Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption Security

Of Encrypted Hard Drives and "Evil Maids" 376

Schneier has a blog piece about Joanna Rutkowska's "evil maid" attack, demonstrated earlier this month against TrueCrypt. "The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. ... [A] likely scenario is that you leave your encrypted computer in your hotel room when you go out to dinner, and the maid sneaks in and installs the hacked bootloader. ... [P]eople who encrypt their hard drives, or partitions on their hard drives, have to realize that the encryption gives them less protection than they probably believe. It protects against someone confiscating or stealing their computer and then trying to get at the data. It does not protect against an attacker who has access to your computer over a period of time during which you use it, too."
This discussion has been archived. No new comments can be posted.

Of Encrypted Hard Drives and "Evil Maids"

Comments Filter:
  • by Umuri ( 897961 ) on Friday October 23, 2009 @09:45AM (#29845345)

    Offhand, i'd say any prominent high-class hotel that might be used by foreign businessmen on a trip.

    I mean, you do have a point, bob the middle manager isn't that important. However there are quite a few business people who this really would be that important to. Corporate espionage is high, and you know china has been doing focused attacks over the network.

    Sneakernet is always faster, so if they can train up a few pretty women, pay them a decent programmers wage to have them steal stuff that is the work of 10 engineers or even hundreds, that's a pretty sound economic payoff don't you think?

    I think stuff like this has it's purpose, and those who really are at risk need to be educated about it. For the other 95% of us, i think it's useful info to be aware about, just like don't leave your purse out visible in your car. Sure it probably won't happen, but there are always people who would.

  • by arabagast ( 462679 ) on Friday October 23, 2009 @09:45AM (#29845347) Homepage

    If you are the kind of person that are in the danger zone of this happening (not that you would leave a computer with such sensitive information in your hotel room.); You would probably feel a lot better if you were able to checksum the bootloader when returning, maybe from an external usb drive. This would offcourse run it's own OS, not being done from the bootloader(for obvious reasons).

  • by stoolpigeon ( 454276 ) * <bittercode@gmail> on Friday October 23, 2009 @09:48AM (#29845383) Homepage Journal

    You vastly underestimate the number of people traveling internationally and engaged in activities that the host governments find to be of interest.

  • by sam0737 ( 648914 ) <samNO@SPAMchowchi.com> on Friday October 23, 2009 @09:51AM (#29845423)
    I didn't read the RTFA, but aren't MSFT's BitLocker supposes to validate the boot path (from BIOS code to bootloader up to the BitLocker decrypter) with the help of the TPM chip?
  • by oldspewey ( 1303305 ) on Friday October 23, 2009 @09:54AM (#29845457)

    Bob the middle manager isn't that important, but Bob routinely sends email to Dave the director and Charles the CxO. By trojaning Bob's computer you can start to build a pretty decent profile of the corporate activities going on within, and above, Bob's department ... including travel schedules of some other bigger fish in the corporate pond.

    Do this to 3 or 4 Bobs, and pretty soon you'll have an understanding of the corporate org chart, upcoming projects, and most importantly you'll be able to target your future EvilMaid attacks with pinpoint accuracy.

  • Re:surprise (Score:3, Insightful)

    by EvanED ( 569694 ) <{evaned} {at} {gmail.com}> on Friday October 23, 2009 @09:58AM (#29845503)

    Actually one of the points of full disk encryption is that it gives you a measure of protection even when physical security is compromised.

    Why on earth would do you do it otherwise?

  • Easily foiled (Score:5, Insightful)

    by Hogwash McFly ( 678207 ) on Friday October 23, 2009 @10:00AM (#29845521)

    Evil maids are easy to spot because of their goatees.

  • by dachshund ( 300733 ) on Friday October 23, 2009 @10:12AM (#29845647)

    You can see why it's called the "evil maid" attack; a likely scenario is that you leave your encrypted computer in your hotel room when you go out to dinner, and the maid sneaks in and installs the hacked bootloader. The same maid could even sneak back the next night and erase any traces of her actions.

    Maybe if she's an idiot. Once you've installed your own bootloader, it can neatly remove itself. (After installing malware, or transferring the encryption keys and data it needs over the network.) Why in the world would the maid unnecessarily repeat the riskiest part of the entire attack?

    But more to the point, it must be a slow week. Why are "serious" security researchers even wasting time on something this obvious? Of course your software-based hard disk encryption is hosed in the event that an attacker gets hold of your machine and can alter the bootloader. Hell, the really sophisticated bad guys aren't even going to do anything this difficult or risky. After all, the encryption key has to be in RAM somewhere whenever you're using software-based encryption (hardware encryption excluded). A well-engineered piece of malware will recover it, and two-factor authentication isn't going to help you.

    Even trusted boot will only get you so far against a motivated adversary with this much sophistication. Don't leave your vital computing equipment behind in your hotel room.

  • Re:surprise (Score:4, Insightful)

    by aetherworld ( 970863 ) on Friday October 23, 2009 @10:15AM (#29845697) Homepage

    Slow news day?

    That article is actually like saying that there is no point to install a very expensive and secure door lock on your front door because it doesn't help you when you go get groceries and leave your door open. Duh. I'm sure most people realize that the point of disc encryption is not to protect your data while it's unencrypted in memory.

  • by FlyingGuy ( 989135 ) <.flyingguy. .at. .gmail.com.> on Friday October 23, 2009 @10:18AM (#29845737)

    Joanna Rutkowska in a very tiny French Maid outfit? Ohhh yes.

  • by Cyberax ( 705495 ) on Friday October 23, 2009 @10:24AM (#29845797)

    Yes. You can have almost perfect _physical_ security with TPM.

    Alas, most of developers are allergic to it, even if it has good uses.

  • by oldspewey ( 1303305 ) on Friday October 23, 2009 @10:33AM (#29845925)

    one client I worked for that had a no thumb drives allowed policy

    I've dealt with clients like this too - no thumb drives, no phones with cameras - and in most cases these clients left gigantic vulnerabilities in other areas that made the threat of a few crappy cellphone pictures laughable.

  • by Anonymous Coward on Friday October 23, 2009 @10:34AM (#29845939)

    you have to assume that they can design a scenario to separate you from your bags for an hour. If you're important enough for someone to devote these kinds of resources to get information from you, you're already boned. This whole thought exercise is pretty silly.

  • by amplt1337 ( 707922 ) on Friday October 23, 2009 @10:37AM (#29845977) Journal

    Wouldn't it be even easier to simply keep all the important data on the USB stick? And run the OS off a R/O CD?

  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Friday October 23, 2009 @10:40AM (#29846007)
    Comment removed based on user account deletion
  • by Anonymous Coward on Friday October 23, 2009 @10:59AM (#29846181)

    Well if you think the price of BitLocker is higher than the value of its protection you are probably not the target of ninja maids.

  • Re:Bitlocker? (Score:4, Insightful)

    by mlts ( 1038732 ) * on Friday October 23, 2009 @11:07AM (#29846271)

    The best BitLocker protection is a combination of PIN + TPM + USB flash drive. This way, if a thief rips off your laptop, but you have your USB flash drive with you (either in your wallet, around the neck, or on a keychain), you are pretty much assured that they will not have access to data, no matter what they try.

    For additional protection since Windows 7 has been released to everyone, perhaps consider BitLocker To Go for all external drives. With this, you can encrypt your external disks using (I hope) a decent passphrase, have the drives available for mounting automatically, and save the recovery volume key offsite somewhere secure.

  • Re:surprise (Score:3, Insightful)

    by betterunixthanunix ( 980855 ) on Friday October 23, 2009 @11:19AM (#29846411)
    It gives you a measure of protection if your device is stolen. It does nothing for you if you are worried about an attacker who has access to the system without having to steal it.
  • by X.25 ( 255792 ) on Friday October 23, 2009 @11:26AM (#29846483)

    that I got out of that shithole called 'security world'.

    It was really fun and interesting until 2003, but these days it's a joke.

    Hey, even in year 1997 we all realized that once someone has physical access to your computer - you are fucked.

    And here we are, in year 2009, reading "research" telling us things we all already know.

    Sigh...

    P.S: maid doesn't need to install any fancy shit, a keylogger will do just fine.

  • by pentalive ( 449155 ) on Friday October 23, 2009 @11:32AM (#29846561) Journal
    The TPM can be used for good or evil, It all depends on if the owner == the user == the one holding the master key.

    If I own the machine, and I am the user of that machine - I want the master TPM key and the ability to sign stuff for myself.

  • Re:surprise (Score:5, Insightful)

    by Golddess ( 1361003 ) on Friday October 23, 2009 @11:41AM (#29846655)
    Except it's not quite like that. It sounds more like you lock your door and leave to get groceries. Before you get back, someone comes up to the door and installs something that can scan the key that is used to unlock the door. That person leaves, you return, unlock the door, and go in. You later head out again, locking the door behind you, and that other person comes up, recovers their device, makes a duplicate key based on the device's contents, and now has access to your home.
  • by MyLongNickName ( 822545 ) on Friday October 23, 2009 @11:57AM (#29846853) Journal

    You are correct in the gender detail. However, if someone even MENTIONED pliers and my scrotum, I think I'd spill any secrets as soon as I saw the pliers coming toward me.

  • Re:surprise (Score:4, Insightful)

    by aetherworld ( 970863 ) on Friday October 23, 2009 @12:20PM (#29847125) Homepage

    True. I didn't really see it that way. Thanks for pointing it out.

    Still, it's kind of obvious that once someone gains physical access to your device, they can do anything with it. You could swap the keyboard with one that records all keystrokes or simply install a physical key logger device or do whatever you want with it.

  • by ACMENEWSLLC ( 940904 ) on Friday October 23, 2009 @01:42PM (#29848413) Homepage

    For that matter, the guys video taping the room to sell you and your wife's activities to that voyeur site aims the camera at your laptop, watches your keystrokes, and boom - he has all you passwords you type in. Banking? PayPal? E-Mail.

    You really need to use both a password and a physical device. Such as RSA tokens. My bank offers this for online banking. I have several for different things.

  • by Sycraft-fu ( 314770 ) on Friday October 23, 2009 @02:11PM (#29848941)

    "Citation Needed."

    Sorry, but I'll need something more than the word of some random guy on the Internet to believe this for a number of reasons, not the least of which being that such a backdoor would be something security testers would notice.

  • by rwa2 ( 4391 ) * on Friday October 23, 2009 @02:32PM (#29849263) Homepage Journal

    Well, #1... security measures only serve as deterrents. There will be a way around every security device, the only metric you really need to worry about is whether your:

      (cost to circumvent) / (value of assets + cost to secure)

    ratio is conveniently higher than your neighbors (ha ha, security people hate any mention of "convenience").

    So... #2: by far the best thing you can do is to make sure your assets are relatively worthless compared to what other "target" have. Live a frugal life. Keep offsite backups of your photo albums. Don't keep secrets. And if you do, bury them with enough other crap (maybe using steganography if necessary) to decrease the signal/noise enough to make finding and sorting through the information kind of useless to those not in the know. Maybe you have lots of invalid bank and credit card information lying around. Or put a whole bunch of passwords in your secret password vault, in case it gets compromised (good sites will eventually lock them out for trying them all, and failed attempts will also tip you off and give you time to respond).

    Next measure in the equation is to increase the cost of your perpetrator to circumvent security measures or commit crimes, far above what they'd gain by stealing your assets.

    Cheap deterrents first: live up a flight of stairs... thieves are inherently lazy and will go for the "low hanging fruit" instead of you. In the context of this article, put your laptop up high in a closet or stash it in a drawer... make them search through dirty laundry for it.

    The best society wouldn't need any security at all... if there was enough transparency and free flow of information, all thieves would get caught and reprimanded. So participate in the whole neighborhood watch thing, make sure your perp has to perform his act in very public settings, uniquely tag your stuff, and post warnings to remind them and make them nervous about getting arrested / shot / going to hell etc.

    Finally, we get to the part of the equation where you actually have to actively do something for extra security measures.

    First, make it a habit to perform the rudimentary simple steps of locking your door and always having your keys on you. Deadbolt is much better than the handle switch, and also helps insure that you remembered your keys. I involuntarily lock my house and car doors now, and always brush my pockets with my hands to check that my keys and wallet are still there. At this point, I usually notice within 5 minutes if something's missing.

    Passwords and encryption are just more sophisticated keys and locks. Not uncircumventable, but much better than nothing. But before spending lots of money on more complex 2- & 3-factor keys and locks ... especially those that can completely shoot you in the foot and result in losing all your data... most people invest in other measures ... alarms and security cameras that would increase the chances of the perp getting caught. I haven't seen a whole lot that focuses on this area yet... the phone home mechanisms and stuff like that, but I figure it would be much more productive to concentrate on these kinds of security measures in the near term.

  • Re:Bitlocker? (Score:3, Insightful)

    by cbhacking ( 979169 ) <been_out_cruisin ... m ['hoo' in gap]> on Friday October 23, 2009 @04:03PM (#29850669) Homepage Journal

    As somebody who actually worked on BitLocker during an internship at MS, that's bullshit. I was working directly with the metadata and its parser, including the recovery keys. There was absolutely no "TLA Agency" recovery key. The master key for each volume is encrypted and stored on the volume itself (and each volume has a unique key). This is exactly the key used to decrypt the drive, and is never stored in plaintext anywhere. How do you get around this?

    You can't store a recovery key for each volume in some secret database - the master keys, and their encryption keys, are unique.
    You can't store a secret recovery key on the volume - it would have shown up when the disk was accessed at block device level.
    There are probably plenty of other ideas that don't work, but I assure you, there aren't any that do. BitLocker was extensively examined by crypto experts, and no backdoors or methods to break it were discovered.

  • Re:Bitlocker? (Score:3, Insightful)

    by Rakishi ( 759894 ) on Friday October 23, 2009 @04:36PM (#29851223)

    If your motherboard crashes and the TPM chip goes pfft, is there a way to recover the drive?

    And if your hard drive head crashes and physically destroys your platters if there a way to recover the drive? If you laptop is run over by a steam roller is there a way to recover the drive? If you laptop is stolen is there a way to recover the drive?

    Shit happens. If you don't have up to date backups then you're an idiot and deserve to lose your data, plain and simple.

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...