LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-28-2015, 11:26 AM   #16
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373

Quote:
Originally Posted by metaschima View Post
In conclusion, yes you can encrypt RAM, but no it won't help you if the VPS host owns the hardware and is the adversary.
What intrigues me is what if your host isn't your adversary but they're merely expected to monitor you in some way? It would be interesting to hear from anyone who works for a VPS hosting company regarding what, if anything, they are expected to log.
 
Old 03-28-2015, 05:10 PM   #17
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Looks like there is a place for the key in the cpu after all, that can be prevented from appearing in snapshots of a VPS:
Quote:
He concluded that modern x86 processors had two register areas where CPU-based kernel encryption was realistic: the SSE registers which could in effect be made privileged by disabling all SSE instructions (and necessarily, any programs relying on them), and the debug registers which were much smaller but had no such issues.
https://en.wikipedia.org/wiki/TRESOR...R.27s_approach

Last edited by Ulysses_; 03-28-2015 at 05:12 PM.
 
Old 03-28-2015, 05:23 PM   #18
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Keep reading:
Quote:
Root access to the encryption keys via the kernel of a running system is possible using loadable kernel modules or /dev/kmem if compiled to support these, but otherwise appears not to be accessible in any known way on a standard running system.

Cold boot attacks on the CPU: - on real processors registers are cleared to zero on both hardware resets and software resets ("Ctrl-Alt-Delete"). However CPU registers are currently vulnerable on virtual machines, since they are reset during simulated hardware resets but not during software resets. The authors deem this an apparent flaw in many implementations of virtual machines, but note that virtual systems would be inherently vulnerable even if this were rectified, since all registers on a virtual machine are likely to be accessible using the host system.
https://en.wikipedia.org/wiki/TRESOR...ulnerabilities
 
1 members found this post helpful.
Old 04-02-2015, 05:08 PM   #19
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by 273 View Post
What intrigues me is what if your host isn't your adversary but they're merely expected to monitor you in some way? It would be interesting to hear from anyone who works for a VPS hosting company regarding what, if anything, they are expected to log.
I am still interested in this angle. I know that it goes against security principals but what if you are just trying to "slip under the radar" using a hosting provider whose employees are more interested in their Friday pizza than your data?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] 14.1 on old hardware with 512M RAM enine Slackware - Installation 13 08-25-2014 11:00 AM
Hardware encrypted USB flash Drives joboy General 4 06-01-2013 02:34 PM
do i need special hardware other than video card to enable 3D direct rendering babu198649 Linux - Newbie 2 04-26-2008 02:48 AM
Talking to laptop hardware (sound, touchpad, display, special keys, ..) marsm Linux - Laptop and Netbook 1 02-11-2007 06:43 AM
Hardware for special box Conpen2000 Linux - Hardware 1 09-12-2004 10:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:04 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration