Download your favorite Linux distribution at LQ ISO.
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 11-13-2010, 10:56 AM   #1
LQ Newbie
Registered: Jan 2010
Posts: 1

Rep: Reputation: 0
dm-crypt attack

Hello, I'm trying to find where the dm-crypt hash key is stored. I found a princeton article where they captured the key from RAM and used it to decrypt the whole disk. My question is more about the algorithm and where the key is stored on file within the system. I assume the passphrase is stored locally (or on a USB) because how would the system know what to compare it to? I assume the passphrase is not stored in the shadow file, but could be wrong.

security newbie here
Old 11-14-2010, 03:21 AM   #2
Senior Member
Registered: Jan 2005
Location: Melbourne, Australia
Distribution: Debian Bookworm (Fluxbox WM)
Posts: 1,391
Blog Entries: 53

Rep: Reputation: 360Reputation: 360Reputation: 360Reputation: 360
The key is not stored (apart from being used in RAM to decrypt the volume).

The encryption algorithm is chosen when the volume is created. There are many encryption modules to choose from, including aes and twofish, and a number of passphrase hash functions, including ripemd160:
ls /lib/modules/$(uname -r)/kernel/crypto
The passphrase is not stored; it is used to mount the volume. There is no need to compare the passphrase (or actual key) with anything; if it is incorrect, then the volume will not mount because the decryption will produce invalid data.

The key could be stored as a way of automating the mount, but this would seem to defeat the purpose of encrypting the drive.


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] simulating blackhole attack and wormhole attack in ns-2 aditijigyasi Linux - Newbie 7 07-04-2016 08:50 AM
Crypt prasanthhs Linux - General 13 08-16-2007 11:22 PM
No Crypt AMMullan Linux - Software 4 08-08-2007 03:48 AM
no crypt mson Slackware 7 04-27-2007 04:44 AM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:24 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration