Leonard Rosenthol on Sun, 10 Dec 2000 19:37:50 -0500


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Linux Crypto File Systems


At 1:54 PM -0500 12/10/00, Tracy Nelson wrote:
> Compressed file systems are HARD to do right, and are also
 covered by a number of patents in that area.  You don't want to go
 there.

Who said anything about compressed filesystems? I said the data should be compressed *before* it was encrypted, which is before it gets to the filesystem.

What's the difference? If the data is compressed by the disk driver then it's a "compressed file system" even if it ALSO happens to do encryption.


The issues have to do with the fact that compression chances the size of data, while encryption does not, which means that blocks and byte offsets are no longer static across the driver boundary.


> No it's not! The right thing to do, as they do it on other
platforms, is that crypto goes into the device driver.

Fine if you've got the cycles to spare on it -- I was addressing the issue raised in a previous message, which stated that a major problem with encrypting filesystems was their speed degradation.

That appears to be ONLY on Linux. On Mac OS and Wintel, they don't have such problems - which may be due to the fact that companies are willing to spend the money to invest in them there. (and even make the source open!).



No, seriously.  There are *lots* of ways you can do simple encryption, and
without the right tools codebreaking, you're stuck.  I'd estimate at least
three days, probably more like a week.

In some cases it's also a factor of the quality of the passphrase. If we assume that most folks trying to break crypto will run a brute-force dictionary attack on it first (ie. try decrypting using each word in the dictionary), then the less common your passphrase (ie. use of spaces, non-letters, etc.) you're already off to a good start.


The second is the use of obscurity in the documentation of the algorithm - ie. security through obscurity. If the encryption algorithm used is not known OR there is no "quick & dirty decryptor too" then the above attack is not going to happen and so you've put another roadblock into play. (of course, NO ONE serious about crypto is going to use a product whose algorithm isn't documented and preferably crypto-reviewed).


What sort of PD/OS code is available for codebreaking, anyway?

Depends on the platform, file/disk type, etc.


Or do security consultants generally
have their own private bag of tricks?

	Yes!


LDR -- ---------------------------------------------------------------------------- You've got a SmartFriend? in Pennsylvania ---------------------------------------------------------------------------- Leonard Rosenthol Internet: leonardr@lazerware.com America Online: MACgician Web Site: <http://www.lazerware.com/> FTP Site: <ftp://ftp.lazerware.com/> PGP Fingerprint: C76E 0497 C459 182D 0C6B AB6B CA10 B4DF 8067 5E65


______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug