From: Rich Freeman <rich0@gentoo.org>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Encrypting a hard drive's data. Best method.
Date: Sat, 6 Jun 2020 14:51:59 -0400 [thread overview]
Message-ID: <CAGfcS_=Qt6=hjTWpPvN+zHabagnQvazeqgZu9Qi74utWPeuj0A@mail.gmail.com> (raw)
In-Reply-To: <7e55092b-1914-da09-cb33-25aea63d2b22@gmail.com>
On Sat, Jun 6, 2020 at 10:07 AM Victor Ivanov <vic.m.ivanov@gmail.com> wrote:
>
> The problem here is that a leaked header immediately means a compromised
> volume. An adversary who gets hold of the header can now spend as much
> time as they would like to brute force a password (depending on password
> strength) and derive the encryption key. Or if they have an (older) copy
> of the header with a leaked password before it was changed they can get
> hold of the encryption key with virtually no effort at all by using said
> password. The only solution to a compromised header is full
> re-encryption. Even having a rolling password won't change that.
If you're talking about the drive header that is actually written to
disk, it is as secure as the entire drive is, since the drive contains
the header. The whole point of full-disk encryption is to keep the
contents of the disk secure even if you lose physical possession of
the disk.
If the password can be brute-forced then the encryption is worthless.
Sure, if the attacker has a copy of the header they can spend as much
time as they wish brute-forcing it. However, the same is true if they
have the entire disk, and that is precisely the scenario we're trying
to guard against.
If you're using LUKS the security of the system is only as secure as
your password(s). LUKS uses a random key to encrypt the drive, and it
applies many rounds of encryption to your password to protect the
session key. That will greatly slow down a brute force attack.
However, if your encryption key is "12345" then a brute force attack
is likely to succeed.
--
Rich
next prev parent reply other threads:[~2020-06-06 18:52 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-06-06 4:37 [gentoo-user] Encrypting a hard drive's data. Best method Dale
2020-06-06 7:14 ` J. Roeleveld
2020-06-06 7:16 ` J. Roeleveld
2020-06-06 7:49 ` Dale
2020-06-06 10:32 ` Michael
2020-06-06 14:14 ` antlists
2020-06-06 11:05 ` Rich Freeman
2020-06-06 13:31 ` Victor Ivanov
2020-06-06 13:57 ` antlists
2020-06-06 14:10 ` Rich Freeman
2020-06-06 15:05 ` Jack
2020-06-06 14:18 ` antlists
2020-06-06 15:07 ` Dale
2020-06-06 19:02 ` J. Roeleveld
2020-06-06 14:07 ` Victor Ivanov
2020-06-06 18:51 ` Rich Freeman [this message]
2020-06-06 19:38 ` Victor Ivanov
2020-06-06 20:12 ` Rich Freeman
2020-06-07 0:47 ` Victor Ivanov
2020-06-07 1:04 ` Rich Freeman
2020-06-07 1:50 ` Dale
2020-06-07 8:08 ` Dale
2020-06-07 9:07 ` antlists
2020-06-07 18:23 ` antlists
2020-06-09 20:24 ` Dale
2020-06-09 21:30 ` [gentoo-user] Encrypting a hard drive's data. Best method. PICS attached Dale
2020-06-07 10:33 ` [gentoo-user] Encrypting a hard drive's data. Best method Rich Freeman
2020-06-07 11:52 ` Victor Ivanov
2020-06-07 12:43 ` Victor Ivanov
2020-06-07 7:37 ` antlists
2020-06-06 15:07 ` Frank Steinmetzger
2020-06-06 20:21 ` Sebastiaan L. Zoutendijk
2020-06-07 1:54 ` Dale
2020-06-10 6:59 ` Dale
2020-06-10 9:52 ` Michael
2020-06-10 21:02 ` Dale
2020-06-10 13:37 ` Victor Ivanov
2020-06-10 20:52 ` Dale
2020-06-11 21:51 ` Victor Ivanov
2020-06-11 22:17 ` Dale
2020-06-11 23:08 ` Victor Ivanov
2020-06-12 2:00 ` Dale
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAGfcS_=Qt6=hjTWpPvN+zHabagnQvazeqgZu9Qi74utWPeuj0A@mail.gmail.com' \
--to=rich0@gentoo.org \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox