If the dump file is encrypted, is it encrypted with the same key as the
user’s data? And can it be read by that user? It seems like all you
would have to do is read the dump file under normal operating conditions
on the target computer with your target user logged in.
Sorry if these are stupid questions; I’ve never tried an encryption
project.
~Eric
-----Original Message-----
From: xxxxx@lists.osr.com
[mailto:xxxxx@lists.osr.com] On Behalf Of Scott Noone
Sent: Friday, February 22, 2008 10:00 AM
To: Windows File Systems Devs Interest List
Subject: Re:[ntfsd] News Article: On the Fly Encryption Question
Everyone here is in disagreement it seems, how is a crash dump with a
secure system encrypted then?
Almost all commercial FDE products encrypt the crash dump and
hibernation files (don’t forget about hibernate!). Prior to Vista,
filters aren’t supported in the dump stack so you needed to figure out a
way to wedge yourself into it. I’m not saying it’s pretty, but it can be
done.
Vista, however, has an architected solution to support crash dump
filters.
It’s entirely undocumented, but BitLicker uses it to encrypt the crash
dump and hibernation files so it’s there.
-scott
Scott Noone
Software Engineer
OSR Open Systems Resources, Inc.
http://www.osronline.com
“Matt” wrote in message news:xxxxx@ntfsd…
> Eric Diven wrote:
>
> True, but what I’m thinking is this (re-iterate in a different way)
>
> If the data in RAM holds the key, as the articles I posted claim, then
> the key is in a decrypted state.
>
> If I understand correctly, when a dump is written it include the
> contents of the RAM(that is decrypted).
>
> When the crash dump that includes unencrypted data is written to disk,
> the system uses a separate stand-by stack. Therefor, the dump data
> being written would not pass threw any encryption filters on it’s way
> to disk.
>
> If that is correct, then this unencrypted data will land in the page
> file; therefor you should be able to search the drive and extract info
> that would be pertinent to an attack.
>
> Everyone here is in disagreement it seems, how is a crash dump with a
> secure system encrypted then?
>
> Matt
>
>> If you could get an “evil” filter onto the system, you could probably
>> practically automate the job:
>>
>> Install the “evil” filter below the encryption filter + userland app.
>> Userland app sends a plaintext WRITE to a file.
>> Encryption filter encrypts the plaintext “evil” filter sees the
>> encrypted WRITE, stashes the encrypted contents, and bugchecks the
>> system.
>>
>> Upon reboot, your userland app has the plaintext, the encrypted
>> results, and some “small” (bounded by the size of memory) number of
>> possible encryption keys to try to turn one into the other (it’s
>> assumed that the userland app knows the algorithm). Of course, this
>> is assuming a symetric cryptosystem (I recall EFS is, are others?).
>>
>> If it’s a public key system, you might have to attack it on the way
>> up the stack on a READ. You still know the plaintext (because you
>> wrote it to the file initially), you get the encrypted information on
>> the way up the storage stack, and then you’re searching the dump for
>> a private key to turn encrypted into known plain instead of
vice-versa.
>>
>> Of course, if you can get a filter onto the system, either it’s not
>> very secure to start with, or you’ve fooled the user into doing
>> something stupid.
>>
>> ~Eric
>>
>> -----Original Message-----
>> From: xxxxx@lists.osr.com
>> [mailto:xxxxx@lists.osr.com] On Behalf Of Matt
>> Sent: Friday, February 22, 2008 9:17 AM
>> To: Windows File Systems Devs Interest List
>> Subject: Re: [ntfsd] News Article: On the Fly Encryption Question
>>
>> Dejan Maksimovic wrote:
>>
>>> PF can be encrypted. In the articles it actually was.
>>>
>> So the page file can be encrypted. Even when a memory dump is being
>> written to it? From what I understand, dumps are written to the page
>> file on crash, then on next reboot they are extracted and written to
>> your defined system32/memory.dmp location.
>>
>> From what I understand to be correct, when the system is blue
>> screening and a dump is being written to disk, the system uses a
>> separate stack to write with. Thus bypassing everything in the
>> original storage stack, filters, volume filters, etc… Thus, I
>> wouldn’t foresee any encrypting software being here.
>>
>> Matt
>>
>>
>> —
>> NTFSD is sponsored by OSR
>>
>> For our schedule debugging and file system seminars (including our
>> new fs mini-filter seminar) visit: http://www.osr.com/seminars
>>
>> You are currently subscribed to ntfsd as: xxxxx@edsiohio.com To
>> unsubscribe send a blank email to xxxxx@lists.osr.com
>>
>> —
>> NTFSD is sponsored by OSR
>>
>> For our schedule debugging and file system seminars (including our
>> new fs mini-filter seminar) visit:
>> http://www.osr.com/seminars
>>
>> You are currently subscribed to ntfsd as: unknown lmsubst tag
argument:
>> ‘’
>> To unsubscribe send a blank email to
>> xxxxx@lists.osr.com
>>
>>
>
>
—
NTFSD is sponsored by OSR
For our schedule debugging and file system seminars (including our new
fs mini-filter seminar) visit:
http://www.osr.com/seminars
You are currently subscribed to ntfsd as: xxxxx@edsiohio.com To
unsubscribe send a blank email to xxxxx@lists.osr.com