thanks but no thanks

Story: Interop : Using Microsoft to Monitor Unix and LinuxTotal Replies: 26
Author Content
herzeleid

Apr 29, 2008
7:48 PM EDT
The absolute last thing in the world I'd ever need is to have microsoft messing with my unix boxes. I think I'll pass - give me one or two good unix guys instead and I'll be fine, thanks.

Sure, microsoft frantically desires to be relevant, and they really really badly want to create a world where you'd need ms windows to manage unix - but how does that help me? I can see how it would benefit microsoft, but what's the benefit for me?

tuxchick

Apr 29, 2008
9:09 PM EDT
Yeah, like we want the masterminds behind DRM and selling out users wholesale to get their grubby paws on our poor innocent Unix systems.

"The growing use of encryption software -- like Microsoft's own BitLocker -- by cyber criminals has led Microsoft to develop a set of tools that law enforcement agents can use to get around the software" http://www.pcworld.com/businesscenter/article/145318/microso...
Scott_Ruecker

Apr 29, 2008
9:26 PM EDT
I almost posted that article to the newswire Carla, almost..

:-)
Bob_Robertson

Apr 30, 2008
6:45 AM EDT
The issues involved in that article are excellent, regardless of platform.

I am curious just how hard an encrypted partition is to crack. Guess I'll just have to wait to see how things go in the future.
dinotrac

Apr 30, 2008
7:13 AM EDT
Unlike you mindless naive fantatical religious cult ant-Microsoft Linux bigots, I actually got the software and tried it out.

Things went pretty well for the first day, then I started to get warnings of "unanticipated condition -- investigate immediately".

Couldn't find anything wrong, so I turned the warnings off.

Next day, my machines started beeping as well as giving warnings: "Uptime 48 hrs. Unanticipated condition -- must be alien science. Wiping all hard drives to protect earth from attack."

Fortunately, the Windows machine had been infected by a denial of denial of service virus, so none of the boxes were actually touched. The Windows machine, however, suffered a nervous breakdown and will need years of therapy.
tuxchick

Apr 30, 2008
8:36 AM EDT
Bob, from the reading I've done capturing data while it's still in memory is a proven way to get around encryption. Provided the data you want are there, and if you're lucky your user is using some sucky encryption product that leaves the keys in memory too.

dino, finally you have found proof of Microsoft's supposed push towards interop- unhelpful error messages. At last, common ground.
Bob_Robertson

Apr 30, 2008
9:07 AM EDT
Here's how I want to do it: Two partitions, one unencrypted boot and the rest encrypted.

The encrypted boot has most of what is needed to unencrypt, but no keys.

The USB thumbdrive has the keys, and a boot image. Booting with the USB makes the system work, booting from the HD asks for a passphrase which is never correct.

After successfully logging in, a background process compares the unencrypted boot partition against a copy inside the encrypted area. Any changes are reported. "Someone installed a sniffer on your machine while you were at the pool, 007."
techiem2

Apr 30, 2008
9:13 AM EDT
Here's what my friend did on his linux laptop: He had an encrypted /home partition. The key was on a thumbdrive. If he booted with the thumbdrive connected, it would mount his encrypted /home. If he booted without it, it would mount a generic /home.

herzeleid

Apr 30, 2008
9:30 AM EDT
Quoting:If he booted with the thumbdrive connected, it would mount his encrypted /home. If he booted without it, it would mount a generic /home.
Clever, I like it...
Steven_Rosenber

Apr 30, 2008
9:34 AM EDT
I've experimented with encrypted LVM in Debian, and I believe it's also available with Ubuntu if you use the "alternate" install disk. For the equally paranoid, Puppy also offers an encryption option.

If I wasn't using this laptop to test distros so much, I'd make a huge partition, totally encrypted LVM for everything, with a smaller unencrypted partition just in case I wanted to run a live CD and have a place to store the configuration.

The one problem with dual-booting and encryption is that you can't get to your encrypted partitions if you're not running the installation that made 'em.

Still, for laptops, I think this kind of encryption is extremely important. And I will follow my own advice -- I will!
jdixon

Apr 30, 2008
9:40 AM EDT
> I am curious just how hard an encrypted partition is to crack.

There was a study just recently which determined that if you power a machine off and back on the encryption keys will still be in memory and can be recovered. I think LXer had a link to it, but it may have been on the Register.
Bob_Robertson

Apr 30, 2008
11:00 AM EDT
> the encryption keys will still be in memory and can be recovered.

Sounds like a good reason for a shutdown process that cleans out memory.
tuxchick

Apr 30, 2008
11:17 AM EDT
jdixon, how would that work? Because when the power is gone, so is everything in memory. That's why law enforcement wants tools like this COFEE thang:

Quoting:While COFEE doesn't break BitLocker or open a back door, it captures live data on the computer, which is why it's important for agents not to shut down the computer first, he said.


COFEE runs from a USB drive, so agents o de law (smother giggles and cynical wisecracks) can capture everything in RAM on a running system. Presumably they do this right away, before it crashes or the battery dies or something else happens, and with a windoze mosheen something is guaranteed to happen. Then they have a separate image they can copy and mangle er analyze to their heart's content.

Scott, you should have posted the story. Then this thread wouldn't have gotten hijacked :)
techiem2

Apr 30, 2008
11:22 AM EDT
I remember reading an article about data recovery and such in memory too somewhere...something about how sometimes it can be possible to read ram even after power loss... I guess the easiest thing to do is fully show down the power and pull the plug so there is no voltage remaining in the machine and hope that clears it enough....but ideally having the system secure wipe the ram during shutdown would be good...
jdixon

Apr 30, 2008
11:25 AM EDT
TC. here's the link to the Register article:

http://www.theregister.co.uk/2008/02/22/eff_unbitlocker/

That can probably answer your questions better than I can.
tuxchick

Apr 30, 2008
11:54 AM EDT
Oh, I remember that article! It says DRAM takes about a minute to clear after the power goes off. Yes, some kind of secure memory-wipe would be a good thing.

Scott_Ruecker

Apr 30, 2008
1:55 PM EDT
Yeah, your right about that Carla.. ;-)
gus3

Apr 30, 2008
8:53 PM EDT
Maybe a Linux kernel module to flood userspace memory with zeros immediately before reboot or shutdown? Even 0xFFAA5500 or some variant thereof....

Whaddya know, a kernel module I could write.
jezuch

May 01, 2008
3:57 AM EDT
Quoting:Maybe a Linux kernel module to flood userspace memory with zeros immediately before reboot or shutdown?


How would that handle hard resets? Or pulling memory modules from the running system?
gus3

May 01, 2008
7:33 AM EDT
I didn't say it was perfect...

However, for an enterprise with burdensome security needs, the physical security concerns (incl. reliable power supply and reset button disconnection) are probably already addressed.

As far as the memory hot-swap, wiping it before the tri-state can be handled by the hot-swap driver.
tuxchick

May 01, 2008
7:36 AM EDT
Ok, so there's maybe a minute of opportunity to capture RAM contents. While it is a nice cross-platform hole, it's exploitable only under ideal and limited circumstances. I don't believe I'll be losing any sleep over it.
Steven_Rosenber

May 01, 2008
11:43 AM EDT
I agree. While this might be a theoretical security risk, there are more many more dangerous things that we have to worry about.
techiem2

May 01, 2008
12:09 PM EDT
And now we have this to worry about: http://news.bbc.co.uk/2/hi/technology/7377063.stm

:)
Bob_Robertson

May 01, 2008
1:19 PM EDT
Well, if you're going to go through the effort of encrypting, then there is going to be extra effort with static ram "memristors". Maybe, just maybe, the "instant on" is going to have to be given up for the encrypted crowd.

Well, boo-hoo. "lid-closed: launch memory clearing process, reset to pre-decryption state."

Security is inconvenient.
jdixon

May 01, 2008
1:26 PM EDT
> ...there are more many more dangerous things that we have to worry about.

Like a new bug in the kernel. Sigh. From the Slackware-current changelog:

a/kernel-generic-2.6.24.5-i486-2.tgz: Patched to fix a security issue in fs/dnotify.c. The use of dnotify (largely replaced by inotify on 2.6.x systems) could lead to a local DoS, or possibly a local root hole. We said we wouldn't make changes now unless something was "critical" -- and it seems we got what we wished for. ;-) This flaw will also be addressed in the kernels for previous releases as soon as possible. The patch itself may be found in source/k/linux-2.6.24.5-CVE-2008-1375-patch/. For additional information (when the CVE candidate is opened), see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375
Bob_Robertson

May 01, 2008
3:47 PM EDT
> Like a new bug in the kernel.

Which will be fixed in the distributions very quickly.

The strength of F/OSS reveals itself again.
jdixon

May 01, 2008
4:17 PM EDT
> Which will be fixed in the distributions very quickly.

Yes, as shown, Slackware-current already has the fix, and I expect the patches for 12.0 and earlier to be out later tonight or early tomorrow. But that's still the second exploitable kernel bug in the past few weeks. That's worrisome.

Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]

Becoming a member of LXer is easy and free. Join Us!