Garrett,
The alternate boot threat you describe cannot be executed against the Seagate Momentus FDE drives. Whenever power is removed from the drive, either at full system shutdown, or when the system goes into hibernation, the drive locks and all user data, including the hibernation file is encrypted and unavailable. When the system is powered up the FDE drive is locked. If an alternate system is booted, the drive will only appear to have a 128MB available, which is the protected read-only partition on the drive which stores the shadow master boot record which is used to provide the pre-boot authentication for unlocking the drive by an authorized user. Once the drive is unlocked, then the normal boot process or return from hibernation will execute. There is no possibility for alternate boot scenarios which will be able to find the drive in an unlocked state.
The Wave Embassy software you mentioned for managing the setup and security settings for the Seagate FDE drive, forces Windows to use hibernate mode, even if standby mode is selected by the user. In Dell systems, Seagate, Wave, and Dell worked together to create a solution for secure standby mode, so for Dell systems both hibernate and standby modes are supported with full security.
Lark Allen
Wave Systems Corp.
_______________________________________________
FDE mailing list
F...@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde
Booting to an alternative operating system can be defeated by clever
choice of the physical memory location where the key material is stored.
This trick doesn't apply as well to hardware FDE systems, but works very
nicely for software systems.
See Defense #2 in this talk:
http://www.blackhat.com/presentations/bh-usa-08/McGregor/BH_US_08_McGregor_C
old_Boot_Attacks.pdf
Tim Hollebeek
BitArmor Systems
Garrett,
It is important to note that there are some OS related security modes which do not engage the hardware level drive security.
The threat model for self-encrypting drives is protection for data at rest, that is, when the machine has been powered down such as when Windows has been put into hibernation mode or completely shut down. I’m not sure, but I do not believe screen locking Windows has any affect on unpowering the disk drive, thereby causing it to lock. If that is the case, then your scenario is likely correct and the machine could be rebooted with an alternate OS to defeat the OS security, not the drive security. For instance, I know that just doing a warm reboot/restart of Windows does not unpower the drive, therefore, during the reboot, the drive will not require authentication since it has remained in an unlocked state.
The correct procedure in order to engage the SED drive locking would be for the user to put the system into hibernation mode whenever they leave the system. As I mentioned, the Embassy software will not allow Windows standby mode since it does not unpower the drive either, so if standby mode is selected it will be automatically defaulted to hibernation mode. There is a notable exception for Dell systems shipping today with Seagate encrypting drives and Wave’s Embassy software. Dell, Seagate, and Wave engineered a secure standby mode solution, but only on Dell’s platforms. All other platforms will need hibernation mode or complete power off in order to engage drive locking.
As a side point since there was much discussion about the Princeton Cold Boot attacks, the encryption keys and authentication credentials are always held and used inside the secure hardware of the self-encrypting drives, therefore, none of the described system memory attacks could discover any of these secrets since they are never held in memory.
Thanks,
Lark Allen
Hi Garrett,
The described attack is not in the SED threat model. As Lark said, we are focusing on data-at-rest. Basically, you described hi-jack attack, when powered-on computer is stolen. You will need one more element in the system, proximity sensor, to mitigate this attack. There are plenty of sensors on the market:
For example:
If you have built-in Bluetooth, you can use software solution like this one: http://www.bluetoothpassport.com/
or even freeware open source: http://members.lycos.co.uk/wuul/bluelock/readme.html
You may need to change sensor software configuration to hibernate instead of sleep or starting screensaver. In combination with hardware disk encryption it will give you good protection against hijack and even against followed cold boot attack on hi-jacked machine.
Dmitry
| Dmitry Obukhov <d.ob...@samsung.com>
Sent by: fde-b...@www.xml-dev.com 07/15/2009 02:53 PM
|
|
If you are just using just BIOS's drive lock password feature, the drive
will lock after three password failures, and requires a power off/on to
reset the FDE drive.
If one is using a management software for the FDE drive, one can choose
from multiple types of responses to a brute force attack. In
addition to drive locking after some number of password failures, it can
be made so that the password becomes disabled (requiring a
"administrative" password that is more complex) or wipes the drive clean.
Scott
| "Robert Wann"
<rw...@enovatech.com>
Sent by: fde-b...@www.xml-dev.com 07/16/2009 11:13 AM |
|
http://www.xml-dev.com/mailman/listinfo/fde_______________________________________________
FDE mailing list
F...@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde
On Thu, 16 Jul 2009, Robert Wann wrote:
> There exists an effective solution to mitigate the OS attacks (warm boot
> as being described by Garrett) using all disk drives including SED and
> FDE. This can be done without a TPM or any other extra components as
> suggested by Dmitry & Darren.
>
> Garrett said:
> <Thanks for the info, Lark.
>
> So the attack vector is reduced to:
> 1. the machine is on* (like if the user locks his screen & walks away for a moment), and then
> 2. someone steals the laptop (leaving it on), and then
> 3. restarts the machine using a boot disc or bootable USB stick.>
I am missing something very elementary here - why shouldn't the screen
lock turn off decryption? Why would the system need to wait for the reset?
Is it so that threads can continue to execute? Is that a widespread
requirement on a laptop?
Daniel Feenberg
> ------------------------------------------------------------------------------
Robert,
All this discussion doesn’t mean that we, manufacturers, developers, specification writers, can not change locking state on COMRESET. Yes, we can, and it is trivial change.
However, primum noli no cere. The consequences of the trivial change are not trivial at all. Without support from OS/RAID vendors, comprehensive testing with different OS and applications, this feature is very dangerous. It can damage user’s data on the level of file system, slow down RAID controllers, and will break backward compatibility, because old OS doesn’t handle it. And all this is just to defeat a threat that is not in the scope of the solution and can be defeated in ten better ways?
WBR,
Dmitry Obukhov,
Samsung Secure Storage