Encrypted File Systems. Don Porter CSE 506



Similar documents
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Mobile Device Security and Encryption Standard and Guidelines

Disk encryption... (not only) in Linux. Milan Brož

Secure Storage. Lost Laptops

How Drive Encryption Works

White Paper: Whole Disk Encryption

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Disk Encryption. Aaron Howard IT Security Office

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Introduction to BitLocker FVE

Patterns for Secure Boot and Secure Storage in Computer Systems

Encrypting stored data. Tuomas Aura T Information security technology

The virtual safe: A user-focused approach to data encryption

How Endpoint Encryption Works

Network File System (NFS) Pradipta De

Managing BitLocker Encryption

File Systems Security Encryption File Systems

Encrypting with BitLocker for disk volumes under Windows 7

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Kaspersky Lab s Full Disk Encryption Technology

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

An Improved Trusted Full Disk Encryption Model

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

SAS Data Set Encryption Options

CS252 Project An Encrypted File System using TPM

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

File System Encryption with Integrated User Management

Secure Data Management in Trusted Computing

Navigating Endpoint Encryption Technologies

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Self-Encrypting Drives

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

DriveLock and Windows 8

Windows 7. Qing Liu Michael Stevens

Encryption Made Simple for Lawyers

DriveLock and Windows 7

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure

Key & Data Storage on Mobile Devices

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Encrypting Data at Rest

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Using the TPM: Data Protection and Storage

Technical Brief Distributed Trusted Computing

Encrypt-FS: A Versatile Cryptographic File System for Linux

CS 416: Opera-ng Systems Design

Comodo Disk Encryption

SafeGuard Enterprise User help. Product version: 7

PC Security System By Crypto AG.

1. STORAGE ENCRYPTION AND JAVA FILE SECURITY SYSTEM

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

How to enable Disk Encryption on a laptop

A Guide to Managing Microsoft BitLocker in the Enterprise

Samsung SED Security in Collaboration with Wave Systems

SafeGuard Enterprise 6.10 Peter Skondro

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

Securing Data at Rest with Encryption

Data At Rest Protection

SecureD Technical Overview

Guidelines on use of encryption to protect person identifiable and sensitive information

SimplySecure TM Architecture & Security

Microsoft Windows Server 2008: Data Protection

Installing Ubuntu LTS with full disk encryption

Operating Systems. Design and Implementation. Andrew S. Tanenbaum Melanie Rieback Arno Bakker. Vrije Universiteit Amsterdam

Outline. Operating Systems Design and Implementation. Chap 1 - Overview. What is an OS? 28/10/2014. Introduction

TPM. (Trusted Platform Module) Installation Guide V2.1

VMware Horizon Workspace Security Features WHITE PAPER

Security in Storage Networks A Current Perspective

Flexible Storage Allocation

Example of Standard API

ERNW Newsletter 42 / December 2013

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Introducing etoken. What is etoken?

Analyzing the Security Schemes of Various Cloud Storage Services

Windows 7 BitLocker Drive Encryption Security Policy For FIPS Validation

Cautions When Using BitLocker Drive Encryption on PRIMERGY

YubiKey Integration for Full Disk Encryption

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Trusted Platforms for Homeland Security

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

FOG Guide. IPBRICK International. July 17, 2013

Management of Hardware Passwords in Think PCs.

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

Security Technology for Smartphones

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

Motion Computing Tablet PC

Transcription:

Encrypted File Systems Don Porter CSE 506

Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue using file system features without losing confidentiality Example: Backup Low overheads (space and CPU) Change keys and perhaps different keys for different data

Two major approaches VFS ext4 Encrypted block device Generic block device Block device encryption Transparently encrypt entire partition/disk below the file system Linux: dm-crypt Windows: BitLocker Mac: FileVault 2

Block encryption intuition File system is created on a virtual block device Low-level read of virtual block device: FS requests a block be read into page cache page X Map to block(s) on real device Request that blocks be read into a temporary page Y Decrypt page X into page X Return to file system Similarly, writes encrypt pages before sending to disk

Two major approaches VFS Encrypted FS ext4 File System encryption Encrypt data between VFS/Buffer cache and low-level file system Linux: ecryptfs Windows: EFS Generic block device Mac: FileVault 1

File-based intuition Idea: Mount a layered file system over a real one Application writes encrypted file foo Encrypted FS opens real file foo Stores some crypto metadata (like the cipher used) at the front Encrypts pages in page cache, transparently writes at an offset

File-based intuition Read of file bar Encrypted FS asks real FS for file bar Uses metadata + secret key to decrypt Stores decrypted pages in page cache Challenges: Managing private keys Enforcing read protection on decrypted data in page cache

Pros/Cons of disk encryption Pros: Hides directory structure, used space, etc Metadata matters! Can put any file system on top of it Cons: Everything encrypted with one key Encryption provides no confidentiality between users on a shared system Data must be re-encrypted before send on network Encryption overhead for public data (like /etc/hostname)

Vs. FS encryption Pros: Cons: Per-user (or per directory or file) encryption Only encrypt truly secret data Possibly send an encrypted file across network; use key (sent separately!) to decrypt on remote host Harder to hide/obfuscate directory structure and metadata More keys to manage Possibly easier to steal keys (debatable---harder to use TPMs)

Challenges Key management Read protection of live data Swapping Booting the OS

Key management Or, where do we keep the secret key? Not in the file system! There is a bootstrapping problem here Ideas?

Trusted Platform Module New hardware extension common on PCs in last few years Either on motherboard or in CPU chip itself Provides two useful features: Measured Execution: Basically, checks that the booted code (BIOS, bootloader, OS) match a given hash Useful to detect tampering with your software Sealed Storage: Store a very small amount of data in nonvolatile memory in the TPM chip Only accessible from code with hash that wrote it

TPM Idea Store the private key for the file system in the TPM s sealed storage Only the trusted BIOS/bootloader/OS can access the decryption key The drive alone gets you nothing! Tampering with the OS image (on disk) to dump the disk contents gets you nothing!

Small problem Motherboard or CPU dies, taking TPM with it How to decrypt your files then? BitLocker: As part of initialization, allow user to print a page with the decryption key. Put this in a safe place (not laptop bag)

Key management in FSlevel encryption Each user has a key chain of decryption keys Kernel is trusted with these keys On-disk, keychain is encrypted with a master key Master key is protected with a passphrase That just happens to be the logon credentials So, with a user s passphrase, we can decrypt the master key for her home directory, then decrypt the keyring, then the home directory

Challenge 2 The unencrypted data in the page cache needs to be protected If I encrypt my home directory, but make it world readable, any user on the system can still read my home directory! Encryption is no substitute for access control!

Swapping Care must be taken to prevent swapping of unencrypted data Or keys! If part of the file system/key management is in a user daemon, unencrypted keys can be swapped One strategy: Swap to an encrypted disk Another strategy: Give the encrypted file system hooks to reencrypt data before it is written out to disk Or put the swap file on the encrypted FS Subtle issue

Challenge 3: Booting You can t boot an encrypted kernel Decryption facilities usually need a booted kernel to work Big win for FS encryption: Don t encrypt files needed for boot Disk encryption: Usually puts files needed for boot on a separate (unencrypted) partition

Summary Two main types of encrypted storage: Block and file system encryption Understand pros and cons of each Understand key challenges: Key management Swapping Booting