[dm-crypt] few questions on truecrypt and luks

Arno Wagner arno at wagner.name
Mon Apr 15 16:59:52 CEST 2013


On Mon, Apr 15, 2013 at 03:47:38PM +0200, octane indice wrote:
> Responding to  ".. ink .." <mhogomchungu at gmail.com> :
> 
> > Two differences i can think of are:
> > 3. luks doesnt support hidden volumes.
> >
> It does, in a way.

True. Not much worse than the TrueCrypt variant actually. 
 
> Create a loop file (or an existing partition).
> fill it with random data (important!)
> cryptsetup luksFormat it
> cryptsetup luksOpen it
> Format the crypted device with FAT32 (important!)

Yes, as FAT32 fills a volume from the beginning.

> Then, use loop with a high offset, e.g. more than half of the disk,
> create a plain cryptsetup

To avoid metadata.

> losetup -o 10000000 device
> cryptsetup create loop secretname
> format it with any filesystem, copy your very secret documents in it, close
> this partition.
> 
> By doing this, anyone without the knowledge of the offset + the password
> won't be able to prove that you have datas hidden.
> Warning, if you write more data in the first luks device than the offset
> choosen, you destroy data (but in some case, you may want it).
> 
> My 2 cents.

The problem with hidden volumes is this: Either you have the risk
of destroying them, or you cannot use the partition they are
hiding in (which gives a good hint to an attacker), or you need to 
reserve space for them explicitely (which gives a strong hint to the
attacker). 

TrueCrypt does not do any better here. Also keep in mind that
in many situations (US border inspection, e.g.) the mere suspicion
of a hidden partition being present will be enough.

Arno
-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno at wagner.name
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
There are two ways of constructing a software design: One way is to make it
so simple that there are obviously no deficiencies, and the other way is to
make it so complicated that there are no obvious deficiencies. The first
method is far more difficult.  --Tony Hoare


More information about the dm-crypt mailing list