In-band deduplication for Btrfs
In-band deduplication for Btrfs
Posted Mar 11, 2016 16:25 UTC (Fri) by nybble41 (subscriber, #55106)In reply to: In-band deduplication for Btrfs by micka
Parent article: In-band deduplication for Btrfs
Posted Mar 15, 2016 16:10 UTC (Tue)
by intgr (subscriber, #39733)
[Link] (1 responses)
I disagree, that actually is a very scary failure mode for a file system. If an attacker is allowed to influence what gets stored in a file system, then a preimage attack or possibly a clever application of a collision attack would allow poisoning the file system.
For instance, an attacker knows that some user wants to store document A on the system. The attacker can prepare a colliding document B and upload it before the user gets the chance to upload A. When document A is written later, the file system will throw away A and keep the tampered document B instead.
Consider that document A can be, for example, a system package update that the system administrator installs. Lulz ensues.
Posted Mar 15, 2016 17:26 UTC (Tue)
by nybble41 (subscriber, #55106)
[Link]
I wasn't trying to downplay the problems it would create for a filesystem, and I agree with everything else you said. However, SHA-256 hashes are used for more than just identifying blocks within filesystems for deduplication. The ability to create SHA-256 hash collisions would undermine the entire digital signature system, for example. Implementing a workaround is also easier in the context of deduplication—in the short term you can just turn it off while you reindex the drive with a different hash function. Unless the content of your filesystem is *really* important, the odds of anyone wasting a SHA-256 collision 0-day attack on it are vanishingly small, and even a major issue with the algorithm which cut the effective bit length in half would not represent an immediate practical threat.
In-band deduplication for Btrfs
In-band deduplication for Btrfs
> I disagree, that actually is a very scary failure mode for a file system.
