From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from blaine.gmane.org (unknown [195.159.176.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Tue, 25 Apr 2017 16:37:30 +0200 (CEST) Received: from list by blaine.gmane.org with local (Exim 4.84_2) (envelope-from ) id 1d31aj-0002EW-GH for dm-crypt@saout.de; Tue, 25 Apr 2017 16:37:21 +0200 From: Robert Nichols Date: Tue, 25 Apr 2017 09:37:19 -0500 Message-ID: References: <20170422002548.GA23882@tansi.org> <20170422134557.GB1425@tansi.org> <56144922-1d2e-b97c-3a5b-d7a952c84950@depressiverobots.com> <6bbee653-87c7-7145-82fe-785ab6fafece@depressiverobots.com> <569e04ca-10ae-28fc-9db2-5bf0cb9daea5@depressiverobots.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8"; format="flowed" Content-Transfer-Encoding: 8bit In-Reply-To: Subject: Re: [dm-crypt] LUKS header recovery attempt, bruteforce detection of AF-keyslot bit errors List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On 04/25/2017 08:44 AM, Dominic Raferd wrote: > > > On 25 April 2017 at 14:14, Robert Nichols > wrote: > > On 04/24/2017 06:49 PM, protagonist wrote: > > However, I assume it is likely that a determined attacker running as > root might be able to extract the master key from RAM if the encrypted > volume in question is still open at the time of attack, so technically, > there would be a way to do this without the password. > > > It's trivial. Just run "dmsetup table --showkeys" on the device. > > > Wowzer. 'cryptsetup luksDump --dump-master-key' can also provide this info but it requires a passphrase, which 'dmsetup table --showkeys' does not. So must we assume that anyone who has ever had root access while the encrypted device is mounted can thereafter ​break through the encryption regardless of passphrases? At least until cryptsetup-reencrypt is run on the device, which is a big step. It's in the FAQ, section 6.10, so not really a great revelation. BTW, it's "--showkey", not "--showkeys". Minor typo there, sorry. Also, anyone who has had access to the device has had the ability to save a copy of the LUKS header, so the ability to revoke passphrases really isn't as great as it cracked up to be. -- Bob Nichols "NOSPAM" is really part of my email address. Do NOT delete it.