Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Aug 2014 02:10:21 -0500
From:      Scott Bennett <bennett@sdf.org>
To:        kpneal@pobox.com
Cc:        freebsd-questions@freebsd.org
Subject:   Re:   some ZFS questions
Message-ID:  <201408260710.s7Q7ALnc021359@sdf.org>
In-Reply-To: <20140825003000.GA4221@neutralgood.org>
References:  <201408070816.s778G9ug015988@sdf.org> <40AF5B49-80AF-4FE2-BA14-BFF86164EAA8@kraus-haus.org> <201408211007.s7LA7YGd002430@sdf.org> <20140822005911.GA52625@neutralgood.org> <201408241027.s7OARfEK004658@sdf.org> <20140825003000.GA4221@neutralgood.org>

next in thread | previous in thread | raw e-mail | index | archive | help
kpneal@pobox.com wrote:
> On Sun, Aug 24, 2014 at 05:27:41AM -0500, Scott Bennett wrote:
> > kpneal@pobox.com wrote:
> > > What's the harm in encrypting all the data?
> > 
> >      High CPU overhead for both reading and writing is the main downside.
>
> Does this matter? Is the workload going to be so high or so latency sensitive
> that the added encryption will matter?

     Most of the time, probably not much.  But in some cases, it will
(e.g., copying multigigabyte-long files into ZFS).
>
> This whole thread has been through a number of ways to keep the encrypted
> and unencrypted data apart, but they all have important downsides. My
> question to you is "Is the benefit of the data segregation worth the cost
> in time and trouble?"
>
     Some years ago in the days before "geli init" automatically created
metadata backups in /var/backups, I inadvertently wiped out the geli metadata
on a partition and thereby lost all of it.  Thank goodness I didn't have
everything in one partition.  I also had wiped the MBR, but did have the
original map and could recreate the MBR, so I was able to retrieve all of
the unencrypted data.  I was eventually able to recreate a moderate portion
of the encrypted data, but that took a *lot* of my time.  From time to time,
I do make stupid mistakes, so I try to protect myself as much as I can from
them.
> > >
> > > In fact, encrypting all data is more secure. If you only encrypt the data
> > 
> >      Sure, but why do it if the data don't need to be secret?
>
> Because segregating the data out might be more trouble than it is worth.
>
> > > that is secret then you've just told an attacker exactly what data it is
> > > you want secret.
> > >
> >      Umm...I don't see that that necessarily follows, except in one case,
> > namely, when the attacker already knows what all of the data are.
>
> Not true. If you have only some data encrypted then an attacker knows that
> by definition you don't want that data examined. What the data is is less
> important initially than the fact that the secrecy of that data is important
> _to_ _you_.
>
> You don't have to know a secret to know that a secret exists.
>
     Encrypting *any* files tells an attacker that much, or at least that
there *might* be a secret.  For my purposes, that much is unimportant.


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:   bennett at sdf.org   *xor*   bennett at freeshell.org  *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201408260710.s7Q7ALnc021359>