NetBSD-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Security implications of large CGD?



On Tue, Apr 30, 2013 at 02:09:40PM +0000, Taylor R Campbell wrote:
>     Date: Sun, 28 Apr 2013 14:48:05 +0200
>     From: Jimmy Johansson <jimmy%Update.UU.SE@localhost>
> 
>    I'm about to create a CGD volume larger than 1 TB.
> 
>    I seem to remember reading something about OpenBSD and their full disk
>    encryption several years ago and that you should not create a
>    volume larger than 1 TB with their scheme. If I remember correctly it
>    was due to implementation limitations, but then again I don't trust my
>    memory any more.
> 
>    Or are there any problems overall with a volume larger than 1 TB
>    encrypted with aes-cbc and 256 b key that a layperson like me can't
>    see? I mean I'm neither a cryptographer nor a mathematician...
> 
> Cryptographers recommend[*] avoiding using a 128-bit block cipher with
> a single key to encrypt more than 2^32 blocks = 2^40 bytes = 1 TB.
> This is to render negligible an attacker's probability of success at
> using the birthday paradox to distinguish your ciphertext, which will
> have no collisions, from random data, which is expected to have a
> collision after 2^64 blocks.
> 
> To avoid this, you could break up your disk into parts encrypted with
> different keys and combine the parts using ccd or raid.
> 
> (OpenBSD has it much worse off, because their disk encryption supports
> only the 64-bit block cipher Blowfish.  I wonder whether cgd(4) ought
> to reject attempts to configure >1 TB (and much smaller for Blowfish
> and 3DES), until perhaps we add support for a wider-block cipher.)
> 
> [*] E.g., <http://www.ietf.org/rfc/rfc4434.txt>.

Thanks for the answer. Will keep this in mind when setting things up.

Regards,

Jimmy
-- 
If you don't shoot the bearers of bad news, people will keep bringing it to you.


Home | Main Index | Thread Index | Old Index