Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

How To, When You Have To Encrypt Absolutely Everything? 468

Dark Neuron writes "My institution has thousands of computers, and is looking at starting an IT policy to encrypt everything, all hard drives, including desktops, laptops, external hard drives, USB flash drives, etc. I am looking at an open source product for Windows, Mac, UNIX, as well as portable hard drives, but I am concerned about overhead and speed penalties. Does anyone have experience and/or advice with encrypting every single device in a similar situation?"
This discussion has been archived. No new comments can be posted.

How To, When You Have To Encrypt Absolutely Everything?

Comments Filter:
  • by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Monday February 09, 2009 @02:18PM (#26786803) Journal

    I am looking at an open source product for Windows, Mac, UNIX, as well as portable hard drives ...

    I think you're going to find most people advising you to choose TrueCrypt [truecrypt.org] which boasts:

    • Creates a virtual encrypted disk within a file and mounts it as a real disk.
    • Encrypts an entire partition or storage device such as USB flash drive or hard drive.
    • Encrypts a partition or drive where Windows is installed (pre-boot authentication [truecrypt.org]).
    • Encryption is automatic, real-time (on-the-fly) and transparent [truecrypt.org].
    • Provides two levels of plausible deniability [truecrypt.org] , in case an adversary forces you to reveal the password: 1) Hidden volume [truecrypt.org] (steganography) and hidden operating system [truecrypt.org] . 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).

    I think they're on version 6.1a and I have been impressed with them. You may want to try benchmarking [truecrypt.org] the various encryption algorithms it offers.

    ... but i am concerned about overhead and speed penalties.

    Aren't we all. I mean, no one wants an Office Space like scenario where every day before you leave you have to wait for the damn little bar to cross the screen to save your progress for the day. You have another option [slashdot.org] which is to wait until the drive manufacturers build all that into the hardware's firmware so that it is as fast as they can make it.

    I wouldn't recommend waiting that long, however.

    Here's my formal suggestion: do a small test on a few users or even a few devices no one depends on, some USB drives, etc. Use them yourself and see what kind of overhead (for both user and device) we're talking about here. Then weigh that with how much comfort you get with universally encrypting everything. If A is greater than B (with a sinister sounding name like 'Dark Neuron' who knows?), draft up a plan. Otherwise, just wait until you have the funds to upgrade the hard drives to those with the built in encryption.

    I do not know for certain but I do not believe there is a painless push-across-the-network way to do this ... I also would feel very uneasy if someone assured me they had a method to do that. Drive encryption is one of those seemingly trivial but necessary reasons why companies have many system administrators and not some automagical solution.

  • Pointsec (Score:2, Informative)

    by religious freak ( 1005821 ) on Monday February 09, 2009 @02:26PM (#26786973)
    Open source? Nope. But Pointsec is an impressive product. I've been using it for years and have noticed zero performance impact.
  • by two basket skinner ( 1288246 ) on Monday February 09, 2009 @02:27PM (#26786995)
    unless of course your requirements call for it. But your systems will run very slow if every time they have to boot they have to go thru the decrypt process. you should only need to encrypt your users' data. Hopefully, system data and user data are, at least, in different folders of the filesystem.
  • TrueCrypt and Mac (Score:4, Informative)

    by Danathar ( 267989 ) on Monday February 09, 2009 @02:33PM (#26787107) Journal

    TrueCrypt does not support Pre-boot full disk encryption on the Mac. Only product I know of that does that right now is PGP Whole disk (latest version).

  • Re:Yeah... (Score:5, Informative)

    by quickOnTheUptake ( 1450889 ) on Monday February 09, 2009 @02:35PM (#26787145)
    I've heard that full fs encryption on higher end computers has a negligible performance impact (cpu can generally keep up with the hdd) but on lower end machines esp. netbooks, the performance impact can be appreciable. Here is an article with benchmarks [phoronix.com]
  • by York the Mysterious ( 556824 ) on Monday February 09, 2009 @02:36PM (#26787155) Homepage
    I see a lot of comments here suggesting that this is a bad idea, and to a certain extent it is, but chances are the institution has no say in this. After the wave of laptop thefts from government institutions, the office of inspector general requires all laptops (and portable media) be encrypted. A lot of agencies have stalled on this one. I've been involved in supporting laptops that are encrypted and go out to remote field cables (as remote as it gets). It's pain, but if you have to do it, TrueCrypt is not the way to go. You need something that ties into AD and something that can manage thousands of users. PGP Desktop.
  • by Phoenixhawk ( 1188721 ) on Monday February 09, 2009 @02:37PM (#26787179)

    I was screaming PGP until I got to the Open source part, removing funding from the equation Truecrypt is the only thing that will really do what your asking for. Its not bad & I like it, but its not PGP. And if you have been using something since the BBS days, your really not likely to change now so I am bias towards it. But from my limited (3 month) run with Truecrypt I had no problems and it was very stable, and little to no real performance difference from PGP's.

  • by Shadow-isoHunt ( 1014539 ) on Monday February 09, 2009 @02:49PM (#26787411) Homepage
    TrueCrypt isn't without it's bugs. Both 5.1a and 6.0a have cost me two windows installs(one Win2k3, one Win XP pro), which couldn't be recovered with the recovery disk. 6.1a won't even install on my Inspiron 9400, giving me a "memory parity error" on the initial reboot test for full drive encryption. If you want something to trust your data to, truecrypt is not that program(yet).
  • by trifish ( 826353 ) on Monday February 09, 2009 @02:51PM (#26787445)

    Yes, and as the OP was asking for "real-life" benchmarks, here they are. Tom's Hardware benchmarked TrueCrypt thoroughly and found practically no overhead.

    http://www.tomshardware.com/reviews/truecrypt-security-hdd,2125.html [tomshardware.com]

  • by pavon ( 30274 ) on Monday February 09, 2009 @02:55PM (#26787553)

    You can encrypt your key with a password (I'm sure truecrypt supports this) but then you might as well just have used a password in the first place instead of encryption.

    WTF? If someone steals a computer and puts a drive in another computer the windows/BIOS password won't do shit, encryption will.

    What you do is store sensitive material on secure servers and have people check out copies of material that they have access to. I'm sure keeping sensitive data off local hard drives would be easier than actually protecting all those hard drives.

    No it won't. If they need to use the data then it will be cached on their computer whether it is stored centrally or not. And if they weren't using the data then it wouldn't have been on the computer to begin with. Centralization will only help if you move from thick-client to a thin-client-like processing of data. That will limit the amount of distribution of sensitive manner - "checking data out" won't.

  • Fedora (Score:1, Informative)

    by Anonymous Coward on Monday February 09, 2009 @02:59PM (#26787615)

    I've been using Fedora since v8. Fedora 9 introduced the ability to encrypt the entire hard drive. I have a least three servers (Apache, Tomcat, and MySQL) running on my encrypted hard drive and the speed in incredible. Absolutely no issues with speed or problems with start-up or shut-down. Setup is as easy as checking a check box during the install. And logging in just requires a password during the Grub boot cycle to unlock the encrypted hard drive.

    Description from Fedora:
    "Support the use of encrypted filesystems for anything other than /boot using cryptsetup and LUKS. This includes install time creation/configuration, as well as integrated support in mkinitrd and initscripts (others?). Currently we are only pursuing support for encrypted devices using cryptsetup/LUKS."

    Further Reading:

    http://magazine.redhat.com/2007/01/18/disk-encryption-in-fedora-past-present-and-future/

    http://fedoraproject.org/wiki/Releases/FeatureEncryptedFilesystems

    by Anonymous Coward

  • by PotatoFarmer ( 1250696 ) on Monday February 09, 2009 @02:59PM (#26787619)

    What you do is store sensitive material on secure servers and have people check out copies of material that they have access to. I'm sure keeping sensitive data off local hard drives would be easier than actually protecting all those hard drives.

    I'm not so sure about that. The deal with whole disk encryption is that it's fail-safe; it doesn't matter if something bad happens, the data is stored in a secure state by default. A check-out model doesn't give you that.

    Also, speaking from experience, it's incredibly difficult to get end users to even understand what sensitive data is, much less train them how to work with it in a secure manner. Any security model that relies upon educated (and diligent) users is probably going to fail sooner rather than later.

  • Re:Yeah... (Score:5, Informative)

    by Vancorps ( 746090 ) on Monday February 09, 2009 @03:02PM (#26787659)

    I can't tell, are you joking? With all the sarcasm around Slashdot it's sometimes difficult to tell if someone is being snarky.

