File Systems Security Encryption File Systems
|
|
|
- Geoffrey Dawson
- 10 years ago
- Views:
Transcription
1 ISE331: Fundamentals of Computer Security Spring 2015 Radu Sion File Systems Security Encryption File Systems Thanks to G. Suryanarayana and K. Thangavelu Fair-use educational use of several online public information sources.
2 Encryption File Systems (EFS) What is an encryption file system? Alternatives Crypt Stores plain files during editing Need to supply the key several times Integrated security in applications Goals Security Usability Performance Fundamentals of Computer Security 2
3 Goals of EFS Security Privacy On disk On wire Integrity Authentication Authorization Fundamentals of Computer Security 3
4 Goals of EFS Usability Convenience Transparency User Applications Performance Encryption Integrity checking Costs with indirection Copying data Context switching (user land vs. kernel) Fundamentals of Computer Security 4
5 Challenges in EFS Key Management Storage of keys On disk In memory Swapped out pages Sharing of keys Group management Key compromise Re-encrypt files Costly Gives adversary two versions of same file to work with Key revocation Fundamentals of Computer Security 5
6 Challenges in EFS Utility services Backup possible after encryption? File system checker De-fragmentation Random access Cannot use stream ciphers Reduces strength of privacy Use block encryption May leak information Frequency analysis Fundamentals of Computer Security 6
7 Challenges in EFS Forward Secrecy Data is persistent sitting duck effect Strong encryption Long keys File specific keys IV or Block specific encryption Granularity of encryption All or nothing Per file encryption Fundamentals of Computer Security 7
8 Agenda CFS TCFS Cryptfs NCryptfs ecryptfs Microsoft EFS Fundamentals of Computer Security 8
9 CFS - Cryptographic File System First system to push encryption services in the File System layer Implemented in the User Layer No kernel recompilation required Portable Standard Unix FS API support Can use any file systems as its underlying storage Transparent encryption All or nothing encryption Fundamentals of Computer Security 9
10 CFS Data Flow in Standard Vnode File System Fundamentals of Computer Security 10
11 CFS Data Flow in NFS Client and server NFS Client Auth: uid/gid RPC XDR NFS Server Network Fundamentals of Computer Security 11
12 CFS CFSD Level of Indirection Fundamentals of Computer Security 12
13 CFS CFSD a modified NFS server Supports all normal NFS RPCs Provides additional RPCs Accepts RPC from localhost only No modification to NFS client Start CFSD at boot time Mount /cryptfs A virtual file system Fundamentals of Computer Security 13
14 CFS Attach a cryptographic key to a directory Directory can be local or remote Fundamentals of Computer Security 14
15 CFS Attach an encrypted directory Key verified by using a special file in directory encrypted by the hash of the key Fundamentals of Computer Security 15
16 CFS Detach an encrypted directory Additional commands cname ccat Fundamentals of Computer Security 16
17 CFS - Security Uses DES in ECB why? Uses pass phrases Key 1 Long Bit Mask (Prevent structural analysis) Key 2 Encrypt blocks in ECB mode IV Prevent structural analysis across files XORed with each block No Chaining Stored in GID (High security mode) Fundamentals of Computer Security 17
18 CFS - Security Filenames are encrypted and encoded in ASCII increases size of file names An attach can be marked obscure security through obscurity File sizes, access times and structure of directory hierarchy is not encrypted Fundamentals of Computer Security 18
19 CFS Performance Data is copied several extra times Application -> kernel -> CFS daemon (User Layer) -> back to the kernel -> underlying file system. No write cache, only read caches Fundamentals of Computer Security 19
20 TCFS Transparent CFS Implemented as a modified kernelmode NFS client Kernel module recompilation required User level tools recompilation required Fundamentals of Computer Security 20
21 TCFS mountd ioctl TCFS NFS Client RPC XDR Network NFS Server xattrd Fundamentals of Computer Security 21
22 TCFS - Operation Server exports a directory /etc/exports /exports bar(rw,insecure) NFS server not modified Client mounts a remote dir with type tcfs mount -t tcfs foo:/exports /mnt/tcfs A modified mount command in nfs-utils Encrypted files are set with special attribute A modified xattrd User master key must be set to access files Fundamentals of Computer Security 22
23 TCFS - Operation Fundamentals of Computer Security 23
24 TCFS Key Management Raw key management New ioctls recognized by client Provides basis for other schemes Basic Key Management The key database /etc/tcfspwdb sysadmin registers a user Fundamentals of Computer Security 24
25 TCFS Key Management User creates a master key sysadmin can remove a user Fundamentals of Computer Security 25
26 TCFS Key Management The Kerberized Key Management Scheme Request ticket Kerberos Server Client Ticket for TCFSKS TCFS Key Server NFS Server Fundamentals of Computer Security 26
27 TCFS Key Management The Kerberized Key Management Scheme Kerberos Server Client Request master key Encrypted master key TCFS Key Server NFS Server Fundamentals of Computer Security 27
28 TCFS Key Management The Kerberized Key Management Scheme Kerberos Server Client Request file TCFS Key Server Return file NFS Server Fundamentals of Computer Security 28
29 TCFS Key Management Group/Threshold Sharing Similar to secret splitting sysadmin creates a group tcfsaddgroup g <group> # of users name of users threshold password User activates a group tcfsputkey g <group> tcfsrmkey g <group> Fundamentals of Computer Security 29
30 TCFS - Encryption Multiple cipher support File specific key File header file specific key cipher Block encryption block key Hash(File Key Block no) Protection against structural analysis Authentication tag Hash(Block data block key) Detect data change/swap Fundamentals of Computer Security 30
31 TCFS - Encryption Fundamentals of Computer Security 31
32 TCFS - Performance Less overhead than CFS data copied fewer times Random access is slower RTT for remote attribute checking makes is slower than vanilla NFS Fundamentals of Computer Security 32
33 Cryptfs: A Stackable Vnode Level Encryption File System User Space Process Kernel Space Virtual File System (VFS) A layer of abstraction FAT Ext2 NFS Fundamentals of Computer Security 33
34 Cryptfs VNodes open file, directory, device, socket Higher layers access all entities uniformly VNode stacking Modularize file system functions Fundamentals of Computer Security 34
35 Cryptfs A stackable Vnode interface Fundamentals of Computer Security 35
36 Cryptfs Key Management Root mounts an instance of Cryptfs User passphrases User Key = MD5Hash(passphrases) Special ioctl to manage keys set/reset/delete keys Two modes of operation Key lookup on user id alone Fundamentals of Computer Security 36
37 Cryptfs Key Management Key lookup on <user id, session id> What is a session? Unix sessions! Protected again user account compromise Keys associated with real UID, not effective ones Groups Decouple from unix groups Must share the key Use multiple keys in different sessions Fundamentals of Computer Security 37
38 Cryptfs Security block size = page size Cipher: Blowfish Does not change the size of file Mode: CBC Only inside a block/page Limits dependency between blocks Allows random access One IV per mount No file specific key Encrypt file and directory names uuencode 3 bytes of binary = 4 bytes of ascii (44-111) File names become 33% longer Checksums for filenames Fundamentals of Computer Security 38
39 Cryptfs: write bytes Interposing Layer Interposed Layer Fundamentals of Computer Security 40
40 Cryptfs Works on top of any native FS No other daemons required Portable Exceptions Exporting symbols Modifications to FS data structure Kernel resident Kernel memory is difficult to get at vs.:cfs stores in user level memory Fewer context switches than CFS and TCFS Fundamentals of Computer Security 41
41 NCryptfs Advanced version of Cryptfs Attachments A single mount operation under /mnt/ncryptfs Attach an encrypted directory nc_attach -c blowfish /mnt/ncryptfs mail /home/kvthanga/mail % Enter key: Fundamentals of Computer Security 42
42 NCryptfs Mounts Done by the superuser - modify /etc/fstab Encrypted directories can be mounted on any other directory May execute many mount commands Directory mounted on must already exist May hide underlying dirs OS have hard limits for mounts Attaches Can be done by any user - A light weight mount Attaches are created only under /mnt/ncryptfs One mount to mount /etc/ncryptfs No directories or files can be created on /etc/ncryptfs - Entries created in dcache Does not hide any underlying data No limits Fundamentals of Computer Security 43
43 NCryptfs Attachments Encryption key Authorizations Active Sessions Fundamentals of Computer Security 44
44 NCryptfs Encryption key Long lived key for Data File names checksums No file specific key Created from hash of user passphrase Key related data is pinned in memory Pages with keys are not swapped Support multiple ciphers CFB - Cipher feedback mode of operation File size does not change Fundamentals of Computer Security 45
45 NCryptfs Players System Administrator Mounts NCrytpfs Installs the NCryptfs kernel and user-space components Owners Controls encryption key Delegates access rights Reader & Writers Don t have the encryption key Fundamentals of Computer Security 46
46 NCryptfs Authorizations Gives an entity access to an attach Entity process, session, user or group Create an authorization Entity selects a passphrase Sends salted MD5 hash of it to owner Entity does not have to share passphrase with owner What is a salted MD5 hash? Owner adds hash to configuration file Fundamentals of Computer Security 47
47 NCryptfs Use an authorization nc_auth /mnt/ncryptfs mail Creates a session Active sessions Entity Permissions granted to the entity - bitmask Unix permissions Read, Write, Execute Fundamentals of Computer Security 48
48 NCryptfs Detach Add an Authorization List Authorizations Delete an Authorization Revoke an active session List active sessions Bypass VFS Permissions Fundamentals of Computer Security 49
49 NCryptfs Attach access control Attach default everyone Authentication Attach names User specified NCryptfs u<userid>s<sessionid> Random name Prevents namespace clash Fundamentals of Computer Security 50
50 NCryptfs Groups Supports native groups has to be setup ahead of time Support ad-hoc groups still need permission to modify low level objects Use Bypass VFS permission Fundamentals of Computer Security 51
51 NCryptfs Bypass VFS permission current->fsuid = owner s Restore(current->fsuid) Fundamentals of Computer Security 52
52 NCryptfs Timeouts Active sessions permission denied new file opens fail new file open suspends process until re-authentication all operations suspend process until re-authentication Authorizations new uses can t create new sessions old sessions may continue Keys key is deleted or use denied for new files User space timeout callbacks Fundamentals of Computer Security 53
53 NCryptfs Revocation Similar to timeout Can re-authenticate Portability Modification to task structure On-exit callbacks delete keys memory resources Challenge response authentication Cache clearing Fundamentals of Computer Security 54
54 ecryptfs from IBM Motivation/ Problem History and Overview ecryptfs solutions Design overview Design Details Key management VFS operations Using ecryptfs Future enhancements
55 Motivation Confidentiality when outside host operating environment. Easy to use secure data store. Convenient backup procedures. Key retrieval. Intuitive minimal learning by users. Policies and owners. Cost of technology and adoption. Knowledge and extent of risks
56 History/ Overview Derived from Erez Zadok s cryptfs (FIST framework). Part of Linux from version onwards. Encryption at file level. File contains metadata for decryption. Native kernel FS (POSIX)- no need for patches. Seamless security - data encryption on the fly Seamless key mgmt - Linux kernel keyring. Incremental development current ver 0.1.
57 Why a new thing? extends Cryptfs to provide advanced key management and policy features stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts the file will be decryptable with the proper key, and there is no need to keep track of any additional information aside from what is already in the encrypted file itself.
58 ecryptfs from IBM Motivation/ Problem History and Overview ecryptfs solutions Design overview Design Details Key management VFS operations Using ecryptfs Future enhancements
59 ecryptfs solutions Confidentiality - Integration of security into FS (Lotus Notes analogy of secure transmission) Ease of deployment No kernel modifications, No separate partition, per-file meta data TPM utilization- generate key pair for session key encryption. Key Escrow usage. (Author s suggestion) Easy Incremental backups. Lower File System independent.
60 Design overview
61 ecryptfs from IBM Motivation/ Problem History and Overview ecryptfs solutions Design overview Design Details Key management VFS operations Using ecryptfs Future enhancements
62 Details: enc/decrypt individual data extents File Encryption Key Encryption Key (FEKEK)
63 Design Details File format Follows OpenPGP format Deviation for PGP Encryption on extents Each extent has unique IVs. Some extents contain only IVs for data extents Sparse file support fill encrypted 0s CBC block cipher for extents
64 Design Details (Contd..) PGP File header format File format (contd) Page 0 Header, Page 1-n: Data + Extent. Bytes Standard information for file. Marker 32 bit number for uniquely identification Byte 20 onwards Set of all authentication tokens for the file Encrypted File Encryption Key
65 Design Details (Contd..) Kernel Crypto API In kernel encryption faster Any symmetric cipher supported by cryptoapi IV (Initialization Vector) Avoid risk of cryptanalysis- unique IV for extents Initial IV MD5 sum of file encryption key (K R ) Integrity verification Keyed hash over extents using K R. Generate hash whenever data changes Verify during read, assert hash verifies.
66 Design Details (Contd..) In-memory Cryptographic Context - Stored in user session s keyring. Session key for the file. Encryption status. crypto API context cipher, key size, etc Size of the extents. Key revocation Acquire the passphrase and the session key from it. Regenerate a new session key and encrypt all data once again.
67 Design Details (Contd..) Is a stackable FS Does not write directly onto block device. Each VFS object maps onto a lower object. Any POSIX compliant FS can act as a lower FS. VFS objects private data holds: The reference to lower objects. Current context required for encryption/ decryption.
68 ecryptfs from IBM Motivation/ Problem History and Overview ecryptfs solutions Design overview Design Details Key management VFS operations Using ecryptfs Future enhancements
69 In memory context in the inode Authentication token
70 Key management Supports all ciphers and key sizes of cryptoapi Default AES-128 User mode User passphrase + Salt MD5 hash 64K times Authentication token AT File header Kernel mode Random number generator N byte File Encryption Key FEK Encrypt using Authentication Token File header
71 Key management (Contd ) Encryption Authentication token found in keyring after mount. FEK encrypted with each user s AT and stored in header. Authentication token of each user stored in header Decryption: Authentication token matched with each token in header File Encryption Key decrypted with proper AT and stored in keyring Support for multiple users
72 Key management (Contd..) Pluggable Authentication Module Configure ways to authenticate the user (generate token) Passphrase (salted)- Stored in keyring Use passphrase to extract public key Use this derived key in combination with key from TPM Use a smart card or USB to store the key Pluggable PKI Module use x509 certificates, revocation lists etc and manage keys better Key identifier + Encrypted data External PKI module Plain text data Authenticates the identifier and decrypts the data if valid
73 Key Callout, ecryptfs Daemon Kernel User Kernel Crypto API Key extractor (Key store) Keystore callout ecryptfs layer VFS syscall ecryptfs daemon File structure Crypto metadata PKI module Filesytem PKI API
74 Key management (Contd..) Key Callout Means of communication between kernel and user module Parses policy information on target Finds passphrase or public keys of users ecryptfs Daemon Means to get to the user X-session if need to be prompted for a passphrase Key Escrow A centralized trusted party stores all keys Secret sharing/ splitting In a dynamic environment, this could be used for a balance between key secrecy and sharing
75 VFS Operations (version 0.1) Mount User passphrase Helper application Authentication token User session keyring Set up context for new files Mount parameter id ecryptfs Authentication token from key ring Set up context for new files
76 VFS Operations (Contd..) File Open Existing file Validate the unique ecryptfs marker Match the Authentication token Decrypt File Encryption Key Root IV = N bytes of MD5(File Encryption Key) Update the context in the inode with File Encryption key Key size Cipher name Root IV Number of header pages and extent size
77 VFS Operations (Contd..) File Open New file Generate a File Encryption Key in kernel Fill inode context Cipher name AES 128 Root IV N bytes of MD5(File Encryption Key) Header page 1, extent size kernel page size Initialize the kernel crypto API context for the file CBC mode Get Authentication token, Encrypt FEK with it Header to be written to disk on close
78 VFS Operations (Contd..) Page Read/ Write File is open and inode contains relevant context Lower page index= index + Num of header pages IV = Root IV + page index Fetch the key and cipher used from context Calculate the extent boundaries for operation Set up state to be used by crypto API Read Disk -> Encrypted page + context -> crypto API -> Clear text page -> Caller Write Caller -> Clear text page + context -> crypto API -> Encrypted text page -> Disk
79 VFS Operations (Contd..) File truncation File size updated in header Write encrypted 0s after new EOF File Append Translated into write to the appropriate page in the lower file File Close Free up associated VFS objects If new file, write the header on disk Existing file, no change to the on disk header
80 ecryptfs from IBM Motivation/ Problem History and Overview ecryptfs solutions Design overview Design Details Key management VFS operations Using ecryptfs Future enhancements
81 Using ecryptfs Linux Journal article dated 04/01/07 Detailed usage instructions Sample usage #modprobe ecryptfs - Load the module #mount t ecryptfs /sec /sec overlay mount Enter passphrase: Enter cipher: #cat Hello world > secret.txt PKI modules can be selected by mount options for public key support
82 Future work Incremental development versions 0.1, 0.2, 0.3 planned Mount wide public key support Filename and metadata (size and attributes) encryption ecryptfs policy generators using generic utils Convenient GUI for ease of use Timeouts as supported by Ncryptfs Yet to address Temporary files left unencrypted Data on swap partition unencrypted (!!!)
83 EFS (Microsoft) Background of Invention Objects and Summary of invention General architecture Components of EFS EFS Driver File System Run Time Library (FSRTL) FSRTL callouts EFS service Win32 API Data Encryption/ Decryption/ Recovery General operations Miscellaneous details Security holes in EFS
84 Overview Q: Forward secrecy?
85 Background of Invention Problem: Protecting sensitive data on disk Solution: Encrypt sensitive data Associated problems with naïve approach Users choose weak passwords Lost keys share keys, compromise security Key revocation Overhead in encrypting each file Intermediate temporary files Application level encryption key prone to attack Not scalable to large number of users
86 Objects/ Summary of Invention Secure Storage- Integrate security into storage Security transparent to legitimate users Share data legitimately and securely Extensible Adding new users/ ciphers Data recovery when user key lost Symmetric + Asymmetric Performance Reference cipher: RSA + DES Quick idea User chooses to encrypt System generates a key (FEK) and prepares the context. Data encrypted transparently using context FEK encrypted with user public key in the file
87 General Architecture where EFS exists Workstation/ Server/ Standalone system Processor Memory Operating System (Win NT) File System (NTFS) Set of APIs I/O devices Non volatile storage device Swap space VM
88 General Architecture where EFS exists
89 Encrypting File system and Method Background of Invention Objects and Summary of invention General architecture of EFS Components of EFS EFS Driver File System Run Time Library (FSRTL) FSRTL callouts EFS service Win32 API Data Encryption/ Decryption/ Recovery General operations Miscellaneous details Security holes in EFS
90 Components of EFS
91 EFS Driver (EFSD) Sits above NTFS Instantiation of EFSD Registers FSRTL CB with NTFS EFSD <-> EFSS Key mgmt services Generate keys, Extract key from metadata, Get updated key GenerateSessionKey for secure communication Session Key used for EFSS<->EFSD<->FSRTL EFSD <-> FSRTL through NTFS To perform FS operations read/write Update with latest key
92 EFS FSRTL (FS Run Time Library) Implements callout functions for FS operations Generic Data Transformation interface FSRTL uses this for data encryption Gets FEK from EFSD Maintains cryptographic context EFSD and FSRTL Part of same component EFSD <-> FSRTL through NTFS to maintain consistent FS state
93 Encrypting File system and Method Background of Invention Objects and Summary of invention General architecture Components of EFS EFS Driver File System Run Time Library (FSRTL) FSRTL callouts EFS service Win32 API Data Encryption/ Decryption/ Recovery General operations Miscellaneous details Security holes in EFS
94 EFS FSRTL Callout Functions FileCreate for existing file Called by NTFS if it determines FSRTL is interested in it. Reads metadata from file and fills context EFSD later reads context, gets key from EFSS EFSD sets up key context with the key and stores in NTFS FileCreate for new file Called by NTFS if the directory is set as encrypted. Fills up context as requisition for new key EFSD requests new key from EFSS EFSD sets up key context with the key and stores in NTFS
95 EFS FSRTL Callout Functions (Contd..) Filecontrol_1 Called by NTFS when the state of the file changes If encrypting no other operations until complete Filecontrol_2 Communication between EFSD and FSRTL Various requests with associated data for context preparation EFS_SET_ATTR write new metadata to FSRTL EFS_GET_ATTR get stored metadata from FSRTL EFS_DECRYPT_BEGIN FSRTL locks file until decrypt ends EFS_DEL_ATTR Decryption done, delete metadata EFS_ENCRYPT_DONE Encryption done, allow other operations
96 EFS FSRTL Callout Functions (Contd..) AfterReadProcess FS calls this if stream needs to be decrypted FSRTL decrypts the stream, FS returns to user BeforeWriteProcess FS calls this if stream needs to be encrypted FSRTL encrypts the stream, FS stores on disk CleanUp FS calls this before freeing resources for stream FSRTL frees up its context and resources allocated
97 EFS FSRTL Callout Functions (Contd..) AttachVolume FS calls this on first user [en/de]cryption on the volume FSRTL requests attachment to the device All calls routed to EFS Driver before NTFS DismountVolume FS calls this if when drive ejected or power off Free allocated resources during AttachVolume
98 EFS Service
99 EFS Service Part of Win NT security service Secure communication with kernel through LSA Talks to CryptoAPI in user space Services provided Generate Session Key Generate File Encryption Key (FEK) Extract FEK from metadata using user s private keys Win32 API support EFSD and EFSS synchronize with one other on startup and exchange session key
100 Encrypting File system and Method Background of Invention Objects and Summary of invention General architecture Components of EFS EFS Driver File System Run Time Library (FSRTL) FSRTL callouts EFS service Win32 API Data Encryption/ Decryption/ Recovery General operations Miscellaneous details Security holes in EFS
101 Win32 API User mode services by EFSS to use encryption Interfaces provided for operations on plain text files EncryptFile DecryptFile Interfaces provided for backup encrypted files OpenRawFile ReadRawFile WriteRawFile CloseRawFile During raw file transfer, EFSS informs FSRTL through FileControl_2 not to encrypt/decrypt data
102 Overview
103 Data Encryption Encryption Key Rand num Ref symmetric cipher DES Data Decryption Field - DDF Data Recovery Field - DRF Private keys on smart card not used during encryption Ref asymmetric cipher RSA Not tied to any cipher or key length
104 Data Decryption FEK used to decrypt the cipher text One of them will decrypt the key User private key is used to decrypt each DDF FEK and Decryption stored in context info Ease of random access
105 Data Recovery When users leave/ lose keys Search starts from DDF and goes on to DRF Reveals only FEK not user private key Domain policy decides the recovery agents Policy contains public keys Agent specifies private key Policy MD5 hashed to ensure authenticity Hash value authenticated before using the policy
106 Encrypting File system and Method Background of Invention Objects and Summary of invention General architecture Components of EFS EFS Driver File System Run Time Library (FSRTL) FSRTL callouts EFS service Win32 API Data Encryption/ Decryption/ Recovery General operations Miscellaneous details Security holes in EFS
107 General operation Create/ Open Generic Win32 API for file create/ open API calls land at I/O layer. Decides apt FS EFS creates a new context for the file If stream needs encryption, call FSRTL Verification: Pass metadata to EFSS New FEK: Request new key from EFSS New file- Request for FEK Existing file Load meta data from file to context. Request verification Mark file as encrypted Stores the updated metadata from EFS driver onto disk
108 General operation Read Args: File Offset, Length, Buffer, Key AfterRead Callout
109 General operation Write BeforeWrite Callout Deletes the clear text copy
110 General operation Win32 EncryptFile Directory is simply marked as its data is not encrypted
111 General operation Win32 DecryptFile Make a copy of the original file Directory is simply marked as its data is not encrypted Overwrite the original with plaintext
112 Miscellaneous details Intermediate/ Temporary files encrypted too EFSD uses non paged pool of memory FEK and other context details not swapped to disk Data sharing FEK encrypted with public keys of all legitimate users Easy to use - no administrative effort involved Support for encryption on remote server Server support for EFS, Data on wire in plaintext File copy across FS Copy across EFS aware FS encrypted content Copy to EFS unaware FS (FAT32) plaintext data copied
113 Security holes in EFS (Win 2K) Administrator Default Recovery agent Has access to all user data Win XP has no default recovery agent Policy decides agents User Private key protection Protected by user password only Not encrypted Weak Hashes of pass-phrases are kept!!! Key lies in all kinds of other places that are accessible at various times to different principals (e.g., pass reset etc.) No secure deletion in place After encrypting files, plaintext version only deleted Win XP does not yet solve this problem Use third part tools for secure deletion Directory contents not encrypted
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Encrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
CifrarFS Encrypted File System Using FUSE
CifrarFS Encrypted File System Using FUSE Anagha Kulkarni Department of Computer Engineering and Information Technology, College of Engineering, Pune, 411005, India Vandana Inamdar Department of Computer
Open Source Encrypted Filesystems for Free Unix Systems
Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis [email protected] Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Akshay Kumar Jain Department of CSE, Jaypee Institute of Engg. & Technology Guna (M.P.), India
(IJCSIS) International Journal of Computer Science and Information Security, Efficient methodology for implementation of Encrypted File System in User Space Dr. Shishir Kumar Department of CSE, Jaypee
Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
EFS Table of Contents
Encrypting File System for Windows 2000 Abstract This document provides an executive summary and a technical overview of the encrypting file system (EFS) that will be included with the Microsoft Windows
Plutus: scalable secure file sharing on untrusted storage
Plutus: scalable secure file sharing on untrusted storage Mahesh Kallahalla HP Labs Joint work with Erik Riedel (Seagate Research), Ram Swaminathan (HP Labs), Qian Wang (Penn State), Kevin Fu (MIT) March
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
SGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
SiRiUS: Securing Remote Untrusted Storage
SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University Introduction Secure network file systems not widespread. Why? 1. Hard
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF
Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
Dept. of Comp. Sc. & Engg., Shri Jagdishprasad Jhabarmal Tibrewala University (JJTU) Chudella, Jhunjhunu, Rajasthan, INDIA
A Windows Based Java File Security System (JFSS) 1 Brijender Kahanwal, 2 Tejinder Pal Singh, 3 Dr. R. K. Tuteja 1 Dept. of Comp. Sc. & Engg., Shri Jagdishprasad Jhabarmal Tibrewala University (JJTU) Chudella,
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD
Cryptographic Filesystems Background and Implementations for Linux and OpenBSD Background Loop device primer Keys, cipher modes, salting, key hashing Journaling file systems and encrypted swap Offset,
Security in Storage Networks A Current Perspective
Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security
OPERATING SYSTEMS FILE SYSTEMS
OPERATING SYSTEMS FILE SYSTEMS Jerry Breecher 10: File Systems 1 FILE SYSTEMS This material covers Silberschatz Chapters 10 and 11. File System Interface The user level (more visible) portion of the file
CS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
File System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert [email protected] T. Andrew Yang [email protected] Division of Computing and Mathematics University of Houston - Clear Lake,
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
Mobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
File Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Encrypting stored data. Tuomas Aura T-110.4206 Information security technology
Encrypting stored data Tuomas Aura T-110.4206 Information security technology Outline 1. Scenarios 2. File encryption 3. Encrypting file system 4. Full disk encryption 5. Data recovery Simple applications
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
1. STORAGE ENCRYPTION AND JAVA FILE SECURITY SYSTEM
1. STORAGE ENCRYPTION AND JAVA FILE SECURITY SYSTEM Nowadays, the attacks are going to increase at the storage data systems. So the security systems are going to turn into a compulsory attribute of any
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Using Microsoft Windows Encrypted File System (EFS)
Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Chapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS
Introduction to Highly Available NFS Server on scale out storage systems based on GlusterFS Soumya Koduri Red Hat Meghana Madhusudhan Red Hat AGENDA What is GlusterFS? Integration with NFS Ganesha Clustered
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
PGP Whole Disk Encryption Training
PGP Whole Disk Encryption Training Agenda WDE Overview Licensing Universal Server & Client Basics Installation Password Recovery OS Maintenance Support Questions 2 Whole Disk Encryption Protects against:
Performance Evaluation of Java File Security System (JFSS)
Available online at www.pelagiaresearchlibrary.com Advances in Applied Science Research, 2011, 2 (6):254-260 ISSN: 0976-8610 CODEN (USA): AASRFC Performance Evaluation of Java File Security System (JFSS)
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Chapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Guide to Securing Microsoft Windows 2000 Encrypting File System
Report Number: C4-006R-01 Guide to Securing Microsoft Windows 2000 Encrypting File System Systems and Network Attack Center (SNAC) Authors: Graham Bucholz Harley Parkes Updated: January 2001 Version 1.0
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
COS 318: Operating Systems. File Layout and Directories. Topics. File System Components. Steps to Open A File
Topics COS 318: Operating Systems File Layout and Directories File system structure Disk allocation and i-nodes Directory and link implementations Physical layout for performance 2 File System Components
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
