public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
@ 2014-06-01 12:31 Tanstaafl
  2014-06-01 17:45 ` Volker Armin Hemmann
  2014-06-03  7:17 ` Marc Stürmer
  0 siblings, 2 replies; 52+ messages in thread
From: Tanstaafl @ 2014-06-01 12:31 UTC (permalink / raw
  To: gentoo-user

Wow, I've been mostly offline for a few days, and this morning when 
playing catch up on the news, learned that Truecrypt, one of my all time 
favorite apps, is no more.

Some links of interest:

https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html

https://news.ycombinator.com/item?id=7812133

http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-01 12:31 [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? Tanstaafl
@ 2014-06-01 17:45 ` Volker Armin Hemmann
  2014-06-02  8:22   ` Dale
  2014-06-02 10:22   ` Tanstaafl
  2014-06-03  7:17 ` Marc Stürmer
  1 sibling, 2 replies; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-01 17:45 UTC (permalink / raw
  To: gentoo-user

Am 01.06.2014 14:31, schrieb Tanstaafl:
> Wow, I've been mostly offline for a few days, and this morning when
> playing catch up on the news, learned that Truecrypt, one of my all
> time favorite apps, is no more.
>
> Some links of interest:
>
> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>
> https://news.ycombinator.com/item?id=7812133
>
> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1
>
>

well, if true: good riddance. But I suspect some hacker-y or power
struggle.


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-01 17:45 ` Volker Armin Hemmann
@ 2014-06-02  8:22   ` Dale
  2014-06-02  8:53     ` Michael Hampicke
  2014-06-02  9:24     ` Volker Armin Hemmann
  2014-06-02 10:22   ` Tanstaafl
  1 sibling, 2 replies; 52+ messages in thread
From: Dale @ 2014-06-02  8:22 UTC (permalink / raw
  To: gentoo-user

Volker Armin Hemmann wrote:
> Am 01.06.2014 14:31, schrieb Tanstaafl:
>> Wow, I've been mostly offline for a few days, and this morning when
>> playing catch up on the news, learned that Truecrypt, one of my all
>> time favorite apps, is no more.
>>
>> Some links of interest:
>>
>> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>>
>> https://news.ycombinator.com/item?id=7812133
>>
>> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1
>>
>>
> well, if true: good riddance. But I suspect some hacker-y or power
> struggle.
>
>

I'm considering encrypting my home partition one of these days.  Given
the things that have come out in recent months, back doors and such,
what is a good program/software/tool to use that is well . . . secure? 
Is there such a thing now?

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  8:22   ` Dale
@ 2014-06-02  8:53     ` Michael Hampicke
  2014-06-02  9:20       ` Neil Bothwick
  2014-06-02  9:24     ` Volker Armin Hemmann
  1 sibling, 1 reply; 52+ messages in thread
From: Michael Hampicke @ 2014-06-02  8:53 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1111 bytes --]

Am 02.06.2014 10:22, schrieb Dale:
> Volker Armin Hemmann wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite apps, is no more.
>>>
>>> Some links of interest:
>>>
>>> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>>>
>>> https://news.ycombinator.com/item?id=7812133
>>>
>>> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1
>>>
>>>
>> well, if true: good riddance. But I suspect some hacker-y or power
>> struggle.
>>
>>
> 
> I'm considering encrypting my home partition one of these days.  Given
> the things that have come out in recent months, back doors and such,
> what is a good program/software/tool to use that is well . . . secure? 
> Is there such a thing now?
> 

Depends on your needs, for encrypting complete devices/partitions try
the kernels dm-crypt/luks module. If you just want to encrypt a
directory try encfs, and for file encryption there's openssl and gpg


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  8:53     ` Michael Hampicke
@ 2014-06-02  9:20       ` Neil Bothwick
  2014-06-02 10:24         ` Michael Hampicke
  2014-06-02 11:34         ` Mark David Dumlao
  0 siblings, 2 replies; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02  9:20 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 754 bytes --]

On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:

> > I'm considering encrypting my home partition one of these days.  Given
> > the things that have come out in recent months, back doors and such,
> > what is a good program/software/tool to use that is well . . .
> > secure? Is there such a thing now?
 
> Depends on your needs, for encrypting complete devices/partitions try
> the kernels dm-crypt/luks module. If you just want to encrypt a
> directory try encfs, and for file encryption there's openssl and gpg

Definitely dm-crypt/LUKS for partitions/devices, but why use encfs which
needs FUSE, when ecryptfs does the same thing in kernel space?


-- 
Neil Bothwick

Blessed be the pessimist for he hath made backups.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  8:22   ` Dale
  2014-06-02  8:53     ` Michael Hampicke
@ 2014-06-02  9:24     ` Volker Armin Hemmann
  2014-06-02  9:34       ` Neil Bothwick
  1 sibling, 1 reply; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-02  9:24 UTC (permalink / raw
  To: gentoo-user

Am 02.06.2014 10:22, schrieb Dale:
> Volker Armin Hemmann wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite apps, is no more.
>>>
>>> Some links of interest:
>>>
>>> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>>>
>>> https://news.ycombinator.com/item?id=7812133
>>>
>>> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1
>>>
>>>
>> well, if true: good riddance. But I suspect some hacker-y or power
>> struggle.
>>
>>
> I'm considering encrypting my home partition one of these days.  

why? if you are hacked, they just read what you are reading. Encryption
does not help you there at all.
If your box is used by the state against you they just force you to give
them the keys.

Just rm -rf /home if they a knocking on your door.



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  9:24     ` Volker Armin Hemmann
@ 2014-06-02  9:34       ` Neil Bothwick
  2014-06-02  9:48         ` Dale
  0 siblings, 1 reply; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02  9:34 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 433 bytes --]

On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:

> > I'm considering encrypting my home partition one of these days.    
> 
> why? if you are hacked, they just read what you are reading. Encryption
> does not help you there at all.

It helps if your computer is stolen. This is more, but not only, relevant
to laptops.


-- 
Neil Bothwick

Member, National Association For Tagline Assimilators (NAFTA)

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  9:34       ` Neil Bothwick
@ 2014-06-02  9:48         ` Dale
  2014-06-02 10:06           ` Alan McKinnon
  0 siblings, 1 reply; 52+ messages in thread
From: Dale @ 2014-06-02  9:48 UTC (permalink / raw
  To: gentoo-user

Neil Bothwick wrote:
> On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
>
>>> I'm considering encrypting my home partition one of these days.    
>> why? if you are hacked, they just read what you are reading. Encryption
>> does not help you there at all.
> It helps if your computer is stolen. This is more, but not only, relevant
> to laptops.
>
>

I admit, I have never used encryption like this before.  I am assuming
that if I logout of my GUI, then it is encrypted at that point?  Once I
log back in, it decrypts it again?  Am I at least close? 

I do have a desktop system.  No lappy, yet anyway.  Maybe one of these days.

Dale

:-)  :-)

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  9:48         ` Dale
@ 2014-06-02 10:06           ` Alan McKinnon
  2014-06-02 10:27             ` Dale
                               ` (2 more replies)
  0 siblings, 3 replies; 52+ messages in thread
From: Alan McKinnon @ 2014-06-02 10:06 UTC (permalink / raw
  To: gentoo-user

On 02/06/2014 11:48, Dale wrote:
> Neil Bothwick wrote:
>> On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
>>
>>>> I'm considering encrypting my home partition one of these days.    
>>> why? if you are hacked, they just read what you are reading. Encryption
>>> does not help you there at all.
>> It helps if your computer is stolen. This is more, but not only, relevant
>> to laptops.
>>
>>
> 
> I admit, I have never used encryption like this before.  I am assuming
> that if I logout of my GUI, then it is encrypted at that point?  Once I
> log back in, it decrypts it again?  Am I at least close? 

All disk encryption works to this general plan:

You log in (or boot up), the system asks for a password/key or whatever,
then unlocks the encryption used. Reads for the disk are decrypted on
the fly, writes are encrypted on the fly. What is on disk is always in
an encrypted state.

Safety depends on how you set it up - if you use full disk encryption
then you must unlock it at boot time. The disk is still readable until
you power off or reboot.

If you encrypt your home directory then you unlock it when you log in so
logging out of your DE safely locks things again.

You most likely want the second option, the odds that you have a valid
need to protect /usr and /opt are not good. As a regular user out there,
the stuff you want to protect is in /home (or you could easily move it
to /home). You'd also want to encrypt /tmp and swap as your running apps
often write secret stuff there (like ssh and gpg sockets) - that is
really just an extension of why you want to encrpyt /home itself


> I do have a desktop system.  No lappy, yet anyway.  Maybe one of these days.
> 
> Dale
> 
> :-)  :-)
> 


-- 
Alan McKinnon
alan.mckinnon@gmail.com



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-01 17:45 ` Volker Armin Hemmann
  2014-06-02  8:22   ` Dale
@ 2014-06-02 10:22   ` Tanstaafl
  2014-06-02 10:57     ` Volker Armin Hemmann
  1 sibling, 1 reply; 52+ messages in thread
From: Tanstaafl @ 2014-06-02 10:22 UTC (permalink / raw
  To: gentoo-user

On 6/1/2014 1:45 PM, Volker Armin Hemmann <volkerarmin@googlemail.com> 
wrote:
> Am 01.06.2014 14:31, schrieb Tanstaafl:
>> Wow, I've been mostly offline for a few days, and this morning when
>> playing catch up on the news, learned that Truecrypt, one of my all
>> time favorite apps, is no more.
>>
>> Some links of interest:
>>
>> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>>
>> https://news.ycombinator.com/item?id=7812133
>>
>> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1

> well, if true: good riddance.

Just because you don't like something doesn't mean it has no value. Yes, 
on linux, there are much better options, but for windows users, it is 
(was) the best solution available bar none, and an amazing product.

> But I suspect some hacker-y or power struggle.

Which means you took zero seconds to verify the veracity of the 
information. Uninformed comments are less than useless.

And I forgot that most here are not windows users for whatever reason 
(some are just elitist pricks, some are purists for philosophical 
reasons, and some simply don't have to use Windows for a $dayjob.

The fact is, Truecrypt is (was) THE GoTo encryption method for purely 
Windows based systems.

I just thought there might actually be some rational people on the list 
that would like to discuss the ramifications of such a major happening.

Guess I was wrong.


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  9:20       ` Neil Bothwick
@ 2014-06-02 10:24         ` Michael Hampicke
  2014-06-02 11:34         ` Mark David Dumlao
  1 sibling, 0 replies; 52+ messages in thread
From: Michael Hampicke @ 2014-06-02 10:24 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 787 bytes --]

Am 02.06.2014 11:20, schrieb Neil Bothwick:
> On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:
> 
>>> I'm considering encrypting my home partition one of these days.  Given
>>> the things that have come out in recent months, back doors and such,
>>> what is a good program/software/tool to use that is well . . .
>>> secure? Is there such a thing now?
>  
>> Depends on your needs, for encrypting complete devices/partitions try
>> the kernels dm-crypt/luks module. If you just want to encrypt a
>> directory try encfs, and for file encryption there's openssl and gpg
> 
> Definitely dm-crypt/LUKS for partitions/devices, but why use encfs which
> needs FUSE, when ecryptfs does the same thing in kernel space?
> 

True, I totally forgot about ecryptfs :-)


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:06           ` Alan McKinnon
@ 2014-06-02 10:27             ` Dale
  2014-06-02 10:56               ` Neil Bothwick
  2014-06-02 10:43             ` Rich Freeman
  2014-06-02 10:54             ` Neil Bothwick
  2 siblings, 1 reply; 52+ messages in thread
From: Dale @ 2014-06-02 10:27 UTC (permalink / raw
  To: gentoo-user

Alan McKinnon wrote:
> On 02/06/2014 11:48, Dale wrote:
>
>> I admit, I have never used encryption like this before.  I am assuming
>> that if I logout of my GUI, then it is encrypted at that point?  Once I
>> log back in, it decrypts it again?  Am I at least close? 
> All disk encryption works to this general plan:
>
> You log in (or boot up), the system asks for a password/key or whatever,
> then unlocks the encryption used. Reads for the disk are decrypted on
> the fly, writes are encrypted on the fly. What is on disk is always in
> an encrypted state.
>
> Safety depends on how you set it up - if you use full disk encryption
> then you must unlock it at boot time. The disk is still readable until
> you power off or reboot.
>
> If you encrypt your home directory then you unlock it when you log in so
> logging out of your DE safely locks things again.
>
> You most likely want the second option, the odds that you have a valid
> need to protect /usr and /opt are not good. As a regular user out there,
> the stuff you want to protect is in /home (or you could easily move it
> to /home). You'd also want to encrypt /tmp and swap as your running apps
> often write secret stuff there (like ssh and gpg sockets) - that is
> really just an extension of why you want to encrpyt /home itself
>

The second option does sound what I am looking for.  Basically, if I log
out but leave my computer on, leave home, some crook/NSA type breaks in
and tries to access something or steals my whole puter, they would just
get garbage for data.  That seems to fit the second option best. 

I'll have to get me a new hard drive first tho.  I'm going to try and
get a 4TB drive at some point and use the current 3TB drive for backups,
encrypted to I hope. 

Thanks for the info.  Water is not quite so muddy. 

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:06           ` Alan McKinnon
  2014-06-02 10:27             ` Dale
@ 2014-06-02 10:43             ` Rich Freeman
  2014-06-02 10:54             ` Neil Bothwick
  2 siblings, 0 replies; 52+ messages in thread
From: Rich Freeman @ 2014-06-02 10:43 UTC (permalink / raw
  To: gentoo-user

On Mon, Jun 2, 2014 at 6:06 AM, Alan McKinnon <alan.mckinnon@gmail.com> wrote:
> You log in (or boot up), the system asks for a password/key or whatever,
> then unlocks the encryption used.

The more common approach is to not prompt for a password/key, but
instead store it in the TPM using a trusted boot path.  This is
possible on Linux, but the only "distro" using it is ChromeOS as far
as I'm aware (granted, there are probably more Chromebooks in desktop
use these days than all the other distros combined).  On Windows this
is how just about everybody does it.

This is far more convenient as it does not require a password when
booting.  If you don't trust the person who will be using the machine
it is more secure against attacks by the legitimate user (typically in
these situations the computer is owned by a corporation, not the
end-user).

On the other hand, if somebody steals your laptop they can boot it
without issue.  Then if they have some way to exploit the running OS
they can get at the contents of the drive (though the home directory
could still be encrypted using the user's password on top of full-disk
encryption).

For attacks by anybody other than the NSA using the TPM is potentially
a lot more secure.  Instead of depending on a bunch of rounds of
crypto to prevent brute-forcing of a simple password you are depending
on the security of the TPM.  The TPM can be told to forget the key
after a certain number of failed attempts to get at it.  If you're
worried about the NSA it seems likely that your TPM has a back door
for them, but my sense is that if the NSA is THAT determined to get
your data there really isn't anything you're going to be able to do
about it.

Rich


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:06           ` Alan McKinnon
  2014-06-02 10:27             ` Dale
  2014-06-02 10:43             ` Rich Freeman
@ 2014-06-02 10:54             ` Neil Bothwick
  2014-06-04 19:59               ` Frank Steinmetzger
  2 siblings, 1 reply; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02 10:54 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 644 bytes --]

On Mon, 02 Jun 2014 12:06:18 +0200, Alan McKinnon wrote:

> If you encrypt your home directory then you unlock it when you log in so
> logging out of your DE safely locks things again.
> 
> You most likely want the second option, the odds that you have a valid
> need to protect /usr and /opt are not good. As a regular user out there,
> the stuff you want to protect is in /home (or you could easily move it
> to /home).

With one notable exception. There is sometimes sensitive information
in /etc, like wireless passwords.


-- 
Neil Bothwick

Being defeated is a temporary condition. Giving up is what makes it
permanent

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:27             ` Dale
@ 2014-06-02 10:56               ` Neil Bothwick
  2014-06-02 11:04                 ` Dale
                                   ` (3 more replies)
  0 siblings, 4 replies; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02 10:56 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 615 bytes --]

On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:

> The second option does sound what I am looking for.  Basically, if I log
> out but leave my computer on, leave home, some crook/NSA type breaks in
> and tries to access something or steals my whole puter, they would just
> get garbage for data.  That seems to fit the second option best. 

If they steal your computer they will have to power it off, unless you
are kind enough to leave them a large enough UPS to steal along with it,
so any encryption will be equally effective.


-- 
Neil Bothwick

Capt'n! The spellchecker kinna take this abuse!

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:22   ` Tanstaafl
@ 2014-06-02 10:57     ` Volker Armin Hemmann
  0 siblings, 0 replies; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-02 10:57 UTC (permalink / raw
  To: gentoo-user

Am 02.06.2014 12:22, schrieb Tanstaafl:
> On 6/1/2014 1:45 PM, Volker Armin Hemmann <volkerarmin@googlemail.com>
> wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite apps, is no more.
>>>
>>> Some links of interest:
>>>
>>> https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html
>>>
>>> https://news.ycombinator.com/item?id=7812133
>>>
>>> http://community.spiceworks.com/topic/505372-truecrypt-is-dead?page=1
>
>> well, if true: good riddance.
>
> Just because you don't like something doesn't mean it has no value.
> Yes, on linux, there are much better options, but for windows users,
> it is (was) the best solution available bar none, and an amazing product.

no, I mean good riddance of a shady, probably stolen software with
unknown devs behind it holding the keys to your data. You should sweat a
lot right now.

>
>> But I suspect some hacker-y or power struggle.
>
> Which means you took zero seconds to verify the veracity of the
> information. Uninformed comments are less than useless.

I took a lot of time to gather information. And came to the conclusion
mentioned above. But please continue to waste my time with your useless
posts on this ml and your overall insulting tone. Oh, you know what,
forget it. I am always eager to lower the overall standards of
conversation.

>
> And I forgot that most here are not windows users for whatever reason
> (some are just elitist pricks, some are purists for philosophical
> reasons, and some simply don't have to use Windows for a $dayjob.

what does this mangled mess of a sentence has to do with anything?
Besides, you forgot: people who just don't like Windows or MacOSX and
are happy that they don't have to use that garbage at home. Bad enough
that you have to use it at work.

>
> The fact is, Truecrypt is (was) THE GoTo encryption method for purely
> Windows based systems.

really? Why? And why should I care? There are many (good) methods.
Another one will take over soon. But if I ask any of my 300 co-workers,
I am sure that only 3 would know what truecrypt is.

>
> I just thought there might actually be some rational people on the
> list that would like to discuss the ramifications of such a major
> happening.
>
> Guess I was wrong.
>

what 'ramifications'? that a shady software, developed in the shadow,
with a strange licence suddenly goes away?



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:56               ` Neil Bothwick
@ 2014-06-02 11:04                 ` Dale
  2014-06-02 11:10                   ` Neil Bothwick
  2014-06-02 11:28                 ` Rich Freeman
                                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 52+ messages in thread
From: Dale @ 2014-06-02 11:04 UTC (permalink / raw
  To: gentoo-user

Neil Bothwick wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for.  Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals my whole puter, they would just
>> get garbage for data.  That seems to fit the second option best. 
> If they steal your computer they will have to power it off, unless you
> are kind enough to leave them a large enough UPS to steal along with it,
> so any encryption will be equally effective.
>
>

True but just in case they decide to sit down and give it a whirl first,
may as well be encrypted.  It gives me a shot at least.  I access my
bank and such on this thing.  I'd rather they not get that for sure. 

That said, my UPS claims it will run for about a hour or so.  They could
go quite a ways around here in a hour. 

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:04                 ` Dale
@ 2014-06-02 11:10                   ` Neil Bothwick
  2014-06-02 11:33                     ` Dale
  2014-06-02 13:23                     ` J. Roeleveld
  0 siblings, 2 replies; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02 11:10 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 413 bytes --]

On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:

> That said, my UPS claims it will run for about a hour or so.  They could
> go quite a ways around here in a hour. 

Mine won't last that long, but it does make quite a racket when you
disconnect the mains, maybe loud enough to have a thief leave it behind.


-- 
Neil Bothwick

Life is a sexually transmitted disease and the mortality rate is 100%.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:56               ` Neil Bothwick
  2014-06-02 11:04                 ` Dale
@ 2014-06-02 11:28                 ` Rich Freeman
  2014-06-02 12:06                   ` Dale
                                     ` (2 more replies)
  2014-06-02 13:22                 ` J. Roeleveld
  2014-06-02 16:54                 ` Volker Armin Hemmann
  3 siblings, 3 replies; 52+ messages in thread
From: Rich Freeman @ 2014-06-02 11:28 UTC (permalink / raw
  To: gentoo-user

On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for.  Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals my whole puter, they would just
>> get garbage for data.  That seems to fit the second option best.
>
> If they steal your computer they will have to power it off, unless you
> are kind enough to leave them a large enough UPS to steal along with it,
> so any encryption will be equally effective.

If you're worried about casual thieves then just about any kind of
properly-implemented encryption will stop them.

If you're worried about a government official specifically tasked with
retrieving your computer, my understanding is that it is SOP these
days to retrieve your computer without powering it off for just this
reason.  They won't use your UPS to do it.  Typically they remove the
plug just far enough to expose the prongs, slide in a connector that
connects it to a UPS, and then they pull it out the rest of the way
now powered by the UPS.

See something like:
http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/

Presumably somebody who is determined will also have the means to
retrieve the contents of RAM once they seize your computer.  Besides
directlly accessing the memory bus I think most motherboards are not
designed to be secure against attacks from PCI/firewire/etc.

Rich


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:10                   ` Neil Bothwick
@ 2014-06-02 11:33                     ` Dale
  2014-06-02 13:23                     ` J. Roeleveld
  1 sibling, 0 replies; 52+ messages in thread
From: Dale @ 2014-06-02 11:33 UTC (permalink / raw
  To: gentoo-user

Neil Bothwick wrote:
> On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:
>
>> That said, my UPS claims it will run for about a hour or so.  They could
>> go quite a ways around here in a hour. 
> Mine won't last that long, but it does make quite a racket when you
> disconnect the mains, maybe loud enough to have a thief leave it behind.
>
>


I have a CyberPower 1350 and it runs quiet.  It does have a small fan
that comes on when running off the batteries but it's quiet enough.  The
beeping gets on my nerves tho.  My puter only pulls about 150 watts and
that is with the router, modem and monitor all running.  If they unplug
all that except for the puter, then it may run for over a hour. 

What I should do when I have the puter turned off again is run the power
plug through my desk or something in such a way that it would have to be
unplugged before moving the puter.  Well, I guess they could take the
desk to but given the layout of the place, good luck with that.  I had
to disassemble the desk to get it down the hallway. 

Gosh, this could get a bit crazy after a while.  Thing is, I don't have
any trust in the Govt here.  It's been questionable for a good long
while but now, zip, nada, null etc etc etc. 

Now to catch those 4TB drives on sale.  ;-) 

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02  9:20       ` Neil Bothwick
  2014-06-02 10:24         ` Michael Hampicke
@ 2014-06-02 11:34         ` Mark David Dumlao
  2014-06-02 12:27           ` Neil Bothwick
  1 sibling, 1 reply; 52+ messages in thread
From: Mark David Dumlao @ 2014-06-02 11:34 UTC (permalink / raw
  To: gentoo-user

On Mon, Jun 2, 2014 at 5:20 PM, Neil Bothwick <neil@digimed.co.uk> wrote:
> On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:
>
>> > I'm considering encrypting my home partition one of these days.  Given
>> > the things that have come out in recent months, back doors and such,
>> > what is a good program/software/tool to use that is well . . .
>> > secure? Is there such a thing now?
>
>> Depends on your needs, for encrypting complete devices/partitions try
>> the kernels dm-crypt/luks module. If you just want to encrypt a
>> directory try encfs, and for file encryption there's openssl and gpg
>
> Definitely dm-crypt/LUKS for partitions/devices, but why use encfs which
> needs FUSE, when ecryptfs does the same thing in kernel space?
>

for dual-boot systems, or simply from the point of system recovery, I
find it really attractive that I can, for example, open an encfs
filesystem in "the other operating system" (there's an encfs for
windows). Besides, I think the fact that you're doing encryption /
decryption on the fly completely overshadows the performance hit from
running a userspace filesystem anyways. Also, it's extremely
convenient to be able to mount / unmount the encfs on the fly without
su, sudo, or messing with fstab, as, for instance, with the case of
portable hard disks or usb sticks, where you don't want to
automatically unencrypt the contents unless you're prompted for the
password.
-- 
This email is:    [ ] actionable   [x] fyi        [ ] social
Response needed:  [ ] yes          [x] up to you  [ ] no
Time-sensitive:   [ ] immediate    [ ] soon       [x] none


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:28                 ` Rich Freeman
@ 2014-06-02 12:06                   ` Dale
  2014-06-02 12:28                     ` Michael Hampicke
                                       ` (2 more replies)
  2014-06-02 13:40                   ` J. Roeleveld
  2014-06-02 17:14                   ` Volker Armin Hemmann
  2 siblings, 3 replies; 52+ messages in thread
From: Dale @ 2014-06-02 12:06 UTC (permalink / raw
  To: gentoo-user

Rich Freeman wrote:
> If you're worried about casual thieves then just about any kind of
> properly-implemented encryption will stop them.
>
> If you're worried about a government official specifically tasked with
> retrieving your computer, my understanding is that it is SOP these
> days to retrieve your computer without powering it off for just this
> reason.  They won't use your UPS to do it.  Typically they remove the
> plug just far enough to expose the prongs, slide in a connector that
> connects it to a UPS, and then they pull it out the rest of the way
> now powered by the UPS.
>
> See something like:
> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
>
> Presumably somebody who is determined will also have the means to
> retrieve the contents of RAM once they seize your computer.  Besides
> directlly accessing the memory bus I think most motherboards are not
> designed to be secure against attacks from PCI/firewire/etc.
>
> Rich
>
>


Now that is wicked.  Like I said, this could get crazy.  ROFL  Thing is,
with Linux, it could be set up to run a script so that if say the
keyboard/mouse/some other device is removed, it runs shutdown.  It seems
the biggest thing as for as Govt goes, having it do something they can't
anticipate it doing that locks things down or does a rm -rfv /* or some
other nasty command. 

I might add, on a older rig I tried that command once.  I ran rm -rfv /*
and it didn't erase everything like I thought it would.  I figured the
command would be loaded in ram and would run until the end of the /
structure.  It didn't.  I can't recall how far it got now but I think it
was in the /proc directory.  I figure it deleted the process and sort of
forgot to finish.  It's been a while since I did that tho.  Details are
fuzzy. 

Dale

:-)  :-) 

-- 
I am only responsible for what I said ... Not for what you understood or how you interpreted my words!



^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 13:40                   ` J. Roeleveld
@ 2014-06-02 12:23                     ` Matti Nykyri
  2014-06-02 12:36                       ` godzil
  2014-06-02 14:52                       ` J. Roeleveld
  0 siblings, 2 replies; 52+ messages in thread
From: Matti Nykyri @ 2014-06-02 12:23 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:

> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>>> The second option does sound what I am looking for.  Basically, if I log
>>>> out but leave my computer on, leave home, some crook/NSA type breaks in
>>>> and tries to access something or steals my whole puter, they would just
>>>> get garbage for data.  That seems to fit the second option best.
>>> 
>>> If they steal your computer they will have to power it off, unless you
>>> are kind enough to leave them a large enough UPS to steal along with it,
>>> so any encryption will be equally effective.
>> 
>> If you're worried about casual thieves then just about any kind of
>> properly-implemented encryption will stop them.
>> 
>> If you're worried about a government official specifically tasked with
>> retrieving your computer, my understanding is that it is SOP these
>> days to retrieve your computer without powering it off for just this
>> reason.  They won't use your UPS to do it.  Typically they remove the
>> plug just far enough to expose the prongs, slide in a connector that
>> connects it to a UPS, and then they pull it out the rest of the way
>> now powered by the UPS.
>> 
>> See something like:
>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
> 
> Hmm... Those are nice, but can be easily built yourself with an off-the-shelf 
> UPS.
> 
>> Presumably somebody who is determined will also have the means to
>> retrieve the contents of RAM once they seize your computer.  Besides
>> directlly accessing the memory bus I think most motherboards are not
>> designed to be secure against attacks from PCI/firewire/etc.
> 
> Hmm... add something to auto-shutdown the computer when a hotplug event occurs 
> on any of the internal ports and remove support for unused ports from the 
> kernel.
> 
> I wonder how they'd keep a computer from initiating a shutdown procedure or 
> causing a kernel panic when it looses (wireless) connection to another device 
> that is unlikely to be moved when powered up?

Well i have a switch in the door of the server room. It opens when you open the door. That signals the kernel to wipe all the encryption keys from kernel memory. Without the keys there is no access to the disks. After that another kernel is executed which wipes the memory of the old kernel. If you just pull the plug memory will stay in its state for an unspecified time.

Swap uses random keys.

network switches and routers get power only after firewall-server is up and running.

There is no easy way to enter the room without wipeing the encryption keys. Booting up the server requires that a boot disk is brought to the computer to decrypt the boot drive. Grub2 can do this easily. This is to prevent some one to tamper eith a boot loader.

System is not protected against hardware tamperment. The server room is an RF-cage.

I consoder this setup quite secure.

-- 
-Matti

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:34         ` Mark David Dumlao
@ 2014-06-02 12:27           ` Neil Bothwick
  0 siblings, 0 replies; 52+ messages in thread
From: Neil Bothwick @ 2014-06-02 12:27 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1151 bytes --]

On Mon, 2 Jun 2014 19:34:40 +0800, Mark David Dumlao wrote:

> > Definitely dm-crypt/LUKS for partitions/devices, but why use encfs
> > which needs FUSE, when ecryptfs does the same thing in kernel space?

> for dual-boot systems, or simply from the point of system recovery, I
> find it really attractive that I can, for example, open an encfs
> filesystem in "the other operating system" (there's an encfs for
> windows).

I don't use Windows, so my "other operating system" is usually System
Rescue Cd :)

> Besides, I think the fact that you're doing encryption /
> decryption on the fly completely overshadows the performance hit from
> running a userspace filesystem anyways.

Or adds to it...

> Also, it's extremely
> convenient to be able to mount / unmount the encfs on the fly without
> su, sudo, or messing with fstab, as, for instance, with the case of
> portable hard disks or usb sticks, where you don't want to
> automatically unencrypt the contents unless you're prompted for the
> password.

AFAIR ecryptfs doesn't require root privileges.


-- 
Neil Bothwick

Anyone able to feel pain is trainable.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:06                   ` Dale
@ 2014-06-02 12:28                     ` Michael Hampicke
  2014-06-02 12:30                     ` Matti Nykyri
  2014-06-02 13:27                     ` Rich Freeman
  2 siblings, 0 replies; 52+ messages in thread
From: Michael Hampicke @ 2014-06-02 12:28 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 826 bytes --]

> I might add, on a older rig I tried that command once.  I ran rm -rfv /*
> and it didn't erase everything like I thought it would.  I figured the
> command would be loaded in ram and would run until the end of the /
> structure.  It didn't.  I can't recall how far it got now but I think it
> was in the /proc directory.  I figure it deleted the process and sort of
> forgot to finish.  It's been a while since I did that tho.  Details are
> fuzzy. 

# rm -rfv /
rm: it is dangerous to operate recursively on ‘/’
rm: use --no-preserve-root to override this failsafe

# rm -rfv --no-preserve-root /
** deletes lots of stuff**
** cannot delete in /proc **
** cannot delete in /sys **
** deletes more stuff **
** finshed with status 0 **

System broken :-) Don't worry, it was only a virtual machine.


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:06                   ` Dale
  2014-06-02 12:28                     ` Michael Hampicke
@ 2014-06-02 12:30                     ` Matti Nykyri
  2014-06-02 13:27                     ` Rich Freeman
  2 siblings, 0 replies; 52+ messages in thread
From: Matti Nykyri @ 2014-06-02 12:30 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 2, 2014, at 15:06, Dale <rdalek1967@gmail.com> wrote:

> Rich Freeman wrote:
>> If you're worried about casual thieves then just about any kind of
>> properly-implemented encryption will stop them.
>> 
>> If you're worried about a government official specifically tasked with
>> retrieving your computer, my understanding is that it is SOP these
>> days to retrieve your computer without powering it off for just this
>> reason.  They won't use your UPS to do it.  Typically they remove the
>> plug just far enough to expose the prongs, slide in a connector that
>> connects it to a UPS, and then they pull it out the rest of the way
>> now powered by the UPS.
>> 
>> See something like:
>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
>> 
>> Presumably somebody who is determined will also have the means to
>> retrieve the contents of RAM once they seize your computer.  Besides
>> directlly accessing the memory bus I think most motherboards are not
>> designed to be secure against attacks from PCI/firewire/etc.
>> 
>> Rich
>> 
>> 
> 
> 
> Now that is wicked.  Like I said, this could get crazy.  ROFL  Thing is,
> with Linux, it could be set up to run a script so that if say the
> keyboard/mouse/some other device is removed, it runs shutdown.  It seems
> the biggest thing as for as Govt goes, having it do something they can't
> anticipate it doing that locks things down or does a rm -rfv /* or some
> other nasty command. 
> 
> I might add, on a older rig I tried that command once.  I ran rm -rfv /*
> and it didn't erase everything like I thought it would.  I figured the
> command would be loaded in ram and would run until the end of the /
> structure.  It didn't.  I can't recall how far it got now but I think it
> was in the /proc directory.  I figure it deleted the process and sort of
> forgot to finish.  It's been a while since I did that tho.  Details are
> fuzzy. 

Well rm does not remove anything. It just unlinks the data. If you use journalling fs, everithing is recoverable from journal easily. And even without the journal you will easily get most of the data.

dd if=/dev/zero of=/dev/your-root-drive bs=4096

This will wipe data so that it is quite hard to retrive it. Retriving would require opening the drive, etc...

-- 
-Matti

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:23                     ` Matti Nykyri
@ 2014-06-02 12:36                       ` godzil
  2014-06-02 12:58                         ` Matti Nykyri
  2014-06-02 14:52                       ` J. Roeleveld
  1 sibling, 1 reply; 52+ messages in thread
From: godzil @ 2014-06-02 12:36 UTC (permalink / raw
  To: gentoo-user

Le 2014-06-02 13:23, Matti Nykyri a écrit :
> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
> 
> 
> Well i have a switch in the door of the server room. It opens when you
> open the door. That signals the kernel to wipe all the encryption keys
> from kernel memory. Without the keys there is no access to the disks.
> After that another kernel is executed which wipes the memory of the
> old kernel. If you just pull the plug memory will stay in its state
> for an unspecified time.
> 
> Swap uses random keys.
> 
> network switches and routers get power only after firewall-server is
> up and running.
> 
> There is no easy way to enter the room without wipeing the encryption
> keys. Booting up the server requires that a boot disk is brought to
> the computer to decrypt the boot drive. Grub2 can do this easily. This
> is to prevent some one to tamper eith a boot loader.
> 
> System is not protected against hardware tamperment. The server room
> is an RF-cage.
> 
> I consoder this setup quite secure.

It's nice to encrypt and wipe things automatically, but what about the 
backups?


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:36                       ` godzil
@ 2014-06-02 12:58                         ` Matti Nykyri
  2014-06-02 13:29                           ` godzil
  0 siblings, 1 reply; 52+ messages in thread
From: Matti Nykyri @ 2014-06-02 12:58 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 2, 2014, at 15:36, godzil <godzil@godzil.net> wrote:

> Le 2014-06-02 13:23, Matti Nykyri a écrit :
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
>> Well i have a switch in the door of the server room. It opens when you
>> open the door. That signals the kernel to wipe all the encryption keys
>> from kernel memory. Without the keys there is no access to the disks.
>> After that another kernel is executed which wipes the memory of the
>> old kernel. If you just pull the plug memory will stay in its state
>> for an unspecified time.
>> Swap uses random keys.
>> network switches and routers get power only after firewall-server is
>> up and running.
>> There is no easy way to enter the room without wipeing the encryption
>> keys. Booting up the server requires that a boot disk is brought to
>> the computer to decrypt the boot drive. Grub2 can do this easily. This
>> is to prevent some one to tamper eith a boot loader.
>> System is not protected against hardware tamperment. The server room
>> is an RF-cage.
>> I consoder this setup quite secure.
> 
> It's nice to encrypt and wipe things automatically, but what about the backups?

Well i have backups on their own drive with its own keys. I have backups of the keys in another location. The drives are LUKS drivers with detached LUKS info.

-- 
-Matti

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:56               ` Neil Bothwick
  2014-06-02 11:04                 ` Dale
  2014-06-02 11:28                 ` Rich Freeman
@ 2014-06-02 13:22                 ` J. Roeleveld
  2014-06-02 16:54                 ` Volker Armin Hemmann
  3 siblings, 0 replies; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 13:22 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 11:56:24 AM Neil Bothwick wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> > The second option does sound what I am looking for.  Basically, if I log
> > out but leave my computer on, leave home, some crook/NSA type breaks in
> > and tries to access something or steals my whole puter, they would just
> > get garbage for data.  That seems to fit the second option best.
> 
> If they steal your computer they will have to power it off, unless you
> are kind enough to leave them a large enough UPS to steal along with it,
> so any encryption will be equally effective.

You only need a UPS that can keep a machine running for about a few minutes.
First start the portable generator, then unplug the UPS from the wall and plug 
it into the portable generator.
Then when in the car/van/truck/... plug it over from the portable generator 
into a 12V / 24V -> 120/240V DC/AC converter and drive to a location where you 
have the tools to hack into a running machine.

Best configure the machine to auto-power-down when it looses connection to a 
fixed device in your home, like the smart meter, bluetooth headset,... or 
anything else that has a built-in wireless capability.

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:10                   ` Neil Bothwick
  2014-06-02 11:33                     ` Dale
@ 2014-06-02 13:23                     ` J. Roeleveld
  1 sibling, 0 replies; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 13:23 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 12:10:38 PM Neil Bothwick wrote:
> On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:
> > That said, my UPS claims it will run for about a hour or so.  They could
> > go quite a ways around here in a hour.
> 
> Mine won't last that long, but it does make quite a racket when you
> disconnect the mains, maybe loud enough to have a thief leave it behind.

Those alarms are silenced when plugged back into a powersource and usually 
there is a silence-button on the UPS.

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 14:52                       ` J. Roeleveld
@ 2014-06-02 13:23                         ` Matti Nykyri
  2014-06-02 15:29                           ` J. Roeleveld
  2014-06-02 18:14                         ` Volker Armin Hemmann
  1 sibling, 1 reply; 52+ messages in thread
From: Matti Nykyri @ 2014-06-02 13:23 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 2, 2014, at 17:52, "J. Roeleveld" <joost@antarean.org> wrote:

> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
>>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
>>>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
>>>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>>>>> The second option does sound what I am looking for.  Basically, if I
>>>>>> log
>>>>>> out but leave my computer on, leave home, some crook/NSA type breaks in
>>>>>> and tries to access something or steals my whole puter, they would just
>>>>>> get garbage for data.  That seems to fit the second option best.
>>>>> 
>>>>> If they steal your computer they will have to power it off, unless you
>>>>> are kind enough to leave them a large enough UPS to steal along with it,
>>>>> so any encryption will be equally effective.
>>>> 
>>>> If you're worried about casual thieves then just about any kind of
>>>> properly-implemented encryption will stop them.
>>>> 
>>>> If you're worried about a government official specifically tasked with
>>>> retrieving your computer, my understanding is that it is SOP these
>>>> days to retrieve your computer without powering it off for just this
>>>> reason.  They won't use your UPS to do it.  Typically they remove the
>>>> plug just far enough to expose the prongs, slide in a connector that
>>>> connects it to a UPS, and then they pull it out the rest of the way
>>>> now powered by the UPS.
>>>> 
>>>> See something like:
>>>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
>>> 
>>> Hmm... Those are nice, but can be easily built yourself with an
>>> off-the-shelf UPS.
>>> 
>>>> Presumably somebody who is determined will also have the means to
>>>> retrieve the contents of RAM once they seize your computer.  Besides
>>>> directlly accessing the memory bus I think most motherboards are not
>>>> designed to be secure against attacks from PCI/firewire/etc.
>>> 
>>> Hmm... add something to auto-shutdown the computer when a hotplug event
>>> occurs on any of the internal ports and remove support for unused ports
>>> from the kernel.
>>> 
>>> I wonder how they'd keep a computer from initiating a shutdown procedure
>>> or
>>> causing a kernel panic when it looses (wireless) connection to another
>>> device that is unlikely to be moved when powered up?
>> 
>> Well i have a switch in the door of the server room. It opens when you open
>> the door. That signals the kernel to wipe all the encryption keys from
>> kernel memory. Without the keys there is no access to the disks. After that
>> another kernel is executed which wipes the memory of the old kernel. If you
>> just pull the plug memory will stay in its state for an unspecified time.
> 
> You don't happen to have a howto on how to set that up?

Well i have a deamon running and a self made logic device in COM-port. Very simple. It has a single serial-parallel converter to do simple IO. Currently it just controls one relay that powers the network-devices.

>> Swap uses random keys.
>> 
>> network switches and routers get power only after firewall-server is up and
>> running.
> 
> networked powersockets?

A normal logic port and a transistor and then relay that controls power to the sockets of the network-devices :)

>> There is no easy way to enter the room without wipeing the encryption keys.
>> Booting up the server requires that a boot disk is brought to the computer
>> to decrypt the boot drive. Grub2 can do this easily. This is to prevent
>> some one to tamper eith a boot loader.
>> 
>> System is not protected against hardware tamperment. The server room is an
>> RF-cage.
>> 
>> I consoder this setup quite secure.
> 
> Makes me wonder what it is you are protecting your server from. :)

Well just a hobby. I wanted to play with electronics. The server controls my heating, locks of the house, lights, airconditioning, fire-alarm and burglar-alarm. Gentoo-powered house...

-- 
-Matti

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:06                   ` Dale
  2014-06-02 12:28                     ` Michael Hampicke
  2014-06-02 12:30                     ` Matti Nykyri
@ 2014-06-02 13:27                     ` Rich Freeman
  2 siblings, 0 replies; 52+ messages in thread
From: Rich Freeman @ 2014-06-02 13:27 UTC (permalink / raw
  To: gentoo-user

On Mon, Jun 2, 2014 at 8:06 AM, Dale <rdalek1967@gmail.com> wrote:
> Now that is wicked.  Like I said, this could get crazy.

Meh.  I don't encrypt my disks for desktops at home.  My Chromebook
comes encrypted out-of-the-box (no doubt the NSA can have it unlocked
on request). If I had any other laptops I'd probably use full-disk
encryption of some kind on it.

My threat model for disk encryption is that somebody steals my laptop
and wants to rummage for passwords/credit card numbers/etc.  If they
stole my desktop they'd probably give up when they find the data is
stored on btrfs in raid1 mode, and even the vanilla ext4 backup disk
probably would deter them, but if they're stealing my desktop they're
probably stealing my passport, birth certificates, and all that other
good stuff anyway.

As far as the NSA sending Ninjas through the windows goes, I really
see the threat there as having two levels.  One is that the NSA does
pervasive monitoring of virtually everything they can get their hands
on to look for trends/etc.  The other is that the NSA has a specific
interest in you, for whatever reason.

For general NSA monitoring simply using https/TLS/etc is about as good
as you're going to get.  Chances are they aren't interested in
attacking your PC due to the economics of it, and if they use
zero-days widely there is a risk of them being detected (and thus the
bug they exploit gets fixed and they have to find another).  They
probably read any unencrypted packets that go through a router at any
of the big choke points - probably a substantial part of the total
volume crossing the internet.  They probably do not store most of that
data - they look for whatever they look for and discard the rest.
They probably have root on major service provider networks (either
with or without cooperation), so they're reading your
Gmail/Facebook/etc, so they really don't care if you use https to
connect to those services.

If you're a target of interest then the gloves come off, depending on
just how interesting you are.  Most likely you're going to be targeted
for a remote exploit with professional management of a rootkit on your
devices.  All your network traffic might be captured and retained.  If
you're really interesting they might send the ninjas at night.  You
get all those nice value-added-services like pre-installed rootkits in
any hardware you buy, probably from any vendor as long as it passes
through a country that is US-friendly (which is just about
everywhere).

If you're looking to evade general monitoring your best bet is to not
communicate with anybody who isn't as paranoid as you are.  You
probably should refrain from posting on lists like this one, as they
are recording the people you correspond with to determine what sort of
person you are.  Honestly, you're best off not using the Internet at
all, since there isn't anybody you can talk to who won't leak
everything to the NSA unwittingly.  However, the reality is that most
of us are pretty boring, so the NSA probably doesn't care what we do.

If you're looking to evade specific monitoring then I don't know what
to tell you.  They targeted the Iranian uranium enrichment program and
that was behind a sneakernet.  I suspect that they have different
levels of effort for various targets.  For example, Snowden revealed
that the NSA looks to root boxes belonging to sysadmins who have
access to services they're interested in - so if they wanted to poke
around on the Gentoo forum logs to find IPs they might look to root
members of infra, even though the members of infra aren't of interest
otherwise.  I run a tor relay and I wouldn't be surprised if they
rooted my box as a result - rooting all the tor relays would allow
them to de-anonymize tor completely.  Sure, you can wire up the door
to drop your server in a vat of acid, but that doesn't help if they
have a zero-day for your server.

Honestly, I just don't worry about it.  If they want to root me, I
doubt worrying about it is going to change anything.  I'd rather if
they didn't, or if they are going to do it anyway I wish that I could
just ask them to send me a copy of my data so that I could stop
worrying about running my own backups.

Rich


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:58                         ` Matti Nykyri
@ 2014-06-02 13:29                           ` godzil
  0 siblings, 0 replies; 52+ messages in thread
From: godzil @ 2014-06-02 13:29 UTC (permalink / raw
  To: gentoo-user

So you backup on harddrive, not tape and theses are not incremental 
backups.

But my question about backup was not only for you but for all that 
encrypt their servers.

The backup part is generally the weakest point.


Le 2014-06-02 13:58, Matti Nykyri a écrit :
> On Jun 2, 2014, at 15:36, godzil <godzil@godzil.net> wrote:
> 
>> Le 2014-06-02 13:23, Matti Nykyri a écrit :
>>> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
>>> Well i have a switch in the door of the server room. It opens when 
>>> you
>>> open the door. That signals the kernel to wipe all the encryption 
>>> keys
>>> from kernel memory. Without the keys there is no access to the disks.
>>> After that another kernel is executed which wipes the memory of the
>>> old kernel. If you just pull the plug memory will stay in its state
>>> for an unspecified time.
>>> Swap uses random keys.
>>> network switches and routers get power only after firewall-server is
>>> up and running.
>>> There is no easy way to enter the room without wipeing the encryption
>>> keys. Booting up the server requires that a boot disk is brought to
>>> the computer to decrypt the boot drive. Grub2 can do this easily. 
>>> This
>>> is to prevent some one to tamper eith a boot loader.
>>> System is not protected against hardware tamperment. The server room
>>> is an RF-cage.
>>> I consoder this setup quite secure.
>> 
>> It's nice to encrypt and wipe things automatically, but what about the 
>> backups?
> 
> Well i have backups on their own drive with its own keys. I have
> backups of the keys in another location. The drives are LUKS drivers
> with detached LUKS info.


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:28                 ` Rich Freeman
  2014-06-02 12:06                   ` Dale
@ 2014-06-02 13:40                   ` J. Roeleveld
  2014-06-02 12:23                     ` Matti Nykyri
  2014-06-02 17:14                   ` Volker Armin Hemmann
  2 siblings, 1 reply; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 13:40 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
> > On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >> The second option does sound what I am looking for.  Basically, if I log
> >> out but leave my computer on, leave home, some crook/NSA type breaks in
> >> and tries to access something or steals my whole puter, they would just
> >> get garbage for data.  That seems to fit the second option best.
> > 
> > If they steal your computer they will have to power it off, unless you
> > are kind enough to leave them a large enough UPS to steal along with it,
> > so any encryption will be equally effective.
> 
> If you're worried about casual thieves then just about any kind of
> properly-implemented encryption will stop them.
> 
> If you're worried about a government official specifically tasked with
> retrieving your computer, my understanding is that it is SOP these
> days to retrieve your computer without powering it off for just this
> reason.  They won't use your UPS to do it.  Typically they remove the
> plug just far enough to expose the prongs, slide in a connector that
> connects it to a UPS, and then they pull it out the rest of the way
> now powered by the UPS.
> 
> See something like:
> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/

Hmm... Those are nice, but can be easily built yourself with an off-the-shelf 
UPS.

> Presumably somebody who is determined will also have the means to
> retrieve the contents of RAM once they seize your computer.  Besides
> directlly accessing the memory bus I think most motherboards are not
> designed to be secure against attacks from PCI/firewire/etc.

Hmm... add something to auto-shutdown the computer when a hotplug event occurs 
on any of the internal ports and remove support for unused ports from the 
kernel.

I wonder how they'd keep a computer from initiating a shutdown procedure or 
causing a kernel panic when it looses (wireless) connection to another device 
that is unlikely to be moved when powered up?

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 12:23                     ` Matti Nykyri
  2014-06-02 12:36                       ` godzil
@ 2014-06-02 14:52                       ` J. Roeleveld
  2014-06-02 13:23                         ` Matti Nykyri
  2014-06-02 18:14                         ` Volker Armin Hemmann
  1 sibling, 2 replies; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 14:52 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
> > On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> >> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
> >>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >>>> The second option does sound what I am looking for.  Basically, if I
> >>>> log
> >>>> out but leave my computer on, leave home, some crook/NSA type breaks in
> >>>> and tries to access something or steals my whole puter, they would just
> >>>> get garbage for data.  That seems to fit the second option best.
> >>> 
> >>> If they steal your computer they will have to power it off, unless you
> >>> are kind enough to leave them a large enough UPS to steal along with it,
> >>> so any encryption will be equally effective.
> >> 
> >> If you're worried about casual thieves then just about any kind of
> >> properly-implemented encryption will stop them.
> >> 
> >> If you're worried about a government official specifically tasked with
> >> retrieving your computer, my understanding is that it is SOP these
> >> days to retrieve your computer without powering it off for just this
> >> reason.  They won't use your UPS to do it.  Typically they remove the
> >> plug just far enough to expose the prongs, slide in a connector that
> >> connects it to a UPS, and then they pull it out the rest of the way
> >> now powered by the UPS.
> >> 
> >> See something like:
> >> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
> > 
> > Hmm... Those are nice, but can be easily built yourself with an
> > off-the-shelf UPS.
> > 
> >> Presumably somebody who is determined will also have the means to
> >> retrieve the contents of RAM once they seize your computer.  Besides
> >> directlly accessing the memory bus I think most motherboards are not
> >> designed to be secure against attacks from PCI/firewire/etc.
> > 
> > Hmm... add something to auto-shutdown the computer when a hotplug event
> > occurs on any of the internal ports and remove support for unused ports
> > from the kernel.
> > 
> > I wonder how they'd keep a computer from initiating a shutdown procedure
> > or
> > causing a kernel panic when it looses (wireless) connection to another
> > device that is unlikely to be moved when powered up?
> 
> Well i have a switch in the door of the server room. It opens when you open
> the door. That signals the kernel to wipe all the encryption keys from
> kernel memory. Without the keys there is no access to the disks. After that
> another kernel is executed which wipes the memory of the old kernel. If you
> just pull the plug memory will stay in its state for an unspecified time.

You don't happen to have a howto on how to set that up?

> Swap uses random keys.
> 
> network switches and routers get power only after firewall-server is up and
> running.

networked powersockets?

> There is no easy way to enter the room without wipeing the encryption keys.
> Booting up the server requires that a boot disk is brought to the computer
> to decrypt the boot drive. Grub2 can do this easily. This is to prevent
> some one to tamper eith a boot loader.
> 
> System is not protected against hardware tamperment. The server room is an
> RF-cage.
> 
> I consoder this setup quite secure.

Makes me wonder what it is you are protecting your server from. :)

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 13:23                         ` Matti Nykyri
@ 2014-06-02 15:29                           ` J. Roeleveld
  2014-06-03 18:53                             ` Matti Nykyri
  0 siblings, 1 reply; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 15:29 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 04:23:07 PM Matti Nykyri wrote:
> On Jun 2, 2014, at 17:52, "J. Roeleveld" <joost@antarean.org> wrote:
> > On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
> >> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
> >>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> >>>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> 
wrote:
> >>>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >>>>>> The second option does sound what I am looking for.  Basically, if I
> >>>>>> log
> >>>>>> out but leave my computer on, leave home, some crook/NSA type breaks
> >>>>>> in
> >>>>>> and tries to access something or steals my whole puter, they would
> >>>>>> just
> >>>>>> get garbage for data.  That seems to fit the second option best.
> >>>>> 
> >>>>> If they steal your computer they will have to power it off, unless you
> >>>>> are kind enough to leave them a large enough UPS to steal along with
> >>>>> it,
> >>>>> so any encryption will be equally effective.
> >>>> 
> >>>> If you're worried about casual thieves then just about any kind of
> >>>> properly-implemented encryption will stop them.
> >>>> 
> >>>> If you're worried about a government official specifically tasked with
> >>>> retrieving your computer, my understanding is that it is SOP these
> >>>> days to retrieve your computer without powering it off for just this
> >>>> reason.  They won't use your UPS to do it.  Typically they remove the
> >>>> plug just far enough to expose the prongs, slide in a connector that
> >>>> connects it to a UPS, and then they pull it out the rest of the way
> >>>> now powered by the UPS.
> >>>> 
> >>>> See something like:
> >>>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
> >>> 
> >>> Hmm... Those are nice, but can be easily built yourself with an
> >>> off-the-shelf UPS.
> >>> 
> >>>> Presumably somebody who is determined will also have the means to
> >>>> retrieve the contents of RAM once they seize your computer.  Besides
> >>>> directlly accessing the memory bus I think most motherboards are not
> >>>> designed to be secure against attacks from PCI/firewire/etc.
> >>> 
> >>> Hmm... add something to auto-shutdown the computer when a hotplug event
> >>> occurs on any of the internal ports and remove support for unused ports
> >>> from the kernel.
> >>> 
> >>> I wonder how they'd keep a computer from initiating a shutdown procedure
> >>> or
> >>> causing a kernel panic when it looses (wireless) connection to another
> >>> device that is unlikely to be moved when powered up?
> >> 
> >> Well i have a switch in the door of the server room. It opens when you
> >> open
> >> the door. That signals the kernel to wipe all the encryption keys from
> >> kernel memory. Without the keys there is no access to the disks. After
> >> that
> >> another kernel is executed which wipes the memory of the old kernel. If
> >> you
> >> just pull the plug memory will stay in its state for an unspecified time.
> > 
> > You don't happen to have a howto on how to set that up?
> 
> Well i have a deamon running and a self made logic device in COM-port. Very
> simple. It has a single serial-parallel converter to do simple IO.
> Currently it just controls one relay that powers the network-devices.

I actually meant the software side:
- How to wipe the keys and then wipe the whole memory.

> >> I consoder this setup quite secure.
> > 
> > Makes me wonder what it is you are protecting your server from. :)
> 
> Well just a hobby. I wanted to play with electronics. The server controls my
> heating, locks of the house, lights, airconditioning, fire-alarm and
> burglar-alarm. Gentoo-powered house...

I would keep the system controlling all that off the internet with only a 
null-modem cable to an internet-connected server using a custom protocol.

Anything that doesn't match the protocol initiates a full lock-down of the 
house. ;)

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:56               ` Neil Bothwick
                                   ` (2 preceding siblings ...)
  2014-06-02 13:22                 ` J. Roeleveld
@ 2014-06-02 16:54                 ` Volker Armin Hemmann
  3 siblings, 0 replies; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-02 16:54 UTC (permalink / raw
  To: gentoo-user

Am 02.06.2014 12:56, schrieb Neil Bothwick:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for.  Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals my whole puter, they would just
>> get garbage for data.  That seems to fit the second option best. 
> If they steal your computer they will have to power it off, unless you
> are kind enough to leave them a large enough UPS to steal along with it,
> so any encryption will be equally effective.
>
>
if they go so far to steal his box, they will probably be willing to use
some rubber hose attacks to break the key...


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 11:28                 ` Rich Freeman
  2014-06-02 12:06                   ` Dale
  2014-06-02 13:40                   ` J. Roeleveld
@ 2014-06-02 17:14                   ` Volker Armin Hemmann
  2014-06-02 19:26                     ` J. Roeleveld
  2 siblings, 1 reply; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-02 17:14 UTC (permalink / raw
  To: gentoo-user

Am 02.06.2014 13:28, schrieb Rich Freeman:
> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>
>>> The second option does sound what I am looking for.  Basically, if I log
>>> out but leave my computer on, leave home, some crook/NSA type breaks in
>>> and tries to access something or steals my whole puter, they would just
>>> get garbage for data.  That seems to fit the second option best.
>> If they steal your computer they will have to power it off, unless you
>> are kind enough to leave them a large enough UPS to steal along with it,
>> so any encryption will be equally effective.
> If you're worried about casual thieves then just about any kind of
> properly-implemented encryption will stop them.
>
> If you're worried about a government official specifically tasked with
> retrieving your computer, my understanding is that it is SOP these
> days to retrieve your computer without powering it off for just this
> reason.  They won't use your UPS to do it.  Typically they remove the
> plug just far enough to expose the prongs, slide in a connector that
> connects it to a UPS, and then they pull it out the rest of the way
> now powered by the UPS.
>
> See something like:
> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
only works with sockets of unsafe design - aka american stuff.

Can not be used with Schuko sockets.




^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 14:52                       ` J. Roeleveld
  2014-06-02 13:23                         ` Matti Nykyri
@ 2014-06-02 18:14                         ` Volker Armin Hemmann
  1 sibling, 0 replies; 52+ messages in thread
From: Volker Armin Hemmann @ 2014-06-02 18:14 UTC (permalink / raw
  To: gentoo-user

Am 02.06.2014 16:52, schrieb J. Roeleveld:
> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
>>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
>>>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
>>>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>>>>> The second option does sound what I am looking for.  Basically, if I
>>>>>> log
>>>>>> out but leave my computer on, leave home, some crook/NSA type breaks in
>>>>>> and tries to access something or steals my whole puter, they would just
>>>>>> get garbage for data.  That seems to fit the second option best.
>>>>> If they steal your computer they will have to power it off, unless you
>>>>> are kind enough to leave them a large enough UPS to steal along with it,
>>>>> so any encryption will be equally effective.
>>>> If you're worried about casual thieves then just about any kind of
>>>> properly-implemented encryption will stop them.
>>>>
>>>> If you're worried about a government official specifically tasked with
>>>> retrieving your computer, my understanding is that it is SOP these
>>>> days to retrieve your computer without powering it off for just this
>>>> reason.  They won't use your UPS to do it.  Typically they remove the
>>>> plug just far enough to expose the prongs, slide in a connector that
>>>> connects it to a UPS, and then they pull it out the rest of the way
>>>> now powered by the UPS.
>>>>
>>>> See something like:
>>>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
>>> Hmm... Those are nice, but can be easily built yourself with an
>>> off-the-shelf UPS.
>>>
>>>> Presumably somebody who is determined will also have the means to
>>>> retrieve the contents of RAM once they seize your computer.  Besides
>>>> directlly accessing the memory bus I think most motherboards are not
>>>> designed to be secure against attacks from PCI/firewire/etc.
>>> Hmm... add something to auto-shutdown the computer when a hotplug event
>>> occurs on any of the internal ports and remove support for unused ports
>>> from the kernel.
>>>
>>> I wonder how they'd keep a computer from initiating a shutdown procedure
>>> or
>>> causing a kernel panic when it looses (wireless) connection to another
>>> device that is unlikely to be moved when powered up?
>> Well i have a switch in the door of the server room. It opens when you open
>> the door. That signals the kernel to wipe all the encryption keys from
>> kernel memory. Without the keys there is no access to the disks. After that
>> another kernel is executed which wipes the memory of the old kernel. If you
>> just pull the plug memory will stay in its state for an unspecified time.
> You don't happen to have a howto on how to set that up?
>
>> Swap uses random keys.
>>
>> network switches and routers get power only after firewall-server is up and
>> running.
> networked powersockets?
>
>> There is no easy way to enter the room without wipeing the encryption keys.
>> Booting up the server requires that a boot disk is brought to the computer
>> to decrypt the boot drive. Grub2 can do this easily. This is to prevent
>> some one to tamper eith a boot loader.
>>
>> System is not protected against hardware tamperment. The server room is an
>> RF-cage.
>>
>> I consoder this setup quite secure.
> Makes me wonder what it is you are protecting your server from. :)
>

some people really want to hide their porn collection.

No, I don't know what is in that black aluminium case. Yeah, lost the
keys a long time ago. No, I don't want to throw it away, the plant looks
so nice on it ...


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 17:14                   ` Volker Armin Hemmann
@ 2014-06-02 19:26                     ` J. Roeleveld
  0 siblings, 0 replies; 52+ messages in thread
From: J. Roeleveld @ 2014-06-02 19:26 UTC (permalink / raw
  To: gentoo-user

On Monday, June 02, 2014 07:14:27 PM Volker Armin Hemmann wrote:
> Am 02.06.2014 13:28, schrieb Rich Freeman:
> > On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> wrote:
> >> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >>> The second option does sound what I am looking for.  Basically, if I log
> >>> out but leave my computer on, leave home, some crook/NSA type breaks in
> >>> and tries to access something or steals my whole puter, they would just
> >>> get garbage for data.  That seems to fit the second option best.
> >> 
> >> If they steal your computer they will have to power it off, unless you
> >> are kind enough to leave them a large enough UPS to steal along with it,
> >> so any encryption will be equally effective.
> > 
> > If you're worried about casual thieves then just about any kind of
> > properly-implemented encryption will stop them.
> > 
> > If you're worried about a government official specifically tasked with
> > retrieving your computer, my understanding is that it is SOP these
> > days to retrieve your computer without powering it off for just this
> > reason.  They won't use your UPS to do it.  Typically they remove the
> > plug just far enough to expose the prongs, slide in a connector that
> > connects it to a UPS, and then they pull it out the rest of the way
> > now powered by the UPS.
> > 
> > See something like:
> > http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
> 
> only works with sockets of unsafe design - aka american stuff.
> 
> Can not be used with Schuko sockets.

Actually, it can be used with Schuko sockets, just a bit risky...

1) Strip the wire
2) split off the power wires
3) plug the powersupply directly onto the core of the cable.
4) unplug from the wall

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-01 12:31 [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? Tanstaafl
  2014-06-01 17:45 ` Volker Armin Hemmann
@ 2014-06-03  7:17 ` Marc Stürmer
  2014-06-03 10:00   ` Tanstaafl
  1 sibling, 1 reply; 52+ messages in thread
From: Marc Stürmer @ 2014-06-03  7:17 UTC (permalink / raw
  To: gentoo-user

Am 01.06.2014 14:31, schrieb Tanstaafl:

> Wow, I've been mostly offline for a few days, and this morning when
> playing catch up on the news, learned that Truecrypt, one of my all time
> favorite apps, is no more.

Well, considering the fact that Linux comes with its own bunch of 
encrytion possibilities on its own, the demise of TrueCrypt on Linux is 
neglectable.

Some people in Switzerland want to take over development, for further 
information take a look at www.truecrypt.ch.

And then there's tc-play, a free implementation of TrueCrypt based on 
dm-crypt (https://github.com/bwalex/tc-play), which allows reading and 
creating TrueCrypt volumes on your own. It just lacks a good GUI so far.

Cryptsetup since 1.6 supports reading the TrueCrypt on disk format.

And zuluCrypt is a frontend to cryptsetup and tcplay, which acts as a 
GUI for those.

So no loss at all if TrueCrypt would really cease to exist.


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03  7:17 ` Marc Stürmer
@ 2014-06-03 10:00   ` Tanstaafl
  2014-06-03 12:02     ` Mick
  2014-06-03 19:59     ` Marc Stürmer
  0 siblings, 2 replies; 52+ messages in thread
From: Tanstaafl @ 2014-06-03 10:00 UTC (permalink / raw
  To: gentoo-user

On 6/3/2014 3:17 AM, Marc Stürmer <mail@marc-stuermer.de> wrote:
> So no loss at all if TrueCrypt would really cease to exist.

Which totally misses the point of *how* it happened.

But never mind... it was definitely off-topic for gentoo.


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03 10:00   ` Tanstaafl
@ 2014-06-03 12:02     ` Mick
  2014-06-03 19:59     ` Marc Stürmer
  1 sibling, 0 replies; 52+ messages in thread
From: Mick @ 2014-06-03 12:02 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: Text/Plain, Size: 736 bytes --]

On Tuesday 03 Jun 2014 11:00:17 Tanstaafl wrote:
> On 6/3/2014 3:17 AM, Marc Stürmer <mail@marc-stuermer.de> wrote:
> > So no loss at all if TrueCrypt would really cease to exist.
> 
> Which totally misses the point of *how* it happened.
> 
> But never mind... it was definitely off-topic for gentoo.

With a secret development team in play we are verging on conspiracy theory 
territory, but could it be related to this latest announcement and 
Cryptolocker?

http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network

PS. I don't know how Cryptolocker works, but it reads as if it is a filesystem 
level, rather than block device level encryption tool.
-- 
Regards,
Mick

[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 15:29                           ` J. Roeleveld
@ 2014-06-03 18:53                             ` Matti Nykyri
  2014-06-03 21:05                               ` J. Roeleveld
  0 siblings, 1 reply; 52+ messages in thread
From: Matti Nykyri @ 2014-06-03 18:53 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 2, 2014, at 18:29, "J. Roeleveld" <joost@antarean.org> wrote:

