Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Your Rights Online Data Storage Encryption Privacy Security Upgrades Hardware

Universal Disk Encryption Spec Finalized 237

Lucas123 writes "Six of the largest disk manufacturers, along with encryption management software vendors, are backing three specifications finalized [Tuesday] that will eventually standardize the way encryption is used in firmware within hard disk drives and solid state disk drive controllers ensuring interoperability. Disk vendors are free to choose to use AES 128-bit or AES 256-bit keys depending on the level of security they want. 'This represents interoperability commitments from every disk drive maker on the planet,' said Robert Thibadeau, chief technologist at Seagate Technology."
This discussion has been archived. No new comments can be posted.

Universal Disk Encryption Spec Finalized

Comments Filter:
  • Dumb Question (Score:3, Interesting)

    by sstpm ( 1463079 ) on Thursday January 29, 2009 @01:46AM (#26649843)
    Can any storage gurus explain the real-world benefit to this? Is it currently impossible to encrypt a RAID volume built on two different manufacturers' disks?
  • by (Score.5, Interestin ( 865513 ) on Thursday January 29, 2009 @01:49AM (#26649855)

    The parent poster made a typo in the IEEE project name. It's P1619.

    You're right, sorry, typo while trying to get first post :-). Their home page is here [siswg.net], and they've had their specs out for nearly two years. How can any group that has an official Wine Tasting Standing Subcommittee be a bad thing?

  • Pardon my ignorance (Score:3, Interesting)

    by Jane Q. Public ( 1010737 ) on Thursday January 29, 2009 @02:29AM (#26650071)
    but has it been pretty well established that there are no significant backdoors, or backdoor techniques, related to the existing AES algorithms? I.e., 128 and 256?

    What good would hardware encryption be unless we were pretty well assured that even the NSA would be stymied?

    It is not a matter of doing anything illegal, of course, but encryption is encryption. If there are reasonable methods available to break it, then it ain't.
  • by ivi ( 126837 ) on Thursday January 29, 2009 @02:50AM (#26650159)

    So, do[es any of] these standards make it easier for a gov't or other organization to notice that someone (eg, a journalist) has got his/her data (eg, article, photo's, interview audio, important video clips, etc.) encrypted on a device, ie, as they try to sneak from, say, within a war zone (closed to journalists) back to friendly soil?

    If so, which encryption software (eg, Trucrypt, etc.) - that DOESN'T adhere to standards - will save this journo's life and/or media, in the above situation?

  • by jjohnson ( 62583 ) on Thursday January 29, 2009 @03:04AM (#26650211) Homepage

    You're kind of missing the point. If our hypothetical journalist is caught crossing a border, the guards won't pull the hard drive and check the make, and then hook it up to their own gear to see if it's encrypted or not. They'll point their AKs at the journo and make him turn his laptop on. If he refuses, they shoot him. If it prompts for a password and he refuses to enter it, they shoot him. If he claims he forgot the password, they'll toss him and his laptop into the back of the truck to send him to the capital to receive 'enhanced interrogation'. No encryption software will save his life. The guards probably won't know or care about encryption.

    If I were that journo, I'd encrypt the files themselves and rename them crash.dump and put them in the Windows directory so I can turn it on, let them scan for jpegs and avis and find nothing, and be sent on my way.

  • by Nicolas MONNET ( 4727 ) <nicoaltiva.gmail@com> on Thursday January 29, 2009 @03:07AM (#26650223) Journal

    If the password protection is only blocking the drive's firmware, but the data is not encrypted on disk, it's a very weak protection. Someone stealing your disk only has to find a disk of the same model, and exchange the platters.

  • by Eighty7 ( 1130057 ) on Thursday January 29, 2009 @03:08AM (#26650227)

    No one knows who wrote TrueCrypt. No one knows who maintains TC. Moderators on the TC forum ban users who ask questions. TC claims to be based on Encryption for the Masses (E4M). They also claim to be open source, but do not maintain public CVS/SVN repositories and do not issue change logs. They ban folks from the forums who ask for change logs or old source code. They also silently change binaries (md5 hashes change) with no explanation... zero. The Trademark is held by a man in the Czech Republic ((REGISTRANT) Tesarik, David INDIVIDUAL CZECH REPUBLIC Taussigova 1170/5 Praha CZECH REPUBLIC 18200.) Domains are registered private by proxy. Some folks claim it has a backdoor. Who Knows? These guys say they can find TC volumes:

    http://16systems.com/TCHunt/index.html [16systems.com]

    For these reasons, I won't use it. Encryption is important and TC looks great and makes great claims, but TC should be more transparent.

    from: http://www.reddit.com/r/programming/comments/7otuy/who_wrote_this_software_an_excia_agent/ [reddit.com]

  • Problems abound... (Score:4, Interesting)

    by Vertana ( 1094987 ) on Thursday January 29, 2009 @03:13AM (#26650263) Homepage

    If someone has Truecrypt on their hard drive and the police raid your house for some server and they take that encrypted drive, there is nothing stopping you from saying, "I forgot my password... oops." But if you trust the hardware, then what stops the police from going after that hard drive manufacturer and putting the legal pressure on them to provide a back entrance and/or technical help? The idea that the government won't put a legal squeeze on the hard drive manufacturer the second they think they've come upon a child pornography/warez/other horrible illegal things seems absurd to me. I understand that manufacturers of things like flash drives and such have had hardware encryption before, but it hasn't been widespread and mainstream. When you throw in the "average citizen" factor, I think we'll see all kinds of challenges and laws spring up.

    -- And as always IANAL, but I do read Slashdot!!

  • by clampolo ( 1159617 ) on Thursday January 29, 2009 @03:37AM (#26650401)
    I worked for a company that shipped encrypted firmware. We were required to send the keys to the NSA.
  • by dido ( 9125 ) <dido@imperiu m . ph> on Thursday January 29, 2009 @04:04AM (#26650509)

    However (and purely as an example), Linux's software RAID is faster than many hardware RAID controllers, and a system lacking a dedicated hardware RAID controller very well may use less power than an equivalent system with one.

    Speaking from experience, this seems to be true only of the 'fakeraid' setups that you see on cheap RAID controllers, which aren't really hardware RAID at all. They cheat and instead use firmware that executes on the main CPU to do the RAID, making them no better in principle and more often than not worse in performance than the Linux kernel's heavily optimized high-performance software RAID implementation. True dedicated hardware RAID controllers, such as the HP Smartarray, IBM ServeRAID, and the RAID controllers you see on fiberchannel SANs, are actually quite rare except in enterprise setups, and they are in general much faster than the Linux software RAID implementation.

    But of course, nothing stops a manufacturer from doing bad engineering and making a product that has a dedicated piece of hardware that actually does the job slower than the main CPU would. And performance is not the only reason to make a dedicated hardware implementation of some bit of functionality. It could be done for "trusted computing" purposes for instance, in which case, it doesn't matter that it's slow, just that it keeps control out of the hands of the main CPU.

  • by noidentity ( 188756 ) on Thursday January 29, 2009 @04:39AM (#26650689)

    Why should this be trustable?

    I think we can fully trust manufacturers to take a shortcut and implement this as dual ROT-13 encryption, perhaps with a delay thrown in to make it seem like it's doing something. How would the average user determine whether the magnetic patterns on the disk are encrypted anyway? This seems very similar to the issue with electronic voting machines, only worse. Encryption on the host machine seems far superior, since the data is never traveling over the I/O bus unencrypted, and it's much easier to verify that the data is actually being encrypted.

  • by amorsen ( 7485 ) <benny+slashdot@amorsen.dk> on Thursday January 29, 2009 @05:21AM (#26650889)

    True dedicated hardware RAID controllers, such as the HP Smartarray, IBM ServeRAID, and the RAID controllers you see on fiberchannel SANs, are actually quite rare except in enterprise setups, and they are in general much faster than the Linux software RAID implementation.

    Smartarray is dead slow for RAID5, and RAID1 in software doesn't tax the CPU. RAID controllers are only worth it because it can be hard to get Linux booting reliably from a software RAID 1 with a failed disk. As for RAID levels other than RAID1 and RAID10, don't.

  • by Anonymous Coward on Thursday January 29, 2009 @06:16AM (#26651157)

    Hardware raid is not always faster than software. Often the opposite is the case. However, speed is only one factor, the other is CPU offloading.

    If you are running a CPU-heavy computation, I/O speed is not so much the important thing, as making sure that every CPU cycle is available for the computation.

    However, if your main bottleneck is I/O, the main CPU can do a lot more "raid-stuff" than the much slower CPU on a raid card. While the main CPU may be 3 GHz, 8 core, the RAID one may only be a couple of hundred MHz with a passive heat sink. You don't see a lot of raid cards with a 3 GHz multicore CPU where the heat sink and fan will block the five adjacent slots.

  • Comment removed (Score:3, Interesting)

    by account_deleted ( 4530225 ) on Thursday January 29, 2009 @08:45AM (#26651915)
    Comment removed based on user account deletion
  • by Directrix1 ( 157787 ) on Thursday January 29, 2009 @11:23AM (#26653637)

    Nah, the company would probably just make sure that the word doesn't get out. And if it does it would be seen as some whack job on Slashdot who thinks only F/OSS can be trusted. Just so there is no confusion here, I'm one of those whackjobs. Proprietary disk encryption is just a universally dumb idea.

  • by Dr_Barnowl ( 709838 ) on Thursday January 29, 2009 @02:15PM (#26656145)

    All TCHunt does is look for random data. If you append 100MB of /dev/urandom to a file and run TCHunt, it will "recognise" it as a TrueCrypt volume.

    This is not a secret. This is how encryption works. Obfuscating your data inside a apparently plaintext structured format is called stenanography and is another subject entirely.

    The changelog is here [truecrypt.org]

    Discussions on using CVS and other version control are scattered throughout the forums without apparent quoshing by the admins. Yes, old versions of the source are not available - unless you already downloaded them, of course.

    The MD5 hashes changing for the installer was just that - they rebuilt the installers with some of the new setup (like offering the option to disable the pagefile) from the version 6 installers, but the binaries inside remained identical. Doing this is rather poor practice because it raises this sort of question, but hey, you trusted the first file signed with their PGP key, why not the second? The TCHunt guys have an archive [16systems.com] of old TrueCrypt versions, but they won't let you download them now for bandwidth reasons ; it might be illuminating to pick through the various MD5 versions and compare the actual binaries installed.

    If someone is concerned about back doors, they can audit the code, and build it themselves. (don't respond to this with the Ken Thompson compiler back door proposition). Undoubtedly there are people that do this, although they are not equipped to sign their builds with the TC foundation PGP key.

    As a popular encryption soft, I have no doubt it comes under scrutiny. I might trust it a mite more if it was signed by Bruce Schneier's key though :-)

  • by Hatta ( 162192 ) on Thursday January 29, 2009 @02:25PM (#26656293) Journal

    That's a nice idea, but about as accurate as the idea that "Banks will self regulate because it's in their best interest". It's already well known that the NSA had a backdoor into Windows encryption, and that doesn't seem to bother anyone.

  • by Lord Ender ( 156273 ) on Thursday January 29, 2009 @02:34PM (#26656443) Homepage

    That's a meaningless question. A trojan can encrypt using software or hardware. This technology doesn't make any difference to trojans whatsoever. Your data is just as encrypted.

    This is why the word "owned" is used when a trojan takes over. It can do anything it wants with your data.

  • by Alsee ( 515537 ) on Thursday January 29, 2009 @06:08PM (#26659411) Homepage

    There is a bit of a difference.

    In the standard current case you would need to read-encrypt-rewrite all several hundred gigs of the drive. I would guesstimate that would probably take over an hour to complete. If you realize something is wrong you could simply hit the power button and nearly all of your data will still be retrievable.

    With this system all of the data is encrypted. If I'm understanding the system correctly the owner is forbidden to know his encryption key. The system maintains a list of access profiles, you enter your password linked to your access profile, and then the drive internally generates or accesses the actual encryption key. Malware could potentially create do something like creating new access profile locked to some new password, and then delete or reset your access profile. That would involve only a few dozen bytes of data, and it would be completed almost instantaneously. All of your data is effectively destroyed instantaneously, unless you can get the unlock code from the attacker.

    -

After an instrument has been assembled, extra components will be found on the bench.

Working...