[arch-general] LUKS emergency self-destruct
Hi, does anyone know if there is plan to implement this: http://www.kali.org/how-to/emergency-self-destruction-luks-kali/ in Arch?
Patch https://github.com/offensive-security/cryptsetup-nuke-keys is not too big and IMHO it would be great to have this option..
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
Paladin
On 13/01/14 20:57, Paladin wrote:
Hi, does anyone know if there is plan to implement this: http://www.kali.org/how-to/emergency-self-destruction-luks-kali/ in Arch?
Patch https://github.com/offensive-security/cryptsetup-nuke-keys is not too big and IMHO it would be great to have this option..
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
Arch provides vanilla packages. So no.
On 13.01.2014 11:57, Paladin wrote:
does anyone know if there is plan to implement this: http://www.kali.org/how-to/emergency-self-destruction-luks-kali/ in Arch?
Things like this belong to the bug tracker, not the mailing list.
Is the patch merged upstream? If no, it is highly unlikely that we will implement it. (read as no we won't)
Hi Paladin,
On Monday, January 13, 2014, Paladin wrote:
Patch https://github.com/offensive-security/cryptsetup-nuke-keys
https://github.com/offensive-security/cryptsetup-nuke-keys> is not too big and IMHO it would be great to have this option..
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
This would be a suitable AUR project. You could provide a PKGBUILD which implements this additional functionality, but *you* alone are responsible for additional functionality which isn't maintained upstream. If there is, in fact, demand for this feature, it would be well received on the AUR.
It could be useful to model the vmware-patch[1] PKGBUILD, which provides a post-installation patch to vmware. (I found this with a search and have not tested it.)
Also, in the future, please consider not using "emergency" in the subject line of this mailing list unless it is warranted.
Cheers, Quint
Am 13.01.2014 11:57, schrieb Paladin:
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
This feature has already been rejected by the cryptsetup authors as far as I can see. So no, we will not keep maintaining our own cryptsetup modification.
On Mon, Jan 13, 2014 at 11:57:28AM +0100, Paladin wrote:
Hi, does anyone know if there is plan to implement this: http://www.kali.org/how-to/emergency-self-destruction-luks-kali/ in Arch?
Patch https://github.com/offensive-security/cryptsetup-nuke-keys is not too big and IMHO it would be great to have this option..
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
Paladin
-- () ascii ribbon campaign - against html e-mail /\ www.asciiribbon.org - against proprietary attachments
It's already in the AUR---was submitted the day that blog post came out, in fact: https://aur.archlinux.org/packages/cryptsetup-nuke-keys/
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 01/13/2014 03:57 AM, Paladin wrote:
Hi, does anyone know if there is plan to implement this: http://www.kali.org/how-to/emergency-self-destruction-luks-kali/ in Arch?
Patch https://github.com/offensive-security/cryptsetup-nuke-keys is not too big and IMHO it would be great to have this option..
Patch is for 1.6.1 but it cannot be that difficult to port it to 1.6.3 which we have.
If you use this, be careful that you're using it for the right thing. Unfortunately the way it's implemented makes it seem like it's purpose is something that it's not.
The intent is for it to be an easy and fast way to destroy the key information (and optionally recover it if you have a backup), when you are in a SAFE environment. A convenient alternative to manually doing it with dd and a live CD.
It's not intended to be an "If I'm tortured I can enter the duress password and it will destroy the keys" feature. Obviously, your torturers (or law enforcement (they can be the same thing)), will clone the disk and make you enter your password into the cloned system.
Just a warning.
- -- Taylor Hornby
participants (7)
-
Allan McRae
-
Bigby James
-
Florian Pritz
-
Paladin
-
Quintus Public
-
Taylor Hornby
-
Thomas Bächler