> On Monday, June 02, 2014 04:23:07 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 17:52, "J. Roeleveld" <joost@antarean.org> wrote:
>>> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
>>>> On Jun 2, 2014, at 16:40, "J. Roeleveld" <joost@antarean.org> wrote:
>>>>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
>>>>>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <neil@digimed.co.uk> 
> wrote:
>>>>>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>>>>>>> The second option does sound what I am looking for.  Basically, if I
>>>>>>>> log
>>>>>>>> out but leave my computer on, leave home, some crook/NSA type breaks
>>>>>>>> in
>>>>>>>> and tries to access something or steals my whole puter, they would
>>>>>>>> just
>>>>>>>> get garbage for data.  That seems to fit the second option best.
>>>>>>> 
>>>>>>> If they steal your computer they will have to power it off, unless you
>>>>>>> are kind enough to leave them a large enough UPS to steal along with
>>>>>>> it,
>>>>>>> so any encryption will be equally effective.
>>>>>> 
>>>>>> If you're worried about casual thieves then just about any kind of
>>>>>> properly-implemented encryption will stop them.
>>>>>> 
>>>>>> If you're worried about a government official specifically tasked with
>>>>>> retrieving your computer, my understanding is that it is SOP these
>>>>>> days to retrieve your computer without powering it off for just this
>>>>>> reason.  They won't use your UPS to do it.  Typically they remove the
>>>>>> plug just far enough to expose the prongs, slide in a connector that
>>>>>> connects it to a UPS, and then they pull it out the rest of the way
>>>>>> now powered by the UPS.
>>>>>> 
>>>>>> See something like:
>>>>>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/
>>>>> 
>>>>> Hmm... Those are nice, but can be easily built yourself with an
>>>>> off-the-shelf UPS.
>>>>> 
>>>>>> Presumably somebody who is determined will also have the means to
>>>>>> retrieve the contents of RAM once they seize your computer.  Besides
>>>>>> directlly accessing the memory bus I think most motherboards are not
>>>>>> designed to be secure against attacks from PCI/firewire/etc.
>>>>> 
>>>>> Hmm... add something to auto-shutdown the computer when a hotplug event
>>>>> occurs on any of the internal ports and remove support for unused ports
>>>>> from the kernel.
>>>>> 
>>>>> I wonder how they'd keep a computer from initiating a shutdown procedure
>>>>> or
>>>>> causing a kernel panic when it looses (wireless) connection to another
>>>>> device that is unlikely to be moved when powered up?
>>>> 
>>>> Well i have a switch in the door of the server room. It opens when you
>>>> open
>>>> the door. That signals the kernel to wipe all the encryption keys from
>>>> kernel memory. Without the keys there is no access to the disks. After
>>>> that
>>>> another kernel is executed which wipes the memory of the old kernel. If
>>>> you
>>>> just pull the plug memory will stay in its state for an unspecified time.
>>> 
>>> You don't happen to have a howto on how to set that up?
>> 
>> Well i have a deamon running and a self made logic device in COM-port. Very
>> simple. It has a single serial-parallel converter to do simple IO.
>> Currently it just controls one relay that powers the network-devices.
> 
> I actually meant the software side:
> - How to wipe the keys and then wipe the whole memory.

The dm-crypt module inside kernel provides a crypt_wipe_key function that wipes the memory portion that holds the key. It also invalidates the key, so that no further writes to the drive can occur. Suspending the device prior is recommended:

dmsetup suspend /dev/to-device
dmsetup message /dev/to-device 0 key wipe

When you boot into your kernel you can setup a crash kernel inside your memory. The running kernel will not touch this area so you can be certain that there is no confidential data inside. Then you just wipe the area of the memory of the original kernel after you have executed your crash kernel.

So I do this by opening /dev/mem in the crash kernel and then mmap every page you need to wipe. I use the memset to wipe the page. Begin from physical address where your original kernel is located and walk the way up. Skip the portion where you crash kernel is! Crash kernel location is in your kernel cmdline and the location of the original kernel in your kernel config.

>>>> I consoder this setup quite secure.
>>> 
>>> Makes me wonder what it is you are protecting your server from. :)
>> 
>> Well just a hobby. I wanted to play with electronics. The server controls my
>> heating, locks of the house, lights, airconditioning, fire-alarm and
>> burglar-alarm. Gentoo-powered house...
> 
> I would keep the system controlling all that off the internet with only a 
> null-modem cable to an internet-connected server using a custom protocol.
> 
> Anything that doesn't match the protocol initiates a full lock-down of the 
> house. ;)

But it is much more convenient to control everything from you phone via internet. Just have everything setup in a secure manner. Anyways it's easier for a common burglar to break the window then to hack the server! And you can not steal the stereos by hacking the server ;)

-- 
-Matti


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03 21:05                               ` J. Roeleveld
@ 2014-06-03 19:53                                 ` Matti Nykyri
  2014-06-03 21:27                                   ` Matti Nykyri
  0 siblings, 1 reply; 52+ messages in thread
From: Matti Nykyri @ 2014-06-03 19:53 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Jun 4, 2014, at 0:05, "J. Roeleveld" <joost@antarean.org> wrote:

> On Tuesday, June 03, 2014 09:53:58 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 18:29, "J. Roeleveld" <joost@antarean.org> wrote:
>>> I actually meant the software side:
>>> - How to wipe the keys and then wipe the whole memory.
>> 
>> The dm-crypt module inside kernel provides a crypt_wipe_key function that
>> wipes the memory portion that holds the key. It also invalidates the key,
>> so that no further writes to the drive can occur. Suspending the device
>> prior is recommended:
>> 
>> dmsetup suspend /dev/to-device
>> dmsetup message /dev/to-device 0 key wipe
> 
> Thank you for this, wasn't aware of those yet.
> Does this also work with LUKS encrypted devices?

Yes.

Well LUKS is just a binary header that contains all the necessary setups for a secure disk encryption. If you don't use LUKS you must do all the steps it does by your self. From kernel point of view it does not see LUKS at all. When cryptsetup setups a LUKS drive in device-mapper it gives it only the portion of the drive behind the LUKS-header. LUKS is just a good way of storing your setup (cipher, master key etc...). There is a really good article about LUKS, but i failed to find it now.

>> When you boot into your kernel you can setup a crash kernel inside your
>> memory. The running kernel will not touch this area so you can be certain
>> that there is no confidential data inside. Then you just wipe the area of
>> the memory of the original kernel after you have executed your crash
>> kernel.
>> 
>> So I do this by opening /dev/mem in the crash kernel and then mmap every
>> page you need to wipe. I use the memset to wipe the page. Begin from
>> physical address where your original kernel is located and walk the way up.
>> Skip the portion where you crash kernel is! Crash kernel location is in
>> your kernel cmdline and the location of the original kernel in your kernel
>> config.
> 
> Hmm.. this goes beyond me. Will need to google on this to see if I can find 
> some more. Unless you know a good starting URL?

Didn't find a good one either. Will continue searching.

There are many ways to do it though. Through the kernel or just write your own program that runs all by it self... Like memtest86. In its source there is everything you need to wipe the memory. But that is more advanced then doing it via kernel interface in my opinion..

>>> I would keep the system controlling all that off the internet with only a
>>> null-modem cable to an internet-connected server using a custom protocol.
>>> 
>>> Anything that doesn't match the protocol initiates a full lock-down of the
>>> house. ;)
>> 
>> But it is much more convenient to control everything from you phone via
>> internet. Just have everything setup in a secure manner. Anyways it's
>> easier for a common burglar to break the window then to hack the server!
>> And you can not steal the stereos by hacking the server ;)
> 
> Perhaps, but I would have added security shutters to all the windows and doors 
> which are also controlled by the same system. Smashing a window wouldn't help 
> there.
> Especially if the only way to open those is by getting the server (which by 
> then went into a full lock-down) to open them...
> Now only to add a halo fire suppression system to the server room and all you 
> need to do is find a way to dispose of the mess.... ;)

Lol.

-M

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03 10:00   ` Tanstaafl
  2014-06-03 12:02     ` Mick
@ 2014-06-03 19:59     ` Marc Stürmer
  1 sibling, 0 replies; 52+ messages in thread
From: Marc Stürmer @ 2014-06-03 19:59 UTC (permalink / raw
  To: gentoo-user

Am 03.06.2014 12:00, schrieb Tanstaafl:

>> So no loss at all if TrueCrypt would really cease to exist.
>
> Which totally misses the point of *how* it happened.

How it happened is strange and you can make many theories about it.

The more interesting question about it for sure is: why did many people 
trust such an anonymous development team at all?


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03 18:53                             ` Matti Nykyri
@ 2014-06-03 21:05                               ` J. Roeleveld
  2014-06-03 19:53                                 ` Matti Nykyri
  0 siblings, 1 reply; 52+ messages in thread
From: J. Roeleveld @ 2014-06-03 21:05 UTC (permalink / raw
  To: gentoo-user

On Tuesday, June 03, 2014 09:53:58 PM Matti Nykyri wrote:
> On Jun 2, 2014, at 18:29, "J. Roeleveld" <joost@antarean.org> wrote:
> > I actually meant the software side:
> > - How to wipe the keys and then wipe the whole memory.
> 
> The dm-crypt module inside kernel provides a crypt_wipe_key function that
> wipes the memory portion that holds the key. It also invalidates the key,
> so that no further writes to the drive can occur. Suspending the device
> prior is recommended:
> 
> dmsetup suspend /dev/to-device
> dmsetup message /dev/to-device 0 key wipe

Thank you for this, wasn't aware of those yet.
Does this also work with LUKS encrypted devices?

> When you boot into your kernel you can setup a crash kernel inside your
> memory. The running kernel will not touch this area so you can be certain
> that there is no confidential data inside. Then you just wipe the area of
> the memory of the original kernel after you have executed your crash
> kernel.
> 
> So I do this by opening /dev/mem in the crash kernel and then mmap every
> page you need to wipe. I use the memset to wipe the page. Begin from
> physical address where your original kernel is located and walk the way up.
> Skip the portion where you crash kernel is! Crash kernel location is in
> your kernel cmdline and the location of the original kernel in your kernel
> config.

Hmm.. this goes beyond me. Will need to google on this to see if I can find 
some more. Unless you know a good starting URL?

> > I would keep the system controlling all that off the internet with only a
> > null-modem cable to an internet-connected server using a custom protocol.
> > 
> > Anything that doesn't match the protocol initiates a full lock-down of the
> > house. ;)
> 
> But it is much more convenient to control everything from you phone via
> internet. Just have everything setup in a secure manner. Anyways it's
> easier for a common burglar to break the window then to hack the server!
> And you can not steal the stereos by hacking the server ;)

Perhaps, but I would have added security shutters to all the windows and doors 
which are also controlled by the same system. Smashing a window wouldn't help 
there.
Especially if the only way to open those is by getting the server (which by 
then went into a full lock-down) to open them...
Now only to add a halo fire suppression system to the server room and all you 
need to do is find a way to dispose of the mess.... ;)

--
Joost


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-03 19:53                                 ` Matti Nykyri
@ 2014-06-03 21:27                                   ` Matti Nykyri
  0 siblings, 0 replies; 52+ messages in thread
From: Matti Nykyri @ 2014-06-03 21:27 UTC (permalink / raw
  To: gentoo-user@lists.gentoo.org

On Tue, Jun 03, 2014 at 10:53:15PM +0300, Matti Nykyri wrote:
> On Jun 4, 2014, at 0:05, "J. Roeleveld" <joost@antarean.org> wrote:
> 
> > On Tuesday, June 03, 2014 09:53:58 PM Matti Nykyri wrote:
> >> On Jun 2, 2014, at 18:29, "J. Roeleveld" <joost@antarean.org> wrote:
> >>> I actually meant the software side:
> >>> - How to wipe the keys and then wipe the whole memory.
> >> 
> >> The dm-crypt module inside kernel provides a crypt_wipe_key function that
> >> wipes the memory portion that holds the key. It also invalidates the key,
> >> so that no further writes to the drive can occur. Suspending the device
> >> prior is recommended:
> >> 
> >> dmsetup suspend /dev/to-device
> >> dmsetup message /dev/to-device 0 key wipe
> > 
> > Thank you for this, wasn't aware of those yet.
> > Does this also work with LUKS encrypted devices?
> 
> Yes.
> 
> Well LUKS is just a binary header that contains all the necessary setups for a secure disk encryption. If you don't use LUKS you must do all the steps it does by your self. From kernel point of view it does not see LUKS at all. When cryptsetup setups a LUKS drive in device-mapper it gives it only the portion of the drive behind the LUKS-header. LUKS is just a good way of storing your setup (cipher, master key etc...). There is a really good article about LUKS, but i failed to find it now.

Begin by reading these:

tomb.dyne.org/Luks_on_disk_format.pdf
http://clemens.endorphin.org/TKS1-draft.pdf
http://clemens.endorphin.org/nmihde/nmihde-A4-os.pdf

These contain very good info about LUKS and disk encryption. The last one is probably a bit ruff one.

http://clemens.endorphin.org/cryptography - a good one.

I strongly suggest to dig into disk encryption before implementing it!

> >> When you boot into your kernel you can setup a crash kernel inside your
> >> memory. The running kernel will not touch this area so you can be certain
> >> that there is no confidential data inside. Then you just wipe the area of
> >> the memory of the original kernel after you have executed your crash
> >> kernel.
> >> 
> >> So I do this by opening /dev/mem in the crash kernel and then mmap every
> >> page you need to wipe. I use the memset to wipe the page. Begin from
> >> physical address where your original kernel is located and walk the way up.
> >> Skip the portion where you crash kernel is! Crash kernel location is in
> >> your kernel cmdline and the location of the original kernel in your kernel
> >> config.
> > 
> > Hmm.. this goes beyond me. Will need to google on this to see if I can find 
> > some more. Unless you know a good starting URL?
> 
> Didn't find a good one either. Will continue searching.

Here are few pages:

http://naveengopala-embeddedlinux.blogspot.fi/2012/01/reading-physical-mapped-memory-using.html
http://stackoverflow.com/questions/647783/direct-memory-access-in-linux

and mmap man-page for sure...

It is really straight forward... just mmap the page you want and erase it. You will just need to know what addresses to mmap and what not. Do it one page at a time and always align.

The memory should not contain very sensitive data on how to access your disks if you wipe the keys.

> There are many ways to do it though. Through the kernel or just write your own program that runs all by it self... Like memtest86. In its source there is everything you need to wipe the memory. But that is more advanced then doing it via kernel interface in my opinion..
> 
> >>> I would keep the system controlling all that off the internet with only a
> >>> null-modem cable to an internet-connected server using a custom protocol.
> >>> 
> >>> Anything that doesn't match the protocol initiates a full lock-down of the
> >>> house. ;)
> >> 
> >> But it is much more convenient to control everything from you phone via
> >> internet. Just have everything setup in a secure manner. Anyways it's
> >> easier for a common burglar to break the window then to hack the server!
> >> And you can not steal the stereos by hacking the server ;)
> > 
> > Perhaps, but I would have added security shutters to all the windows and doors 
> > which are also controlled by the same system. Smashing a window wouldn't help 
> > there.
> > Especially if the only way to open those is by getting the server (which by 
> > then went into a full lock-down) to open them...
> > Now only to add a halo fire suppression system to the server room and all you 
> > need to do is find a way to dispose of the mess.... ;)
> 
> Lol.
> 
> -M

-- 
-Matti


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-02 10:54             ` Neil Bothwick
@ 2014-06-04 19:59               ` Frank Steinmetzger
  2014-06-04 23:24                 ` Neil Bothwick
  0 siblings, 1 reply; 52+ messages in thread
From: Frank Steinmetzger @ 2014-06-04 19:59 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1526 bytes --]

On Mon, Jun 02, 2014 at 11:54:52AM +0100, Neil Bothwick wrote:
> On Mon, 02 Jun 2014 12:06:18 +0200, Alan McKinnon wrote:
>
> > If you encrypt your home directory then you unlock it when you log in so
> > logging out of your DE safely locks things again.

I encrypt my home partition with LUKS and enter a passphrase
during boot. But I always wanted to get decryption upon login running,
especially because it would require me to enter one less password. But
haven’t gotten around to that yet.

> > You most likely want the second option, the odds that you have a valid
> > need to protect /usr and /opt are not good. As a regular user out there,
> > the stuff you want to protect is in /home (or you could easily move it
> > to /home).
>
> With one notable exception. There is sometimes sensitive information
> in /etc, like wireless passwords.

For that reason I put this stuff into /home/etc/$hostname/ (I back up my
machines’ /etc on all other machines, also to have a reference if I need
to know “How did I do this on $other_host?”). And then I symlink to
that from the real location, i.e.:

$ ls -ld /etc/wpa_supplicant
lrwxrwxrwx 1 root root 29 28. Mär 21:02 /etc/wpa_supplicant -> /home/etc/hostname/wpa_supplicant/

Cryptsetup comes early enough in the boot process for this to work (both
with OpenRC and systemd).
--
Gruß | Greetings | Qapla’
Please do not share anything from, with or about me on any social network.

I just took an IQ test. The results were negative.

[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 836 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-04 19:59               ` Frank Steinmetzger
@ 2014-06-04 23:24                 ` Neil Bothwick
  2014-06-05 16:52                   ` Frank Steinmetzger
  0 siblings, 1 reply; 52+ messages in thread
From: Neil Bothwick @ 2014-06-04 23:24 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1106 bytes --]

On Wed, 4 Jun 2014 21:59:18 +0200, Frank Steinmetzger wrote:

> I encrypt my home partition with LUKS and enter a passphrase
> during boot. But I always wanted to get decryption upon login running,
> especially because it would require me to enter one less password. But
> haven’t gotten around to that yet.

Are you the only use of the computer? If so, set your display manager to
auto-login, you have already authenticated yourself by unlocking the home
partition.

> > With one notable exception. There is sometimes sensitive information
> > in /etc, like wireless passwords.
> 
> For that reason I put this stuff into /home/etc/$hostname/ (I back up my
> machines’ /etc on all other machines, also to have a reference if I need
> to know “How did I do this on $other_host?”). And then I symlink to
> that from the real location, i.e.:

I used to do that, now I have an encrypted /, which contains the keys for
any other encrypted volumes, so I still only need to enter one password.


-- 
Neil Bothwick

Nothing is illegal if one hundred businessmen decide to do it.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-04 23:24                 ` Neil Bothwick
@ 2014-06-05 16:52                   ` Frank Steinmetzger
  2014-06-05 16:57                     ` Rich Freeman
  0 siblings, 1 reply; 52+ messages in thread
From: Frank Steinmetzger @ 2014-06-05 16:52 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1745 bytes --]

On Thu, Jun 05, 2014 at 12:24:22AM +0100, Neil Bothwick wrote:
> On Wed, 4 Jun 2014 21:59:18 +0200, Frank Steinmetzger wrote:
> 
> > I encrypt my home partition with LUKS and enter a passphrase
> > during boot. But I always wanted to get decryption upon login running,
> > especially because it would require me to enter one less password. But
> > haven’t gotten around to that yet.
> 
> Are you the only use of the computer? If so, set your display manager to
> auto-login, you have already authenticated yourself by unlocking the home
> partition.

Now that’s an interesting idea I haven’t thought of yet. Thanks. My LUKS
passphrase is much more secure than my ancient user password anyway *hehe*.

> > > With one notable exception. There is sometimes sensitive information
> > > in /etc, like wireless passwords.
> > 
> > For that reason I put this stuff into /home/etc/$hostname/ (I back up my
> > machines’ /etc on all other machines, also to have a reference if I need
> > to know “How did I do this on $other_host?”). And then I symlink to
> > that from the real location, i.e.:
> 
> I used to do that, now I have an encrypted /, which contains the keys for
> any other encrypted volumes, so I still only need to enter one password.

That falls into the category of using initrds which is also far down on my
todo. I understand the mechanics and had played with dracut in the past, but
nothing workable has come out of it yet.

> Nothing is illegal if one hundred businessmen decide to do it.

Like stealing taglines. >:-)

-- 
Gruß | Greetings | Qapla’
Please do not share anything from, with or about me on any social network.

Please notify me if you did not receive this message.

[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 836 bytes --]

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet?
  2014-06-05 16:52                   ` Frank Steinmetzger
@ 2014-06-05 16:57                     ` Rich Freeman
  0 siblings, 0 replies; 52+ messages in thread
From: Rich Freeman @ 2014-06-05 16:57 UTC (permalink / raw
  To: gentoo-user

On Thu, Jun 5, 2014 at 12:52 PM, Frank Steinmetzger <Warp_7@gmx.de> wrote:
> Now that’s an interesting idea I haven’t thought of yet. Thanks. My LUKS
> passphrase is much more secure than my ancient user password anyway *hehe*.
>

Only if it isn't the same.  :)

In theory neither really need be algorithmically more secure than the
other, but there is more opportunity for somebody to capture your
password after the system is running than while it is booting up.

Rich


^ permalink raw reply	[flat|nested] 52+ messages in thread

end of thread, other threads:[~2014-06-05 16:57 UTC | newest]

Thread overview: 52+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-06-01 12:31 [gentoo-user] Demise of Truecrypt - surprised I haven't seen t his discussed here yet? Tanstaafl
2014-06-01 17:45 ` Volker Armin Hemmann
2014-06-02  8:22   ` Dale
2014-06-02  8:53     ` Michael Hampicke
2014-06-02  9:20       ` Neil Bothwick
2014-06-02 10:24         ` Michael Hampicke
2014-06-02 11:34         ` Mark David Dumlao
2014-06-02 12:27           ` Neil Bothwick
2014-06-02  9:24     ` Volker Armin Hemmann
2014-06-02  9:34       ` Neil Bothwick
2014-06-02  9:48         ` Dale
2014-06-02 10:06           ` Alan McKinnon
2014-06-02 10:27             ` Dale
2014-06-02 10:56               ` Neil Bothwick
2014-06-02 11:04                 ` Dale
2014-06-02 11:10                   ` Neil Bothwick
2014-06-02 11:33                     ` Dale
2014-06-02 13:23                     ` J. Roeleveld
2014-06-02 11:28                 ` Rich Freeman
2014-06-02 12:06                   ` Dale
2014-06-02 12:28                     ` Michael Hampicke
2014-06-02 12:30                     ` Matti Nykyri
2014-06-02 13:27                     ` Rich Freeman
2014-06-02 13:40                   ` J. Roeleveld
2014-06-02 12:23                     ` Matti Nykyri
2014-06-02 12:36                       ` godzil
2014-06-02 12:58                         ` Matti Nykyri
2014-06-02 13:29                           ` godzil
2014-06-02 14:52                       ` J. Roeleveld
2014-06-02 13:23                         ` Matti Nykyri
2014-06-02 15:29                           ` J. Roeleveld
2014-06-03 18:53                             ` Matti Nykyri
2014-06-03 21:05                               ` J. Roeleveld
2014-06-03 19:53                                 ` Matti Nykyri
2014-06-03 21:27                                   ` Matti Nykyri
2014-06-02 18:14                         ` Volker Armin Hemmann
2014-06-02 17:14                   ` Volker Armin Hemmann
2014-06-02 19:26                     ` J. Roeleveld
2014-06-02 13:22                 ` J. Roeleveld
2014-06-02 16:54                 ` Volker Armin Hemmann
2014-06-02 10:43             ` Rich Freeman
2014-06-02 10:54             ` Neil Bothwick
2014-06-04 19:59               ` Frank Steinmetzger
2014-06-04 23:24                 ` Neil Bothwick
2014-06-05 16:52                   ` Frank Steinmetzger
2014-06-05 16:57                     ` Rich Freeman
2014-06-02 10:22   ` Tanstaafl
2014-06-02 10:57     ` Volker Armin Hemmann
2014-06-03  7:17 ` Marc Stürmer
2014-06-03 10:00   ` Tanstaafl
2014-06-03 12:02     ` Mick
2014-06-03 19:59     ` Marc Stürmer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox