Delivery-Date: Tue, 23 Jun 2015 00:01:12 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 5ADE51E0ADF;
	Tue, 23 Jun 2015 00:01:10 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 0E5C03633A;
	Tue, 23 Jun 2015 04:01:04 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 80F743632C
 for <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 04:01:00 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id m5DKOFggiFiz for <tor-talk@lists.torproject.org>;
 Tue, 23 Jun 2015 04:01:00 +0000 (UTC)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22])
 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 2DD7236167
 for <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 04:01:00 +0000 (UTC)
Received: from localhost ([85.17.132.245]) by mail.gmx.com (mrgmx103) with
 ESMTPSA (Nemesis) id 0MfmZs-1ZUGQ01Yea-00NCNX for
 <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 06:00:57 +0200
Date: Tue, 23 Jun 2015 06:03:08 +0200
From: =?utf-8?B?w4dhxJ/EsWwgUC4gxZ5lc3Rv?= <secpost@abwesend.de>
To: tor-talk@lists.torproject.org
Message-ID: <20150623040308.GA4917@localhost.localdomain>
References: <558822A4.2020803@opensource.dyc.edu>
 <20150622184350.GA2580@localhost.localdomain>
 <55886AA5.1010300@opensource.dyc.edu>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <55886AA5.1010300@opensource.dyc.edu>
User-Agent: Mutt/1.5.23+89 (0255b37be491) (2014-03-12)
X-Provags-ID: V03:K0:XOi2OX22bxJG3MZz1UUqEk407MDn2+1f6r93d/EYq/ql5RrcPB4
 yZ20IvU/XzlVrPih995ECWWJkcRdZ3e3NHrVAarzEYlsfeadwJ3KHFjm5o7VmQbZSqo/UwR
 5YJ0u+nYNJNhtCU2ABajTTc+C98PQwXHso6PrFiimdwrdCpAzmiIsjo1M9rQ+neJHtzBK9o
 HbVw7kfzfnWW63Euqorvw==
X-UI-Out-Filterresults: notjunk:1;V01:K0:Fapt5wQq25A=:G+iOQX59RW6xso/pWcqh9Q
 i6n8wkbE1Tg6LVyyD+aF4dnL6CMvuZY7r+xVU5g3Ty6bpzOqRc4MppHOfbyLVreTOXOIBzr2+
 QjppkE+Zd7sBS6GedNOAAbBT1haZzMVZfX5cZwRxXMKBSkOgRP4pLvCEYtJrlKkbQyfGNRnT5
 qm+IE+Z9zjR2ZWlGtPP7vyMp+KqEW+ckbaLLWJjR1gA+ThyP7dul7B3QL+yXjKOPJppLU5MZx
 6M9H6V5fmaQ58Y/WutZvCRrpjdLQfzUD0/QV9OBIxyLeckjFlX590XvnPBSz4l+/yY2pWtTQB
 8yaVM3sZlkf+m3KcCxRv2fWqZ9JvN8NXqzwR3+TpEP1+jVnMiKqHRSGPcGIaLrbHk9DRP9xT8
 Mg6j2o+fM1cd0nimgdhx2YYWut8fiPA5S721yz6dhPEMl77RkOnpUzsekdrGXh8zplGGcOpSZ
 pR3xnWwBAu5NCthRqSJj9Cu6WrroOww22Dd1InAn+oWEZbq7Su/J8FQBkDyqwqqzIHgixRkl6
 TIb1NLyJHfeDVhoWDwl7o3akwcvTyxPsbh7n1khR6uv1VDu+rNjKyPB0DXdyLfecuYU40nnnB
 fUapyhY0JynCP8FN61wyZRnCzHcn15g4i7C9qOLylm5qTsZnPviTC7bJ8OqWx+ssS9ehxOhJG
 KzniiCD7Gmi4Xta5iUfg2FBA+UB3PBnxUuU0SoY20gqqVZKJ2YnraTsJP5n6xxhdfE9M=
Subject: Re: [tor-talk] Tor-ramdisk 20150616 released
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Mon, Jun 22, 2015 at 04:05:57PM -0400, Anthony G. Basile wrote:
> Are you referring to cold boot attack?

Not really, depending on memory controller and memorytype most
of the data, especially ram based static stuff is easy to extract.

If you put stuff into ram, I may find it in 6 of 10 cases. 
That is 2 reboots. On arm (sunxi) the same.

Another option is to suspend the device and make it dump the memory
to disk/swap (try it, you'd be suprised what you find).

If the target has some kind of sharedmemory, you are able to extract
complete framebuffer images (console or desktop).

I am not talking about keys that are somehow in use, I am talking data
like keys that reside in a rambased fs like tmpfs, or ramdisks with a 
filesystem (like the kernelbased ramdisks w/fixed size which were popular 
way before tmpfs).

If you put stuff into ram, most people don't realize it may also end in
swap (depending on usage patterns, load an the like).

> >If its run inside a vm, it's worse. :)
> Yes, all well known issues.

You mentioned coldboot, the tresor-patches only work with aes.
They are awesome if you use luks and isolate mbr, boot partition and the 
luks header from the disk to an usb stick or a memory card.

A host (x86, arm) is a brick with random data without the removable
device, when powered down. Don't forget the nail polish on the screws if
it has a case.

Me considers that a viable option if you distrust smartcards like yubi
and so on. You can't even boot it without the isolated parts.

Inputting a password isn't possible, and you'd be stupid to travel with 
both devices. :)

Tor in a vm is nice for isolation and leak prevention but considered
harmful if you can't trust the host/Dom0. I am at point were I would
only run a client maybe a middle relay inside a vm.

Aren't you worried about GPL violation? Since the school were you
distribute the images has no sources. Some of your components are
LGPL/GPL. First thought was, ah thats the school were all the embedded
engineers learn to properly violate the L/GPL and distribute binary only. :)

Anyway, thanks for all the links and for building the ram-disk, given the
low memoryfootprint I should be able to run it on my old soekris, which 
collects dust since I have 1GHz dual core arms with 1GB Ram ethernet and
wireless and SATA and and and ... :)
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

