All of lore.kernel.org
 help / color / mirror / Atom feed
From: Arno Wagner <arno@wagner.name>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] XTS cipher mode limitations
Date: Sat, 21 Aug 2010 02:22:57 +0200	[thread overview]
Message-ID: <20100821002257.GA12482@tansi.org> (raw)
In-Reply-To: <1282338708.3231.53.camel@fermat.scientia.net>

Hi Chris,

hope I remember this right.

On Fri, Aug 20, 2010 at 11:11:48PM +0200, Christoph Anton Mitterer wrote:
> Hi.
> 
> Sorry for re-visiting this issue one (hopefully) last time... but at
> least to me not everything was fully clear yet.
> And I guess having a final conclusion which we could also put in the FAQ
> would be not to bad.
> 
> With respect to XTS:
> 
> 1) I guess we've already concluded that it's one of the securest modes
> available (if not the securest),... also protecting against certain
> attacks for which the others are vulnerable.

Yes.
 
> 2) There was this IV boundary issue when using just "plain",... but this
> is effectively none, if one uses "plain64"... as this is enough for
> 2^64*512byte volumes.
> Right?

Yes. Although plain64 is not available on older kernels.
 

> 3) There was a limitation on the block size, used with XTS, right? But
> as we _always_ use 512 byte (even if the device below uses larger
> sectors), we're fine anyway.
> Right?

Yes. 
 
> 4) There was the (general issue) that if an attacker can make
> snapshots,... you can only write some amount of data (with the same key)
> until probability increases that attacks are possible, right?

Yes. Not an XTS-related problem though, but general
for block encryption as needed with filesystems.

> Is this only the case when he can make snapshots?

Yes, the attacker needs all data, as he/she is looking for collisons.
If I understand thios right, the attacker does however not need to
store all date, a, say, 128 bit hash and a 64 bit block number
would be enough. That is 24 Byte/Block and for, say, 100TB, 
this is about 5TB. Then the attackler would need to search 
for duplicates in the hash part (i.e. about 3TB). Quite 
a bit of effort for very little data exposure.

> In XTS, this starts to get a problem after about 100TB (IIRC) of data
> have been written, right?

Depending on paranoia level:  1....1000TB
Note that is risks exposing that two single disk blocks have 
the same content, which generally is not a problem at all. 

Also note that the attacker needs to store 

> So the "solution" to this is: periodic re-encoding

Or ignore it, as it does not help the attacker in most cases
and an the attacker has massive effort (storing a lot of TBs of
data and then checking for matches).
 
> 5) Not sure whether I just didn't understand this,... but was'n there
> another limit with respect to about 1TB? And what was that about?

No. It is just that below 1TB the possibility for this attack is
low enouigh to effectively be zero. 
  
> So in the end we could put in the FAQ, that with XTS:
> - users should use plain64

Only for volumes > 2TB. Already in there.

> - periodically re-encode before about 100TB
> - 1TB thingy?!

No sure it makes sense. But I can put it in there.

Was there a literature reference for the attack? 
If I out this into the FAQ, then I need to 
get it right as it is something more complicated and the
data exposure is low enough that most people rightfully 
will not care and most attackers will not be able to do it
anyways due to the high anount of storage needed.
 
> Are there any other general things one should consider?
> (Of course I assume, that attackers have no easier way, e.g. via
> internet/software exploits or via physical force)

Not that I can see at the moment.

Arno

-- 
Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier 

  reply	other threads:[~2010-08-21  0:23 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-07-22 14:57 [dm-crypt] Efficacy of xts over 1TB David Santamaría Rogado
2010-07-25 10:34 ` Arno Wagner
2010-07-25 11:18   ` Christoph Anton Mitterer
2010-07-25 12:29     ` Heinz Diehl
2010-07-25 12:25   ` Milan Broz
2010-07-25 13:14     ` Christoph Anton Mitterer
2010-07-25 13:52       ` Milan Broz
2010-07-25 22:37         ` Christoph Anton Mitterer
2010-07-26  0:14           ` Milan Broz
2010-07-26 20:38             ` Christoph Anton Mitterer
2010-07-27  8:46               ` [dm-crypt] Using plain64/plain IV (initialisation vector) in dm-crypt Milan Broz
2010-07-27 10:47                 ` Arno Wagner
2010-07-27 14:17                   ` Christoph Anton Mitterer
2010-07-27 16:08                     ` Arno Wagner
2010-07-27 14:15                 ` Christoph Anton Mitterer
2010-07-27 15:45                   ` Mario 'BitKoenig' Holbe
2010-07-27 15:55                     ` Milan Broz
2010-07-27 18:59                       ` Christoph Anton Mitterer
2010-07-27 19:37                         ` Arno Wagner
2010-07-27 18:58                     ` Christoph Anton Mitterer
2010-07-27 19:35                       ` Mario 'BitKoenig' Holbe
2010-07-28  8:42                     ` Milan Broz
2010-08-20 21:11                       ` [dm-crypt] XTS cipher mode limitations Christoph Anton Mitterer
2010-08-21  0:22                         ` Arno Wagner [this message]
2010-08-22 12:50                           ` [dm-crypt] XTS cipher mode limitations (FAQ additions) Christoph Anton Mitterer
2010-08-23  0:46                             ` Arno Wagner
2010-08-25  9:36                               ` Christoph Anton Mitterer
2010-08-22 12:56                           ` [dm-crypt] tool to account the written number of bytes to a block device (was: XTS cipher mode limitations) Christoph Anton Mitterer
2010-08-22 16:01                             ` Arno Wagner
2010-08-22 21:57                               ` Christoph Anton Mitterer
2010-08-23  7:14                                 ` [dm-crypt] tool to account the written number of bytes to a block device Milan Broz
2010-08-25  9:27                                   ` Christoph Anton Mitterer
2010-08-24 16:19                           ` [dm-crypt] XTS cipher mode limitations Ramius
2010-07-26  8:53           ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-26 20:47             ` Christoph Anton Mitterer
2010-07-26 21:01               ` Arno Wagner
2010-07-26 21:28                 ` Christoph Anton Mitterer
2010-07-26 21:35                   ` Arno Wagner
2010-07-25 22:52         ` Christoph Anton Mitterer
2010-07-26  9:42           ` Mario 'BitKoenig' Holbe
2010-07-26 18:09             ` Arno Wagner
2010-07-27 18:16               ` [dm-crypt] Including the FAQ in the tarball? Christoph Anton Mitterer
2010-07-27 18:23                 ` Arno Wagner
2010-07-29  8:17                 ` Heinz Diehl
2010-07-25 15:32       ` [dm-crypt] Efficacy of xts over 1TB Arno Wagner
2010-07-25 22:48         ` Christoph Anton Mitterer
2010-07-25 23:42           ` Milan Broz
2010-07-26 18:35             ` Christoph Anton Mitterer
2010-07-25 15:28     ` Arno Wagner
2010-07-25 18:11       ` Milan Broz
2010-07-26  9:04   ` Mario 'BitKoenig' Holbe
2010-07-27 18:21     ` Christoph Anton Mitterer
2010-07-27 21:02       ` Mario 'BitKoenig' Holbe
2010-07-26  9:17 ` Mario 'BitKoenig' Holbe
2010-07-27 18:42 ` David Santamaría Rogado

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20100821002257.GA12482@tansi.org \
    --to=arno@wagner.name \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.