Full Disclosure mailing list archives

Just how secure encrypted linux partitions really are?


From: Levente Peres <sheridan () sansz org>
Date: Sun, 12 Dec 2010 01:43:53 +0100

Hello to All,

If anyone have serious hands-on experience with this, I would like to know some hard facts about this matter... I thought to ask you, because here're some of the top experts in this field, so I could find few better places. Hope you can nodge me in the right direction, and take the time to answer this.

Let's suppose I have a CentOS server, with encrypted root partition, and I put the /boot partition on a separate USB key for good measure. Encryption technology is the default which "ships" with CentOS 5.5 and it's LVM.

If someone gets hold of that machine, or rather, the drives inside the Smart Array, what are the chances he can "decrypt" the root partition, thus gaining access to the files, if he doesn't know the key? I mean I know that given enough time, probably it could be done with brute-force. But seriously, how much of a hinderance this is to anyone attempting to do this? Does it offer any serious protection or is it just some inconvenience to the person conducting the analysis of the machine? How realistic is it that one can accomplish the decryption inside a reasonable amount of time (like, say, within half a year or so)?

Could some of you please give me some of your thoughts about this? And, maybe, what other methods of file system encryption are out there which are more secure?

Thanks,

Levente
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: