OpenBSD can encrypt swapspace 41
Continuing it's reputation for security, the OpenBSD kernel can now
encrypt the contents of swap space, so that sensitive data can no longer
be swapped to disk 'in clear', where it could survive reboots. The
Blowfish cypher is used, as it is strong, fast, with a big key space.
Obviously, there's a small speed penalty for this option.
Note: The BSD section has been a little empty recently, due to
illness. Thanks to all who enquired after me, I appreciate it :-)
Re:Crypto Hardware (Score:1)
Re:Why?? (Score:1)
Re:Why?? (Score:1)
True. But if root gets broken you're in trouble anyway.
Or maybe more than one person uses this computer. What is your lab mate with a boot floppy doing while you're at lunch?
Yep, realized that in the middle of class last night...
Re:Why?? (Score:2)
But root can get broken temporarily WITHOUT knowing the root password. Retrieving this off of the swap partition gives the cracker access anytime.
Re:Why?? (Score:2)
Re:OpenBSD needs some help (Score:2)
Re:OpenBSD needs some help (Score:1)
http://daily.daemonnews.org/view_story.php3?sto
Re:Linux needs some help (Score:1)
Crypto Hardware (Score:2)
Now we just need someone Outside the US to design and make a PCI encryptor/decryptor board that supports blowfish. If I had the ability to program programible logic devices I'd think about doing this just for myself, but then I'm also in the US so if I did it, I couldn't easily post the design or export it. With current programible logic encryption rates over 1M bytes a second should be possible.
Features that would be good. Write only key space. Space for a number of key sets. The OS can moderate who can use which key sets. It would use PCI bursting to transfer data to and from it. It would also need to handle common block chaining modes.
I figure it could be done on one large FPGA or similar. It may require a bank of fast SRAM for buffer space, but I think it could be done without. The actual card size could be miniscule. No larger than the length of the PCI connector and about 40mm high. One could even support a number of different encryption/decryption methods. I'd like to see DES, Triple-DES, Blowfish, Two Fish, RSA and maybe a few others.
Re:Crypto Hardware (Score:1)
Re:Crypto Hardware (Score:2)
Implementing RSA in hardware requires more finesse in that timing the carry-save delays and allocating space for multipliers becomes slightly trickier. The key operation is multi-precision modular exponentiation which can be done with general purpose hardware quite well. It doesn't make much sense to put in into a board devoted to symmetric algorithms.
Re:Crypto Hardware (Score:2)
PLX IOP480 [plxtech.com] which has an embedded PowerPC processor and an external memory bus. You could easily change your crypto program using one of these.
I'm using a PLX9054 on a board with a PPC G3, they have really nice software support and DMA capability. I'll bet the G4 could really crunch some data with it's vector unit. 3x faster in Distributed Net numbers over G3 from what I've read.
Re:OpenBSD needs some help (Score:1)
Re:Crypto Hardware (Score:2)
-------
Re:Why?? (Score:1)
Exactly! That is why some people want an encrypted swap file.
Re:Why?? (Score:1)
After a system crash, confidential information (pgp passwords) can be found in the swap file. System crashes are easily made: you pull the plug.
OpenBSD speed (Score:1)
would do a performance audit to go along with their much touted security audit. I just switched
to NetBSD x86 and noticed a substantial speed improvement. I also like the lack of hype and commitment to clean code. The userland tool chain
is very polished. Now I just have to figure out
how to burn CD-Rs from my atapi CD-RW. Last I heard cdrecord didn't like anything but scsi.
-Toaster
Re:Why?? (Score:2)
I hate to spell it out, but the idea is this: Alice is useing a computer. The computer could be a laptop, a workstation, or a server. Eve wants to know what Alice is doing. Eve causes a system crash by pulling the plug or battery on the computer. Eve gains console access to the computer through theft or ligitemate access. Eve scans the contents of the swap file to see what Alice was doing.
By using an encrypted swap file Alice makes it harder (maybe impossible) for Eve to perform this kind of attack. This type of attack is particularly effective against laptops as they are easy to steal. If I had a laptop that contained sensitive information I would want to use bath an encrypted filesystem and an encrypted swap file. Yes I would take a performance hit. However if the laptop is stolen I am out a few thousand dollars but my sensitive information is safe.
Re:Why?? (Score:1)
Re:Linux needs some help (Score:1)
Re:Why?? (Score:1)
Re:Why?? (Score:2)
Or maybe more than one person uses this computer. What is your lab mate with a boot floppy doing while you're at lunch?
Re:Linux needs some help (Score:1)
Re:OpenBSD needs some help (Score:1)
whoohoo..