-
-
Notifications
You must be signed in to change notification settings - Fork 985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SED-based Hardware Encryption Support #773
Comments
Not only backdoors. See https://techcrunch.com/2018/11/05/crucial-samsung-solid-state-drives-busted-encryption/ (due to Crucial engineering errors, the encryption key did not depend on the user's password). Also, if PC do not power cycle the SED-encrypted drive at reboot (which happens very often with SSD), the drive will not be locked after reboot. So attacker just hit Reboot and you will be pwned. |
@yezi86001, SED is a whole other story compared to what VeraCrypt does, essentially (simplifying) you don't need VC at all with SED. So it's kind of meaningless to have such support (other than it could serve as a provisioning UI, but that's too much work for too small gain, IMHO). |
If you really don't want to use software encryption and instead want to use the SED functionality and are willing to take the risk that some (not all!) SEDs implement that functionality in an unsecure way, then actually there are good reasons to implement SED provisioning support in VC. Some background information to support my argument: How they probably do that: Security implications: Solution: use TCG Opal - but not all TGC Opal products Bad idea: proprietary TCG Opal solutions Good idea: open source TCG Opal solutions
VeryCrypt SED support using TCG Opal |
Ultimate encryption tool that leaves the drive decrypted on hot reboot :D Just press the hardware Reboot button and the disk stay unlocked. This is an easy way to shoot yourself in the foot for an inexperienced user. |
Let the users choose what they want: Computers in a safe environment (like a laptop in the home office room) are pretty safe in there. And if the users want to take their laptops outside, they have to be aware that they need to put to hibernation mode or shut it off - just don't let it running when you're away from the computer: this gives attackers no chance to do a hot reboot. If the users choose option b) then they have to be aware of that. Don't underestimate the users, they can be responsible enough to do that. To the reboot problem: Many computers and Opal implementations can be set to require a UEFI/BIOS password or Opal password even on hot reboot with no power cycle/lock command to the SSD. My BitLocker hardware encryption (Microsoft calls it "eDrive") asks for a password every time when I reboot my computer. No matter if it is a "hot" or "cold" boot. So this can be implemented in VC as well and would make it safe. This is the problem with all Opal implementations; and also with activating/managing the SED functionality with the computer's UEFI/BIOS and not with Opal. But the main advantage of impelmenting Opal in VC would be that it would give users the option to use a trusted Opal implementation, if they so wish. (Instead of untrusted closed source ones like BitLocker or hard to use open source ones like sedutil). |
I genuinely hope this gets implemented, really like veracrypt, however the performance is it's Achilles heel. |
Cryptsetup also seems to have added an option to make use of OPAL encryption or both hardware and software encryption in combination. Would be nice if Veracrypt also supported this. |
SED-based hardware encryption has better performance,although governmental backdoors cannot be avoided. Maybe this feature could be added and users who don't care about governmental backdoors could choose whether use it or not while encrypting system and non-system partitions/drives.
VeraCrypt could present some security alerts while enabling hardware encryption.
The text was updated successfully, but these errors were encountered: