[144514] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Seagate announces hardware FDE for laptop and desktop machines

daemon@ATHENA.MIT.EDU (james hughes)
Sun Jun 14 14:01:48 2009

Cc: Simon Josefsson <simon@josefsson.org>,
 Cryptography <cryptography@metzdowd.com>
From: james hughes <hughejp@mac.com>
To: travis+ml-cryptography@subspacefield.org
In-reply-to: <20090610231953.GD443@subspacefield.org>
Date: Fri, 12 Jun 2009 10:12:20 -0700


On Jun 10, 2009, at 4:19 PM, travis+ml-cryptography@subspacefield.org  
wrote:

> Reading really old email, but have new information to add.
>
> On Wed, Oct 03, 2007 at 02:15:38PM +1000, Daniel Carosone wrote:
>> Speculation: the drive always encrypts the platters with a (fixed)  
>> AES
>> key, obviating the need to track which sectors are encrypted or
>> not. Setting the drive password simply changes the key-handling.
>>
>> Implication: fixed keys may be known and data recoverable from  
>> factory
>> records, e.g. for law enforcement, even if this is not provided as an
>> end-user service.
>
> There was an interesting article in 2600 recently about ATA drive
> security.
>
> It's in Volume 26, Number 1 (Spring 2009).  Sorry that I don't have an
> electronic copy.
>
> The relevant bit of it is that there are two keys.  One key is for the
> user, and one (IIRC, it is called a master key) is set by the factory.
>
> IIRC, there was a court case recently where law enforcement was able
> to read the contents of a locked disk, contrary to the vendor's claims
> that nobody, even them, would be able to do so.

All of these statements may be true. The standardization of the  
command set for encrypting disk drive does has a "set master key"  
command. If this command does exist, and if the user had software that  
resets this master password, then the backdoor would have been closed.  
(I know, there area  lot of "ifs" in that sentence.)
	http://www.dtc.umn.edu/disc/resources/RiedelISW5r.pdf
	http://www.usenix.org/events/lsf07/tech/riedel.pdf
	http://www.t10.org/ftp/t10/document.04/04-004r2.pdf
and from universities you can access
	http://ieeexplore.ieee.org/iel5/10842/34160/01628480.pdf
	https://www.research.ibm.com/journal/rd/524/nagle.html

Jim

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post