Netzgemeinde Hubzilla
Anmelden
Registrieren
Netzgemeinde Hubzilla
Anmelden
Registrieren
System Apps
Fehler melden
Hilfe
QRator
Sprache
Suche
Verzeichnis
Zufälliger Kanal
Tue, 18 Jan 2022 13:01:20 +0100
Profil ansehen
streetboard_gurl
c47@hub.netzgemeinde.eu
tokudan
schrieb den folgenden
Beitrag
Tue, 18 Jan 2022 10:42:30 +0100
#linux
#cve
-2021-4122
cryptsetup can be tricked to decrypt a volume. apparently published January 13th 2022, but I haven't seen that anywhere yet:
https://marc.info/?l=oss-security&m=164207624903766&w=2
1
Harald Eilertsen
Link zur Quelle
show all
5 comments
Wed, 19 Jan 2022 07:40:30 +0100
Profil ansehen
Felix Tiede
felix@pod.pc-tiede.de
Interesting. From the description, it seems an attacker needs access to an already-opened device to perform the first step, for which a certain version of the software alone is sufficient.
There's a problem with that: If an attacker can perform the task in the first place, his privileges are already elevated. What hinders the same attacker from bringing his own version of cryptsetup?
A real fix is one where the vulnerable versions are subsequently unable to touch the LUKS headers without destroying them. Which means those headers must be modified such way that this is guaranteed. I can't see that from the fix description.
Link zur Quelle
Thu, 20 Jan 2022 06:10:18 +0100
Profil ansehen
streetboard_gurl
c47@hub.netzgemeinde.eu
To be honest I haven't yet been able to look at this on such a deep level. I hope that I'll gonna have time at the weekend :-)
Link zur Quelle
Thu, 20 Jan 2022 12:04:10 +0100
Profil ansehen
Harald Eilertsen
harald@hub.volse.no
it seems an attacker needs access to an already-opened device to perform the first step
No, they just have to modify the metadata in the luks2 header part of the volume. Since that part is (was) not protected by the keys they can do that even on a cold device.
The actual decryption happens when a valid user opens the device, so that's why repeated physical access is required.
Link zur Quelle
Thu, 20 Jan 2022 12:20:27 +0100
Profil ansehen
Felix Tiede
felix@pod.pc-tiede.de
Well... provided I have repeated physical access to a device, I install a key-logger. Or some other low-level spying device and not fiddle with cryptsetup itself.
However, my more serious concern is the fact that "just updating" cryptsetup is actually not enough to secure the system, because an attacker can use any version she desires. So, how do I mitigate the attack when an attacker can choose the version of cryptsetup to perform any of the necessary steps?
Link zur Quelle
Thu, 20 Jan 2022 13:59:25 +0100
Profil ansehen
Harald Eilertsen
harald@hub.volse.no
@
Felix Tiede
Of course, there's more than one way to get in.
The attacker would have to permanently downgrade the cryptsetup tool used during bootstrapping, but that's probably doable. If you have a fully encrypted system that may be harder, depending on how the bootstrapping works.
Link zur Quelle
Konversationsmerkmale
Lädt...
Konversationsmerkmale
Lädt...
Anmelden
E-Mail oder Kennung
Kennwort
Angaben speichern
Anmelden
Registrieren
Zurücksetzen des Kennworts
Entfernte Authentifizierung