xxxxx@lists.osr.com wrote on 09/15/2005 12:06:03 PM:
> ----------
> From: xxxxx@lists.osr.com[SMTP:
xxxxx@lists.osr.com] on behalf of Philip D
Barila[SMTP:xxxxx@seagate.com]
> Reply To: Windows System Software Devs Interest List
> Sent: Thursday, September 15, 2005 5:25 PM
> To: Windows System Software Devs Interest List
> Subject: RE: [ntdev] Full disk encryption … suggest better
encryption method …
>
> It’s not security by obscurity, there are other reasons for not
revealing
> things.
>
Like intentional backdoors?
To the best of my knowledge, Seagate isn’t putting any in. There has been
discussion of possible solutions to the problem of lost credentials. Don’t
know the POR at this point. I haven’t worked on it for a year, so what I
remember is pretty stale.
> You have to keep something resident, even if it’s just a public key
from
> the outside agent’s (bio-sensor, external SmartCard) RSA key pair so
you
> can securely exchange some other material, such as a 3DES key, to
unlock
> the data. Note I’m not necessarily describing our implementation, it’s
> just an example. That’s (almost) how the SSL web session you have with
> your bank works.
>
That’s obvious but any external datastore can be a problem for users
who just want to use such drives the same way as current one. I
don’t question SmartCard solution; the password one.
The password solution is just a more robust form of the existing ATA
SECURITY Feature set, wherein the data on the platters is encrypted. There
are also more interesting capabilities in development. AFAIK, there is no
way to regenerate the PW **or the key material** from data on the media,
only verify whether the PW that is offered is correct.
> I don’t believe that there are any passwords in plaintext on the media,
for
> those deployments that use simple passwords over more robust methods.
Keep
> in mind that, unless you are using some kind of secure password
submission,
> which we can support, the PW is transmitted in clear text over the
> interface. That’s one of the many weaknesses of today’s implementation
of
> the ATA SECURITY FEATURE SET.
>
I wouldn’t see it as a big problem because I guess I’d notice if
somebody changes my hw to capture the interface. For some users it
can be important but they’d probably use something better than password.
Yes, you would probably notice a bus analyzer. ![]()
> Yes, that is one beneficial side-effect, cryptographically complete
erase
> is achieved by forgetting (over-writing with noise, all zeros, known
value)
> all relevant stored crypto material.
>
I’d take it as great benefit.> I think we’re probably way off topic here…
>
I don’t think so. As you can see, a lot of people here and in NTFSD
write drivers which encrypt whole drive, its part or a virtual
drive. Seagate drives can potentially replace all such software
which wouldn’t be a bad thing but only if they’re really secure.
False sense of security is worse than no security.
I enthusiastically agree with that!
Phil
Philip D. Barila
Seagate Technology LLC
(720) 684-1842