Date: Fri, 20 Feb 2015 06:19:55 -0500 From: Jerry Leichter <leichter@lrw.com> To: Henry Baker <hbaker1@pipeline.com> Cc: cypherpunks@cpunks.org, freebsd-security@freebsd.org, cryptography@metzdowd.com, grarpamp <grarpamp@gmail.com> Subject: Re: [Cryptography] trojans in the firmware Message-ID: <A8BD647B-0156-4DA5-94F7-CF6EF4756044@lrw.com> In-Reply-To: <E1YOTjj-0004uI-59@elasmtp-mealy.atl.sa.earthlink.net> References: <E1YNSQU-0004pW-Oh@elasmtp-kukur.atl.sa.earthlink.net> <E3B30770-BB81-47F1-895D-14CF7FCFC0BE@lrw.com> <54E2B04C.9080707@av8n.com> <E1YNuOT-0004uN-CV@elasmtp-mealy.atl.sa.earthlink.net> <54E436FB.9000709@deadhat.com> <CAAMy4USCzQDO=k3yhZ_LVb4ivz4k5qTCasm3KCen%2By1yi8oa%2Bw@mail.gmail.com> <CAD2Ti29bD6f7tTq=FgGQDXD43C%2BzTW0fOWYrbCeTCBmiu0bBqA@mail.gmail.com> <E1YOGNA-0004BG-UT@elasmtp-banded.atl.sa.earthlink.net> <E1YOTjj-0004uI-59@elasmtp-mealy.atl.sa.earthlink.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Feb 19, 2015, at 11:12 AM, Henry Baker <hbaker1@pipeline.com> wrote: > I would love to be able to program this device myself, instead of = relying on Samsung's firmware. Good luck with that. SSD performance and even proper operation is still = somewhat of a black art; much of the value of the device comes from the = proprietary algorithms that control it, which are build knowing details = of the design. Samsung, like other SSD makers, has every reason to keep = that stuff secret. The market advantage of increments in speed and = other features is significant; the market to people who want to program = it themselves is essentially non-existent. > BTW, what's the point of AES encryption on this pre-p0wned device? = More security theatre? It depends on the implementation and what kind of attacker you're = considering. There have been implementations in the past which use = simply match a password stored in the device - encrypted with AES so = that the advertising claims aren't outright lies - against a password = entered at boot; the data itself was left unencrypted. But there's = plenty of power in a device like this to essentially build FDE right = into the SSD. That's probably proof against any attack against a = stolen/seized SSD. (Of course, Samsung may have deliberately, or = through incompetence, provided a back door - we'd never know. But most = attackers wouldn't know either. I'm sure North Korea would *assume* = that the South Korean intelligence services have access, whether it's = true or not.) Low-enough level attacks against the boot sequence could intercept and = leak the password. The OS typically would come in way too late to see = the password - but of course if you take it over, you have full access = to the device. In summary: Assuming a decent implementation and no back doors = available to the attackers of interest to you, this has exactly the = strengths and weaknesses of FDE, with no overhead in the host. Not = really security theatre, but given modern hardware, perhaps not much of = an advantage either. You could go for defense in depth by using FDE on = top of what the device provides. -- Jerry
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A8BD647B-0156-4DA5-94F7-CF6EF4756044>