Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
Posted Mar 6, 2020 23:27 UTC (Fri) by gus3 (guest, #61103)In reply to: Intel x86 Root of Trust: loss of trust by tau
Parent article: Intel x86 Root of Trust: loss of trust
I'm not sure what you mean by that. We have transparent volume encryption via LUKS, which serves the purpose really well, AFAICT. But I think you really meant to say "transparent file encryption," which is available in ext4, F2FS, and UBIFS.
As for a one-stop solution, I'm working on that. Please don't beg for a code release; I'm still in the research stage.
(FWIW: I worked 15 years ago for a company that had exactly what you're talking about, a real, working system, cross-platform [Linux, Solaris, AIX, and HP-UX] that even protected against UID 0 compromises. It was patented, but the patent was allowed to lapse after they were bought out. Now that ext4 has it, I'm interested in building that one-stop solution, based on the practice I learned 15 years ago, but it'll take time.)
Posted Mar 6, 2020 23:35 UTC (Fri)
by Cyberax (✭ supporter ✭, #52523)
[Link] (8 responses)
This is genuinely a good feature that is difficult to do in Linux.
Posted Mar 7, 2020 0:45 UTC (Sat)
by viro (subscriber, #7872)
[Link] (1 responses)
Posted Mar 7, 2020 0:48 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link]
But if you do neither, then you are going to lose your data.
Posted Mar 8, 2020 1:25 UTC (Sun)
by gus3 (guest, #61103)
[Link] (4 responses)
Posted Mar 8, 2020 7:18 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link] (3 responses)
Posted Mar 8, 2020 23:24 UTC (Sun)
by gus3 (guest, #61103)
[Link] (2 responses)
Your point about PIN's was already addressed in the plugin interface we had. It wouldn't be a big deal to send an SMS to a cell phone, saying "If you're trying to log in, enter the sum of 227 and 13, followed by the word 'percent'." So then, to gain access, you'd type "240 percent" at some secondary access prompt. And if you weren't trying to log in, when you got such a message, you'd be immediately aware that someone was trying to hack your key store. It's basic 2FA.
I'm simplifying this a lot, b/c the design that went into it had a lot of engineering and UI definition. There were other administrative features, like automatically granting keys to apps (delegation) and group sharing of keys (key links). I have no hope to implement those; I'll just be happy to make the d@mn thing work someday.
Posted Mar 9, 2020 0:21 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
To be able to secure the disk contents, you need to use a full 128-bit strength key. If you limit yourself to ASCII, then you're looking at passwords that are around 17 characters. This is way too long to remember properly or enter on every boot.
PINs in TPMs allow to lock the full-strength password with a simple PIN (6 numbers are enough) and makes it impossible to brute-force it by imposing hardware-assisted delays between each try.
Posted Mar 13, 2020 19:04 UTC (Fri)
by ecree (guest, #95790)
[Link]
Posted Mar 9, 2020 14:09 UTC (Mon)
by jgg (subscriber, #55211)
[Link]
Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
1) Integrity control. An attacker can modify your kernel to log all keystrokes and you won't see any difference.
2) PINs. You will have to enter the full encryption key every time. Even with key strengthening (with PBKDF or similar algorithms) you still need to have a fairly long password.
Intel x86 Root of Trust: loss of trust
Intel x86 Root of Trust: loss of trust
No, you're missing the point.
Intel x86 Root of Trust: loss of trust
Fwiw since developing https://github.com/ec429/passacaglia I've found to my surprise that 72-bit passwords (12 characters of Base64) only take about three uses to memorise and are pretty painless to enter. I haven't tried with longer ones, but given that I currently have more than one committed to memory, concatenating a pair of them for a 144-bit password doesn't seem impractical.
Intel x86 Root of Trust: loss of trust