Security Flaw in Popular Disk Encryption Technologies

Bill Moran wmoran at collaborativefusion.com
Sun Feb 24 17:51:40 UTC 2008


Christopher Arnold <chris at arnold.se> wrote:
>
> 
> 
> On Sun, 24 Feb 2008, Bill Moran wrote:
> 
> > Or laptop vendors could make "secure" laptops that always lose memory
> > on shutdown.
> >
> That dosn't really change anything, just don't shutdown the laptop.

It reduces the risk greatly when combined with other measures.  For example,
alter the sysctls so the lid switch powers the laptop off instead of putting
it to sleep.  This changes the scene a good bit, as it's guaranteed to be
powered off when in storage and transport, which is when it is most likely
to be stolen.

> Cut an opening in the case and attach a probe to monitor memory access and 
> wait for the key being accessed.

That attack only works if you can steal the laptop when it's powered on.
With a unit known to be a security risk, it's going to be monitored while
powered on, so it's less likely to be stolen at that time.

As far as mitigation is concerned, there's not 1 or 0.  But smart deployment
can reduce the risks.

-- 
Bill Moran
Collaborative Fusion Inc.

wmoran at collaborativefusion.com
Phone: 412-422-3463x4023


More information about the freebsd-hackers mailing list