Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
Encypting my files, without opening them to root?
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index Networking & Security
View previous topic :: View next topic  
Author Message
-SPM-Mad
n00b
n00b


Joined: 25 Dec 2007
Posts: 57

PostPosted: Sat Jun 20, 2009 8:37 pm    Post subject: Encypting my files, without opening them to root? Reply with quote

Hello everyone,

I am one of two admins on a machine, i.e. with root provileges. As my normal user I want to encrypt and hide my files not only from other users, but from root!

Ofcourse as root, one could always attach a debugger, scan the memory or sniff anything (any key) the users enters. There is no chance to prevent this, I know. But this also implies that the root user actively tries to hack the encryption!
In contrast, an encrypted loopback-device that I mount as my user, is something root can simply access, without hacking the memory!
Any encryption I know of (encrypted loopback-devices or fuse-based file-encryption) implies that I have to mount the encrypted data somewhere after authenticating and only protect it by the basic file-permission posibilites of linux - which do not apply to the root user.

What I want would be an encryption that gives a transparent acces to the filesystem, encrypting on the fly only for a certain user / certain processes.

Is something remotely similar possible?


One technical approach I could imagine is a virtual filesystem that transparently encrypts and decrypts together with a 'sandbox-like' application. I run my programms in this sandbox and they write to the virtual filesystem instead of the real one - but I do not know of any solution like this.

Hopefully my explanation is understandable :P
Back to top
View user's profile Send private message
Hu
Administrator
Administrator


Joined: 06 Mar 2007
Posts: 23066

PostPosted: Sun Jun 21, 2009 4:29 pm    Post subject: Reply with quote

You may be able to do this with SELinux or GRsecurity. In general, this is considered not to be a worthwhile exercise, and it would be both simpler and more reliable to solve this through social means. Ask the other administrator to stay out of your files.
Back to top
View user's profile Send private message
-SPM-Mad
n00b
n00b


Joined: 25 Dec 2007
Posts: 57

PostPosted: Tue Jun 23, 2009 9:23 pm    Post subject: Reply with quote

I see the problem with my own suggestion. Even when virtualizing the processes, the other user could still just use 'su' and then start any process to browse my files.

Oh well, I assume I need to trust him then. Thanks anyways for the hints about SELinux and GRsecurity... the topic is interesting enough to read more about it =)
Back to top
View user's profile Send private message
timeBandit
Bodhisattva
Bodhisattva


Joined: 31 Dec 2004
Posts: 2719
Location: here, there or in transit

PostPosted: Tue Jun 23, 2009 10:05 pm    Post subject: Reply with quote

Even if you trust the other guy, accidental exposure of decrypted files is always a possibility. Even superusers make mistakes. Also, should the trusted relationship ever erode, you might not realize it until your secrets are public. Finally, as you know there is no perfect defense against a root user with sufficient interest, skill and determination.

Anything too sensitive for other administrators to see does not belong on the machine. Move it somewhere else.
_________________
Plants are pithy, brooks tend to babble--I'm content to lie between them.
Super-short f.g.o checklist: Search first, strip comments, mark solved, help others.
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index Networking & Security All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum