Subject: Re: encrypted swap?
To: None <tech-security@netbsd.org, tech-kern@netbsd.org>
From: der Mouse <mouse@Rodents.Montreal.QC.CA>
List: tech-kern
Date: 06/04/2001 22:11:08
> To me, at least, the point of an encrypted swap area is to defeat
> "seized machine" attacks, not real-time attacks.

I would agree.

There's another point, which just now occurred to me.

Stuff remaining on swap can be good as well as bad.  I was at the
Venema/Farmer talk at IBM, and one of their rich sources of information
was swap partitions - it can be valuable for forensics after a breakin
as well as being valuable to an attacker.

> In other words, the risk is to things like PGP private keys and the
> like.

Agreed again.

> Given that, there's no issue of too much data encrypted with one key.

Now, smb is one of those people of whom I say "if you disagree, it's
probably you that's wrong".

But here I feel I must - it may not turn out to be a _practical_
matter, but it is at least important an issue enough to consider.

There's no issue of too much data _we care about_ encrypted with one
key, perhaps.  But - to pick on the PGP private key example - a lot
more than just the private key is encrypted with a given swap key.  At
the very least, the rest of the affected page is; in the scheme of the
paper, anything else encrypting-swapped to the same (big) chunk of swap
is.  Even with per-process (or per-VM-object) keys, anything else
swapped from that VM object is.

And as I trust we all know that the more data you encrypt with a key,
the easier cryptanalysis is.  And in a seized-machine attack, the
attacker can deduce exactly what the layout of the attacked process's
memory space is, providing a good deal of known plaintext and a bunch
more low-entropy plaintext.

And if we do the encrypted-block-device form, then the whole device,
including a whole lot of known or low-entropy plaintext, is.
(Depending of course on exactly how the encryption layer manages its
keys.)

> The total amount of ciphertext available to the attacker is limited
> by the amount of swap space you have, and that's almost certainly
> small enough that you don't have to worry.

There is that, though: even if you have a whole processful of encrypted
swap, it's probably not enough - even with known-plaintext help
factored in - to mount a successful attack.

I suppose it depends on how paranoid you are.

/~\ The ASCII				der Mouse
\ / Ribbon Campaign
 X  Against HTML	       mouse@rodents.montreal.qc.ca
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B