    The scenario you mention wouldn't happen unless a half-baked encryption scheme was used. HP, RSA, IBM, and even Truecrypt all have recovery options ranging in levels of difficulty to implement. RSA's key management tools are quite handy but you definitely pay a premium for them. HP's are clunky like all HP software, IBM has been doing it for years but again you pay and arm and a leg.

    With Truecrypt you create two to three thumbdrives when you do the initial encryption, two of them store the master encryption key and the third has whatever key is needed for authentication depending on how you want to deploy it. The only fault I have with Truecrypt is that there are a dozen ways to deploy it so you have to read and plan very carefully before deploying it on any level.

    Once you have your flash disk you copy its contents to an encrypted folder on your SAN somewhere and keep the flash drive in a properly fire-proof safe. One flash drive has the keys for over a hundred machines with room for plenty more, keeping two copies ensures that a flash drive dying won't leave your data inaccessible during transport to the server and should the SAN experience some sort of data loss you can go back to the flash drive to recover keys.

    Encryption is pretty scary as your keys are extremely important as you mention, once the key is lost then so is the data. So you take a few precautions ahead of time and then you don't need to worry.

  • Re:User Error (Score:3, Informative)

    by Qzukk ( 229616 ) on Monday February 09, 2009 @03:06PM (#26787721) Journal

    Any sufficiently enterprisey encryption system would have a site-wide "master key" entrusted to whatever IT staff is responsible for rescuing people from forgetting their key.

  • by tyler_larson ( 558763 ) on Monday February 09, 2009 @03:06PM (#26787727) Homepage
    Truecrypt is fast. I have it on all my computers and backup devices that handle sensitive information, and there is zero slowdown visible to the user, even for IO-intensive operations. Steve Gibson from the "security now" podcast did his own benchmark where he created a drive image and timed how long it took to defrag the drive, then restored the bits from the image, encrypted with TC, then timed the defrag again. He then repeated the process three times because he didnt believe the results -- the encrypted filesystem ran FASTER. Take the anecdote for what it is, but the principle seems to hold true in my experience too. TrueCrypt is damn fast. It chews a few % of your CPU time when in use, but it doesnt slow things down.
  • by FictionPimp ( 712802 ) on Monday February 09, 2009 @03:14PM (#26787907) Homepage

    We use truecrypt for full drive encryption. So far we have encrypted well over 100 notebooks without issue. The full drive encryption has very little overhead and besides a password at start up most users don't even notice.

  • by Zerth ( 26112 ) on Monday February 09, 2009 @03:18PM (#26787995)

    If the pagefile is located on the encrypted volume, not much harm, might make cryptanalysis easier if someone can get two images of your drive at different times.

    If the pagefile is not on the encrypted volume, then it is leaving chunks of no-longer-secure data for anyone to see.

  • by Estanislao Martínez ( 203477 ) on Monday February 09, 2009 @03:19PM (#26788033) Homepage

    Hard drive encryption isn't meant to protect against social engineering attacks. It's meant to protect against attacks that don't require social engineering, like stealing or cloning a database server's drives for the information. More than anything, it's meant to provide reasonable assurance that if one of your employees' computers gets stolen by a common thief who just wants to sell it for the cash value, somebody else down the line won't be able to read the data in the drive and take advantage of it.

  • by kachakaach ( 1336273 ) * on Monday February 09, 2009 @03:31PM (#26788247)

    Encryption and a whole host of other requirements are now the law in California for any non-profit, local gov or other agency using state funds and that has any personal data anywhere on their systems. This could be something as innocent as the address block in a letter you typed to one person, does not have to mean the "database."

    http://www.documents.dgs.ca.gov/osp/sam/mmemos/MM08_11.pdf [ca.gov]

  • by tgd ( 2822 ) on Monday February 09, 2009 @03:35PM (#26788325)

    TrueCrypt can't do full-drive encryption on OS X.

    You have to go commercial for that.

  • by TheCabal ( 215908 ) on Monday February 09, 2009 @03:38PM (#26788385) Journal

    A simple perusal of their website reveals:

    Q: We use TrueCrypt in a corporate/enterprise environment. Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?

    A: Yes. Note that there is no "back door" implemented in TrueCrypt. However, there is a way to "reset" volume passwords/keyfiles and pre-boot authentication passwords. After you create a volume, back up its header to a file (select Tools -> Backup Volume Header) before you allow a non-admin user to use the volume. Note that the volume header (which is encrypted with a header key derived from a password/keyfile) contains the master key with which the volume is encrypted. Then ask the user to choose a password, and set it for him/her (Volumes -> Change Volume Password); or generate a user keyfile for him/her. Then you can allow the user to use the volume and to change the password/keyfiles without your assistance/permission. In case he/she forgets his/her password or loses his/her keyfile, you can "reset" the volume password/keyfiles to your original admin password/keyfiles by restoring the volume header from the backup file (Tools -> Restore Volume Header).

    Similarly, you can reset a pre-boot authentication password. To create a backup of the master key data (that will be stored on a TrueCrypt Rescue Disk and encrypted with your administrator password), select 'System' > 'Create Rescue Disk'. To set a user pre-boot authentication password, select 'System' > 'Change Password'. To restore your administrator password, boot the TrueCrypt Rescue Disk, select 'Repair Options' > 'Restore key data' and enter your administrator password.
    Note: It is not required to burn each TrueCrypt Rescue Disk ISO image to a CD/DVD. You can maintain a central repository of ISO images for all workstations (rather than a repository of CDs/DVDs). For more information see the section Command Line Usage (option /noisocheck).

    Seriously, a little research isn't hard.

  • by FictionPimp ( 712802 ) on Monday February 09, 2009 @03:38PM (#26788387) Homepage

    We wrote our own tool for storing passwords and the recovery isos. Our users are not administrators so they can't change the passwords on their own.

    It made it all very easy to deal with.

  • by Blakey Rat ( 99501 ) on Monday February 09, 2009 @03:39PM (#26788407)

    The point of the comic is that there's no *practical* difference between, say, 128-bit encryption and 4096-bit encryption because it is, and always will be, easier to just obtain the password somehow than to crack the encryption.

    Meanwhile, crypto-nerds go around scoffing at your primitive WPA wifi encryption and go on to introduce 47 new layers of encryption, all bigger and better than the last, wasting tons of time and money in the process.

    That message still applies, despite everything in your post.

  • by SpottedKuh ( 855161 ) on Monday February 09, 2009 @03:55PM (#26788697)

    The point of the comic is that there's no *practical* difference between, say, 128-bit encryption and 4096-bit encryption [...]

    There's a huge difference. When you see numbers like "128-bit," you're dealing with a symmetric encryption algorithm (e.g., AES). When you see numbers like "4096-bit," you're dealing with an asymmetric algorithm (e.g., RSA).

    See the NIST Recommendation for Key Management (PDF) [nist.gov], page 63. For example, to get RSA that is "equivalently" secure (for some predicted meaning of equivalent) to AES-128, you need a 3072-bit key. The table is explained on page 62.

    As an aside, the comparably small key sizes that asymmetric elliptic curve cryptograph (ECC) can use, illustrated on page 63, are one of the reasons that ECC is so valuable.

  • Re:TrueCrypt (Score:5, Informative)

    by Panaflex ( 13191 ) <{moc.oohay} {ta} {ognidlaivivnoc}> on Monday February 09, 2009 @04:20PM (#26789127)

    Nobody deals with that, for the moment. I don't think the hardware solutions deal with that for every case, either.

    I've heard of some possible solutions being thrown out there - including a CPU "disabled cache"-type software solutions - but there's nothing being sold yet.

  • by Anonymous Coward on Monday February 09, 2009 @04:27PM (#26789243)

    Did you try disabling AHCI in your BIOS first? This would require a reinstall of windows regardless but it will allow truecrypt to function properly.

  • by Anonymous Coward on Monday February 09, 2009 @04:30PM (#26789281)

    As much as I like TrueCrypt, it is not what you want to be using when you have thousands of computers.

    TrueCrypt has no way to remotely install or manage its self. It means taking a trip to each and every computer you own and installing it by hand.

    Sadly one of the commercial solutions in this case will save many a headache.

    Something like Checkpoints Pointsec (or what ever they are calling it this month) or PGP WDE for your computers and give everyone IronKeys which can be centrally managed (Pointsec will also encrypt USB keys as well as allow you to control what USB devices are plugged in).

    And no I'm not a Checkpoint shill...

  • Re:Yeah... (Score:3, Informative)

    by Vancorps ( 746090 ) on Monday February 09, 2009 @04:30PM (#26789293)

    There is still a password to use the flash key. You would never expect an end-user to end a 1024bit key themselves after-all. It's not near as bad as you make it out to be especially since there are multiple authentication techniques which you can perform.

    You are correct in that there are a lot of logistics that have to get worked out before such a system can be deployed. Probably why I've spent a year testing different scenarios and how to handle recovery. I'm finally looking at deploying it company wide even though I'm moving towards virtual desktops anyways which are more about strong authentication beside strong encryption.

  • by Anonymous Coward on Monday February 09, 2009 @04:36PM (#26789365)

    Personally, I would recommend going with a full disk encryption methodology utilizing something similar to Utimaco. This provides a challenge/response feature that will enable you (the IT support staff) to decrypt the drive in a situation that would require you to do so (e.g. an employee departs the company, file system corruption, etc).

    As for the external drives, my personal stance on this is that you establish a policy surrounding such devices that would not allow them to store any sensitive data on them. If necessary, you can of course create encrypted volumes with TrueCrypt, Utimaco or something similar; but doing so (as has been stated) is risky if they forget the password to it.

  • by Ungrounded Lightning ( 62228 ) on Monday February 09, 2009 @04:47PM (#26789511) Journal

    eyeballs and fingers aren't that hard to remove

    Fingerprints are even easier:

      - Get a print on something.
      - "Develop" it to get a computer image of the print.
      - Fabricate a fake finger from the image any of several ways.

    One example:
      - Etch it into a printed circuit board (using a printer and a Radio Shack grade PC board etching kit.)
      - Cast a fake fingertip on the printed circuit. (Gelatin works for a few-shot prosthetic fingerpint. I think silicon caulk works too if you first lightly oil the PC board to keep it from sticking. Etc.)

    Should be similarly easy to make a fake for a retinal scanner from a retinal scan, which is strictly an optic device. (I'd start with a disposable camera for the holder.) Ditto iris scan.

  • SafeGaurd Easy (Score:1, Informative)

    by Anonymous Coward on Monday February 09, 2009 @04:53PM (#26789617)

    This is the encryption system we settled on for our corporation. It has a network deployment, network configuration, it also encrypts the disk while the user is using it, so it takes a day or two as it encrypts in the background and the user can shut off their computer and then it will pick up where they left off.

    Looked at Truecrypt yeah but like several others have mentioned really we find a lot of the open sourced really not very well supported. And what I mean by that is you got a system down you can either go to a forum or send an email and someone may get back with you, then again may not. Safeguard easy has fully staffed help desk and support center. All of our installations except 1 went smooth and that one just wouldn't run the encryption utility from the network. Instead it had to manually be started. I would suspect some user interference from that like blocking ports or something.

    Now I will say we used this for all laptops and desktops and removable drives but not servers. No real need when servers are in data center, if someone were to steal the hard drives from there we got bigger issues. Be forewarned though doing this on a removable drive like a USB drive for example basically renders that drive useless for any computer but the one it was encryption on and others on your network. You can't for example take it home plug it into your home computer and expect it to work. And Why because when you manage encryption centrally you typically have a central key for your corporation so you do not wan to give that key out to everyone so they can take it home.

    Also there is no noticeable performance decrease, even from me as a developer running 2 virtual machines off my hard drive at the same time. I use a standard laptop we give to everyone else which is a Dell Latitude with 2 gigs ram and intel core 2 duo, running XP though not Vista.

    There was slight performance decrease when the drive was encrypting because it was going like mad however that was only for a day, would have been 2 but I took my laptop home turned it on and let it just churn overnight.

    Anyway my 2 cents

  • by Xerolooper ( 1247258 ) on Monday February 09, 2009 @04:56PM (#26789663)
    Yes we encrypt every device(With the exception of PC's). We have not implemented the insert=forced encrypt yet because there are certain software products that use usb dongles that would be encrypted by that policy and they have not worked that out yet. Cameras are a pain and our work requires we use them they are the few times we get viruses although that is not an encryption issue.

    We don't use an open source product except TruCrypt on some of my own portable HDD's. I am pushing that more so we don't have to buy licenses for every piece of hardware. Automation (see below) is a step in that direction. My experiences may still help.

    First where I do use TruCrypt I set up a batch file that opens a simple prompt so the user just enters a password and the drive becomes accessible. The batch file and the TrueCrypt executable both reside on a small unencrypted partition on the drive in question with an autorun.inf file pointing to the batch file. To automatically mount any encrypted volume it sees on the disk you just inserted it goes something like this:
    TrueCrypt\TrueCrypt /a devices /q /e /rm

    Second we use Encryption Plus Hard Disk for our laptops. PC's are not encrypted we invested in a controlled access security system instead of purchasing licenses for all PC's although unlike other /.'rs I can see why you might want to encrypt everything. If your building security is not super tight or just not possible. You have to weigh the possiblity of theft of equiptment against how sensitive your data is.

    Like TrueCrypt our software loads a driver that encrypts and decrypts everything written to the HDD. As you probably know computers aren't always writing to the HDD. So the idea that you'll take a huge performance hit is kind of a misnomer. We have laptops that range from Pentium III's to the latest cpu's. If the laptop is excruciatingly slow to begin with then encrypting the HDD will only make it slightly more excruciating. If the cpu is more current then the user will not notice the difference.

    Yes people loose passwords and forget the challenge questions. Unfortunately here we don't have a good procedure in place to reset them remotely. We have them bring them in and we enter the admin password. Even if the HDD crashes we can pop in the decryption CD and get their data about 50% of the time. Which is not all that far off from the recovery achieved from our unencrypted PC's after HDD crashes.

    In conclusion having imaged and encrypted hundreds of PC's I would say unless you choose the wrong algorithm don't worry to much about performance issues. The most basic algorithms will stop 99% of common thief's from getting at your data. Of course if your worried about the uncommon ones you may have to weigh protection verses performance.
  • by Score Whore ( 32328 ) on Monday February 09, 2009 @04:57PM (#26789671)

    The post you reply to is written by a numbskull. Compiling software doesn't even begin to ensure that all possible memory locations accessed and bit values are written. The vast majority of what is going on during a compile and/or md5 sum is going to happen in the processor's L1 & L2 caches.

    On the other hand memtest86(+) has a methodology that includes disabling cache and ensures that all possible locations are written to and read from. Additionally there is a mixture of patterns used, from random patterns for general testing to specific patterns (both bit value & access ordering) for exercising known failure modes of DRAM.

    Finally the idea that you can "stress" you RAM is nuts. Outside of running the device out of spec (e.g. overclocking), the only "stress" possible is heat and just being on will get it into the normal operating temperatures. Anything else is what it's designed to do, there is no ubermagic access pattern driven by that "well known" gcc that causes DRAM to fall over dead.

  • by zifr ( 1467429 ) on Monday February 09, 2009 @04:59PM (#26789693)
    My company has been encrypting everything for some time. We have used Truecrypt with no issues for around 1.5 years I believe. Our linux machines are all encrypted. It's easy to implement with Fedora 9+ and Ubuntu 8.10 alternate installer as Anaconda handles it for you. I also have several encrypted RAID arrays. If you want pm me for a write up on it. I don't want my site getting slashdotted ;) . I'll be happy to give you my how-tos' Just remember, nothing is 100% secure. Document everything. As far as performance is concerned. We have noticed no significant impact from disk encryption. Let all the naysayers whine and say I'm full of it. TOP reports that our encryption from cryptsetup consumes about 5% of our procs on our older IBM celerons 2ghz, that's while writing to an array. The array (mdadm) consumes about another 5 %. It consumes around the same on a single core of our new machines. Our new machines, i.e. Core2Duo 2.2's, Xeon Quads 2.13's and an AMD dual core 2.2 you don't even notice it. Frankly it's so easy to encrypt a system drive these days I am of the mind you are foolish not to do so. The only downside I have come across with system encryption is that I can't do remote reboots. There is a way around it I've read but it's not really an issue for us. Message me if you want, or can. I never have pm'd anyone here before.
  • by fava ( 513118 ) on Monday February 09, 2009 @05:15PM (#26789903)

    Believe or not that method has a name.

    Its called "rubber hose cryptanalysis": http://en.wikipedia.org/wiki/Rubber_hose_cryptanalysis [wikipedia.org]

  • by NereusRen ( 811533 ) on Monday February 09, 2009 @05:44PM (#26790381)

    I've used both truecrypt and compusec, and for a corporate environment only compusec is acceptable. Truecrypt does not provide a master password you can use to quickly reset a password when the user forgets.

    That's not true. Restoring access to a container or partition with a forgotten password is quite easy if you do one extra step when creating the container. From their FAQ:

    Q: We use TrueCrypt in a corporate/enterprise environment. Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?

    A: Yes. Note that there is no "back door" implemented in TrueCrypt. However, there is a way to "reset" volume passwords/keyfiles and pre-boot authentication passwords. After you create a volume, back up its header to a file (select Tools -> Backup Volume Header) before you allow a non-admin user to use the volume. Note that the volume header (which is encrypted with a header key derived from a password/keyfile) contains the master key with which the volume is encrypted. Then ask the user to choose a password, and set it for him/her (Volumes -> Change Volume Password); or generate a user keyfile for him/her. Then you can allow the user to use the volume and to change the password/keyfiles without your assistance/permission. In case he/she forgets his/her password or loses his/her keyfile, you can "reset" the volume password/keyfiles to your original admin password/keyfiles by restoring the volume header from the backup file (Tools -> Restore Volume Header).

    Similarly, you can reset a pre-boot authentication password. To create a backup of the master key data (that will be stored on a TrueCrypt Rescue Disk and encrypted with your administrator password), select 'System' > 'Create Rescue Disk'. To set a user pre-boot authentication password, select 'System' > 'Change Password'. To restore your administrator password, boot the TrueCrypt Rescue Disk, select 'Repair Options' > 'Restore key data' and enter your administrator password.
    Note: It is not required to burn each TrueCrypt Rescue Disk ISO image to a CD/DVD. You can maintain a central repository of ISO images for all workstations (rather than a repository of CDs/DVDs). For more information see the section Command Line Usage (option /noisocheck).

    The actual FAQ has many of those terms linked to other help files for more info: http://www.truecrypt.org/faq.php [truecrypt.org]

    They don't mention it explicitly, but this process does not require any computation/decryption on the actual data. It will be very fast to execute no matter how large the container is.

  • Re:TrueCrypt (Score:5, Informative)

    by rduke15 ( 721841 ) <rduke15@gTWAINmail.com minus author> on Monday February 09, 2009 @06:09PM (#26790821)

    TrueCrypt has several options. The way I have it configured, the TC volume is automatically unmounted when I suspend, and I need to re-mount it when the notebook wakes back.

    I understand the password is not in RAM anymore after a suspend. These are the options I use:

    "SaveVolumeHistory" = 0
    "CachePasswords" = 0
    "WipePasswordCacheOnExit" = 1
    "WipeCacheOnAutoDismount" = 1
    "StartOnLogon" = 0
    "MountDevicesOnLogon" = 0
    "MountFavoritesOnLogon" = 0
    "DismountOnLogOff" = 1
    "DismountOnPowerSaving" = 1
    "DismountOnScreenSaver" = 0
    "ForceAutoDismount" = 1

  • Re:TrueCrypt (Score:2, Informative)

    by root777 ( 1354883 ) on Monday February 09, 2009 @06:34PM (#26791199) Homepage
    When you don't need TrueCrypt or for that matter any whole disk encryption software

    A Crypto nerd's imagination
    Person1: His laptop's encrypted. Let's build a million dollar cluster to crack it
    Person2: No Good! Its 4096 bit RSA!
    Person1: Blast! Our evil plan is foiled!

    What would actually happen:
    Person1: His Laptop's encrypted. Drug him and hit him with this $5 wrench until he tells us the password
    Person2: Got it

    Source: http://xkcd.com/538/ [xkcd.com]
  • Re:TrueCrypt (Score:4, Informative)

    by duffbeer703 ( 177751 ) on Tuesday February 10, 2009 @12:18AM (#26793497)

    You are misunderstanding the problem. Defending data in a datacenter is a completely different problem that data-at-rest encryption really doesn't help you with.

    In most states, whenever a client computer could contain personally-identifying data, data breaches must be exposed to any potential victim and the general public.

    In some cases, that includes things like browser caches, and other temporary files. So most financial institutions and government agencies opt to encrypt all mobile devices. Some law enforcement agencies encrypt desktop computers as well.

    Encryption is very easy to do. Key management is hard. Truecrypt is great for an individual user, but falls down when you have to manage a non-trivial number of clients.

  • Re:TrueCrypt (Score:3, Informative)

    by Lt.Hawkins ( 17467 ) on Tuesday February 10, 2009 @03:02AM (#26794373) Homepage

    He means overwrite the keys in memory, not trash the hard drive. So that a reboot will be necessary, which will then prompt for the password. It really should be done.

    Truecrypt can dismount regular drives on screensaver launch. I don't think it can dismount the system drive though.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...