LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-26-2011, 07:33 AM   #1
JacekZ
Member
 
Registered: Sep 2005
Location: Notts, England
Distribution: Debian 10
Posts: 71

Rep: Reputation: 15
Hard disk encryption halves your available storage - does this also pose a risk?


In terms of security knowledge this is a newbie question that I've not managed to search out the answer to anywhere. I'd like to understand the statement here:
http://docs.fedoraproject.org/en-US/...omplished.html that "you now have an encrypted partition for all of your data to safely rest while the computer is off"

After choosing the installation options to encrypt partitions on both Fedora and Ubuntu I've noticed that you always end up with something like half the space designated for the drives actually being usable. Presumably this is because you get half used for the encrypted content and half for the decrypted content when running live:
http://docs.fedoraproject.org/en-US/...ncryption.html
"Full disk encryption solutions like LUKS only protect the data when your computer is off. Once the computer is on and LUKS has decrypted the disk, the files on that disk are available to anyone who would normally have access to them."

My question is, if the system holds decrypted content on the disk while running, does that not mean it leaves significant traces on the disk in a decrypted form when you power off the machine? Does LUKS have some way of securely deleting the decrypted copy beyond merely un-mounting it or whatever when you shut down?

Thanks
Jacek
 
Old 02-26-2011, 08:45 AM   #2
macemoneta
Senior Member
 
Registered: Jan 2005
Location: Manalapan, NJ
Distribution: Fedora x86 and x86_64, Debian PPC and ARM, Android
Posts: 4,593
Blog Entries: 2

Rep: Reputation: 344Reputation: 344Reputation: 344Reputation: 344
Full disk encryption doesn't reduce the available space, and information is only decrypted in RAM. If your space isn't being allocated properly, you have another issue.
 
1 members found this post helpful.
Old 02-26-2011, 08:50 AM   #3
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
What they're saying is that when the encrypted partition is mounted, access to the data is controlled by whatever means you would normally use (and not by the encryption itself). For example, you can have an encrypted /var/database for your HTTP/SQL server, but if you get exploited online (think Internet) then the encryption isn't standing in the way of the bad guys, your other security measures (ACLs, MAC, etc.) are. The HTTP server normally has access to the database, and now that the bad guys have taken over the HTTP server (think arbitrary code execution), they can do whatever the HTTP server can do.

The link you shared goes on to explain that if you need certain data to be protected by encryption during an online attack (or a local one, what's important here is that the computer is up and running and the encrypted partition is mounted), you'll need to use file-based encryption. This way, the key isn't loaded and the data isn't being encrypted/decrypted on the fly, protecting it even if your other security measures fail. For example, if I leave an AES 256-encrypted gzipped-tarball on the server, say in /usr/local/backup.tar.gz.aes, it doesn't matter how bad the server gets compromised, as the bad guys would still need to get their hands on the key in order to access the data in the clear.

As for the security which partition/disk encryption actually provides: A proper shutdown stops usage of the partition/disk encryption key (and ideally, overwrites it in RAM, so that it can't be retrieved later via cold boot attack, but that's another story), protecting the data even if the computer or its storage device is physically stolen.

Last edited by win32sux; 02-26-2011 at 09:28 AM.
 
1 members found this post helpful.
Old 02-26-2011, 11:09 AM   #4
JacekZ
Member
 
Registered: Sep 2005
Location: Notts, England
Distribution: Debian 10
Posts: 71

Original Poster
Rep: Reputation: 15
Yes that's quite clear, on the understanding that decryption only happens in local RAM. You have described the behaviour I expected to see but have not had.

When I saw that increasing the used space on my hard disk eroded the remaining HDD space at something like double the rate used, I figured the entire contents were being decrypted to the hard drive - which would explain the doubling up. So I have a 150GB HDD, with 15GB used and only 120GB remaining for example. When the amount stored reaches 75GB I have no more space. If I've made an attributional error suspecting the decryption, then something else rather strange must be going on! And on two different systems! On Fedora the gui disk utility shows encrypted partitions twice, one with a mount point like /dev/sda6 and the duplicate at /dv/dm-2. Perhaps it is a quirk of the interplay of the various hard disk measuring features and the way on-the-fly decryption tries to create the impression of a decrypted partition. My installs use custom partitions rather than LVM or any defaults. On Ubuntu I don't get the doubling up in the disk utility but reports of available space show the same double rate of depletion.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] whole hard disk encryption in rhel 4.6 maestromani Red Hat 5 10-26-2010 07:30 AM
BlackBerrys pose 'security risk' say UAE authorities Jeebizz Linux - News 0 07-26-2010 08:40 AM
should I risk cloning a damaged hard drive? newbiesforever General 7 12-08-2008 12:34 PM
Interrupts bottom halves minasafwat Linux - Kernel 2 11-09-2006 03:49 AM
hard drive data risk with MandrakeMove9.2 oomspeter Mandriva 1 09-24-2004 11:56 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:35 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration