Hardware encrypted SSD for Laptop

Discussion in 'hardware' started by doveman, May 11, 2015.

  1. Balthazar

    Balthazar Registered Member

    Joined:
    Nov 8, 2013
    Posts:
    166
    Location:
    Earth
    Just a quick notice for those interested in using a Yubikey outside an OS, more precisely in Lenovo BIOS. With help from Yubico's customer service I learned that I should try to decrease the character output rate.

    I now did try full disk/ hardware encryption on a SSD again using a slot on a Yubikey to speeding things up and still having a strong password (32 characters). I can confirm that it is working fine. I decreased the output rate by 60ms.

    When decreasing the output rate on a Yubikey that is being used inside an OS (e.g. logon) one has to be a little more patient for all the characters to be transferred. I mention this because I had been used to the factory setting and at first confirmed the password too soon (wondering why it hadn't been accepted). Often there are only few characters displayed while in the background the rest of the 32 characters are being transferred. Be patient and observant.

    Things I learned the hard way:

    1. Always type in your passwords manually, especially in "sensitive" environments like BIOS
    2. if it works manually I can try password devices like a Yubikey
    (3. Get rid of the written password or store it in a safe place)

    Fortunately Samsung is making my SSD usable again, all data will be wiped in the process. :)
     
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Good for Samsung :thumb:
     
  3. r0m30

    r0m30 Registered Member

    Joined:
    Jun 12, 2015
    Posts:
    1
    Yes, the implementation MSED uses relies on the 128MB "shadow MBR table" but that table can only be changed by someone with the drive password, if your attacker has the drive password they wouldn't need to inject a keylogger, your already compromised. I haven't tested every scenario with every drive but when the drive powers up the BIOS/whatever is presented with a pristine copy of the shadow MBR table. There MAY (untested, by me at least) be an attack vector if the attacker modifies the shadow MBR and then puts the computer to sleep instead of hibernating/powering off the computer.

    OPAL also allows you to define multiple locking ranges with different attributes, I use this feature to protect the "real" MBR and partition table from modification by defining it as write locked (read only) by default so this area can also only be modified by someone with the drive pass-phrase.

    Some vendors have also implemented what I would call "disconnect security" where if the SATA cable is disconnected the drive is immediately locked stopping hotplug attacks.
     
    Last edited: Jun 12, 2015
  4. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  5. Balthazar

    Balthazar Registered Member

    Joined:
    Nov 8, 2013
    Posts:
    166
    Location:
    Earth
    Which article is that (sorry, so many links)?
    I do not use the trim command on my encrypted SSDs. Does that mean I don't have to worry? I use SSDs exclusively for Linux.

    I also applied the first 840 Evo patch for Linux. It went well.
     
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I meant the OP article: https://blog.algolia.com/when-solid-state-drives-are-not-that-solid/
    Yes, you're fine. Even using trim is fine. It's queued trim that fails. Windows can't do queued trim, so there are no issues there. But Linux can do queued trim, and it can zero out blocks that are still being used :eek:
    :)
     
  7. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,872
    Location:
    Outer space
  8. krustytheclown2

    krustytheclown2 Registered Member

    Joined:
    Nov 18, 2014
    Posts:
    210
    Can't your write protection be circumvented by booting live with the drive attached? Why would the live OS respect those permissions? Firmware stored in a flash ROM is designed specifically in hardware to prevent writes without the key, while this MBR resides on an SSD which has no write protections of this sort (short of the traditional encryption I recommend).
     
  9. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,872
    Location:
    Outer space
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.