Welcome
Username or Email:

Password:


Missing Code




[ ]
[ ]
Online
  • Guests: 27
  • Members: 0
  • Newest Member: omjtest
  • Most ever online: 396
    Guests: 396, Members: 0 on 12 Jan : 12:51
Members Birthdays:
No birthdays today

Next birthdays
05/11 ramses (16)
05/11 Arcstarter (31)
05/11 Zak (15)
Contact
If you need assistance, please send an email to forum at 4hv dot org. To ensure your email is not marked as spam, please include the phrase "4hv help" in the subject line. You can also find assistance via IRC, at irc.shadowworld.net, room #hvcomm.
Support 4hv.org!
Donate:
4hv.org is hosted on a dedicated server. Unfortunately, this server costs and we rely on the help of site members to keep 4hv.org running. Please consider donating. We will place your name on the thanks list and you'll be helping to keep 4hv.org alive and free for everyone. