(s):torque CVE #(s):CVE-2014-0749
Created:May 23, 2014 Updated:May 29, 2014
Description:

From the Debian advisory:

John Fitzpatrick from MWR Labs reported a stack-based buffer overflow vulnerability in torque, a PBS-derived batch processing queueing system. An unauthenticated remote attacker could exploit this flaw to execute arbitrary code with root privileges.

Alerts:
Gentoo 201412-47 torque 2014-12-26
Debian DSA-2936-1 torque 2014-05-23

Comments (none posted)

webmin: multiple unspecified vulnerabilities

Package(s):webmin CVE #(s):
Created:May 23, 2014 Updated:May 29, 2014
Description:

From the Mageia advisory:

Webmin has been updated to version 1.690, which fixes a security issue in the cron module and several XSS issues in pop-up windows.

Alerts:
Mageia MGASA-2014-0233 webmin 2014-05-22

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds