Open Source Encrypted Filesystems for Free Unix Systems



Similar documents
Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD

The Linux CryptoAPI A User s Perspective

File System Encryption with Integrated User Management

Using Encrypted File Systems with Caché 5.0

======================================================= Tools to wipe out unwanted data: =======================================================

Transparent Cryptographic File System for BSD. A primer. Luigi Catuogno [luicat@tcfs.unisa.it]

Disk encryption... (not only) in Linux. Milan Brož

Comodo Disk Encryption

Encryption Security Recommendations

File Systems Security Encryption File Systems

On Disk Encryption with Red Hat Enterprise Linux

BATTENING DOWN THE DISKS

Encrypted File Systems. Don Porter CSE 506

Encrypted Root Filesystem HOWTO

Encrypt-FS: A Versatile Cryptographic File System for Linux

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Encrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

CHAPTER 1 INTRODUCTION 1.1 MOTIVATION FOR DATA SECURITY

Installing Ubuntu LTS with full disk encryption

Using Network Attached Storage with Linux. by Andy Pepperdine

1. Introduction to the UNIX File System: logical vision

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Dept. of Comp. Sc. & Engg., Shri Jagdishprasad Jhabarmal Tibrewala University (JJTU) Chudella, Jhunjhunu, Rajasthan, INDIA

Securing Data at Rest ViSolve IT Security Team

Internet Programming. Security

RocketRAID 2640/2642 SAS Controller Ubuntu Linux Installation Guide

Creating a Disk Drive For Linux

Laptop Encryption. Tom Throwe. 1 August RHIC and ATLAS Computing Facility. (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17

Planning for an Amanda Disaster Recovery System

GROUP TEST. Encryption. On Test. You ll find lots of encryption software in your distribution s package repository

USB 2.0 Flash Drive User Manual

Ubuntu Professional Training Course Overview (E-learning, Ubuntu LTS)

Installing MooseFS Step by Step Tutorial

UNIX - FILE SYSTEM BASICS

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Using the Tcl VFS for Encryption

Evaluating parallel file system security

1. Scope of Service. 1.1 About Boxcryptor Classic

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

X-Ways Capture. The program executes the following steps unless you specify a different procedure in the configuration file:

WES 9.2 DRIVE CONFIGURATION WORKSHEET

User Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Btrfs and Rollback How It Works and How to Avoid Pitfalls

System administration basics

Procedure to Create and Duplicate Master LiveUSB Stick

Global Journal of Computer Science and Technology

Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system.

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

File System Encryption in C#

Making sure data is lost.

Virtual Private Networks

CifrarFS Encrypted File System Using FUSE

Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France

Guidelines on use of encryption to protect person identifiable and sensitive information

Security in Storage and File Systems. Rajeev Thakur Argonne National Laboratory

Chapter 12 File Management. Roadmap

Chapter 12 File Management

RocketRAID 174x SATA Controller Ubuntu Linux Installation Guide

Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption

Automated Offsite Backup with rdiff-backup

Data storage, backup and restore

Linux Operating System Security

Creating a Cray System Management Workstation (SMW) Bootable Backup Drive

Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document

Design and Implementation of Secure File System

Redundant Array of Inexpensive/Independent Disks. RAID 0 Disk striping (best I/O performance, no redundancy!)

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE

Cryptfs: A Stackable Vnode Level Encryption File System

The Misuse of RC4 in Microsoft Word and Excel

Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF

Upgrading Cisco UCS Central

Akshay Kumar Jain Department of CSE, Jaypee Institute of Engg. & Technology Guna (M.P.), India

Using btrfs Snapshots for Full System Rollback

BackTrack Hard Drive Installation

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery

Backup Software Technology

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Incremental Backup Script. Jason Healy, Director of Networks and Systems

Password-based encryption in ZIP files

Recovering Deleted Files in Linux

Acronis Backup & Recovery 10 Server for Linux. Quick Start Guide

BestCrypt Volume Encryption Help File

Abstract. Microsoft Corporation Published: August 2009

Secure Network Filesystem (Secure NFS) By Travis Zigler

IT Networks & Security CERT Luncheon Series: Cryptography

The Linux Virtual Filesystem

HTTP-FUSE PS3 Linux: an internet boot framework with kboot

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel

LSN 10 Linux Overview

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Linux Software Raid. Aug Mark A. Davis

14. CUCM 8 - free sftp solution for backup on ubuntu server

Navigating the Rescue Mode for Linux

10 Red Hat Linux Tips and Tricks

Transcription:

Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis kargig@noc.uoi.gr

Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application specific encryption is wanted. Performance considerations. Encryption can be more secure than physical security. Protection of stolen equipment. Lifetime of protected data could be years (backups).

Presentation Topics Threat Models Linux Solutions: CryptoAPI, StegFS, CFS, PPDD, CryptFS, TCFS BSD Solutions: TCFS, OpenBSD Encrypted Virtual Filesystem 3

Threat Models The theft of the computer while it is powered off or if the thief has to power it off to remove it. The theft or copying of the discs from the computer. The theft or copying of backups. Copying of discs after booting the computer from a boot floppy. Not all presented solutions cover ALL these threat models.

Linux Solutions CryptoAPI Loop-AES StegFS PPDD (Practical Privacy Disk Driver) CFS CryptFS TCFS

Usable Ciphers: loop-aes: AES CryptoAPI -- Loop-AES (Loopback Encrypted Filesystems) CryptoAPI: XOR, DES, twofish, blowfish, cast128, serpent, MARS, RC6, DFC, and IDEA. Procedure of Installation: Kernel Patching make patchkernel KDIR=<kernel source dir> LOOP=iv (or LOOP=jari provided with loop-aes) make modules; make modules_install Loading of cryptoloop device: modprobe cryptoloop Creation of 100Mb file: dd if=/dev/urandom of=/home/kargig/cryptfile bs=1m count=100

Loading of desired cipher: modprobe twofish Loading and encrypting the file: losetup -e twofish /dev/loop0 /home/kargig/cryptfile Formating and mounting the new device: mke2fs -j /dev/loop0 ; mount -t ext3 /dev/loop0 /mnt Unmounting and securing the device: umount /dev/loop0; losetup -d / dev/loop0 Positive: Very easy to install and use. Relatively fast based on the selected algorithm. Can encrypt whole filesystems like /home (but not the booting device!!! Negative: Once mounted anyone with access on the dir can read the files. Encryption on whole devices is trivial.

StegFS Usable Ciphers: AES/Rijndael (default), Serpent, Twofish and MARS Procedure of Installation and Usage: Patching the kernel creating new modules make patch ; make patch LINUX=/path/to/kernel-source ; patch -p1 < /path/to/patch ; make modules; make modules_install Create a filesystem and turn it to a StegFS partition. mke2fs /dev/device ; mkstegfs /dev/device /path/to/btab Mount the partition: mount /dev/device /mnt/mntpoint -t stegfs -o btab=/path/to/btab Open N security levels: stegfsopen /mnt/mntpoint N Close N security levels: stegfsclose /mnt/mntpoint N

Positive: StegFS Various levels of security. An attacker cannot even see the existence of more levels than he has already acquired. Negative: Speed. Waste of Space.

CFS Usable Ciphers: Older versions DES running in CBC mode. Newer versions use Blowfish. Procedure of Installation: Compiling sources and copying files to /usr/local/sbin with ownership root:wheel and accessmode 551 Creation of /.cfsfs dir with ownership root:root and accessmode 000 Creation of /securefs dir. Starting the daemon and mounting the filesystem: /usr/local/sbin/cfsd > /dev/nulll /bin/mount -o port=3049,intr localhost:/.cfsfs /securefs

CFS Creation of CFS protected dir: cmkdir secret To make it readable we have to attach it: cattach secret MYSecret /securefs/mysecret To secure the dir: cdetach MYSecret Will appear. Positive: No need for system modifications. Negative: Lack of speed

PPDD Usable Ciphers: Blowfish Procedure of Installation and Usage: Patching the kernel and rebooting from the new one Compiling the sources and making the necessary devices. Make; make devices; make install Create a filesystem. ppddinit /dev/ppdd0 /dev/xxxx ( where XXXX is a partition eg. hdc1 ) Setup the device: ppddsetup -s /dev/ppdd0 Create a new filesystem: mke2fs /dev/ppdd0 Mount it where we want: mount /dev/ppdd0 /home/kargig/crypto

PPDD To unmount and secure the filesystem: mount /dev/ppdd0 ; ppddsetup -d /dev/ppdd0 Positive: Negative: Ease of use. Possibility to use without kernel modifications. Secure backups Support for read-only media PGP support Support for data integrity using MD5 hashes Possibility for encryption of the root partition Not so strong algorithm Block size of the filesystem is locked to 1024

CryptFS CryptFS operates by encapsulating a client file system with a layer of encryption transparent to the user. Cipher: Blowfish 2 working modes (UID UID+PID checking) Performance Longer Passphrases Encrypted filenames Secured even from root user.

TCFS Usable Ciphers: 3DES,RC5, Blowfish. Procedure of Installation: Kernel and sources recompilation option TCFS Directory Creation mkdir /crypto; mkdir /mnt/tcfs ; mkdir /crypto/kargig chown kargig:wheel /crypto/kargig ; chmod 700 /crypto/kargig /etc/fstab modification /crypto /mnt/tcfs tcfs rw,label=crypto, cipher=2 0=3DES 1=RC5 2=Blowfish Mount the device mount /crypto

Creation of user and keys: tcfsmgr adduser tcfsuse genkey Using the Filesystem: tcfsuse putkey -f crypto TCFS Setting the X flag to a dir and testing the filesystem: tcfsuse flags +x /mnt/tcfs/kargig cp./foo.txt /mnt/tcfs/kargig cat /mnt/tcfs/kargig/foo.txt (we see clear output) umount /crypto cat /crypto/kargig/foo.txt (we se garbage)

OpenBSD Encrypted Virtual Usable Ciphers: Blowfish. Filesystem Procedure of Installation: Creation of a file dd if=/dev/urandom of=/home/kargig/cryptfile bs=1024 count=100000 Association of cryptfile with a svnd device vnconfig -ck -v /dev/svnd0c /home/kargig/cryptfile Creation of new filesystem newfs /dev/svnd0c Mount the new filesystem mount /dev/svnd0c /home/kargig/secrets

OpenBSD Encrypted Virtual Filesystem Unmounting and securing the filesystem: umount /dev/svnd0c /usr/sbin/vnconfig -u -v /dev/svnd0c Positive: Ease of use. Performance. Negative: Size Limit.

Conclusion In most encrypted filesystems a major problem appears with multi-user environments. Security of a system is as strong as it's weekest link. Choose an encryption scheme according to the current needs. Other Problems incude: Filesystem damage Data integrity checking Low Performance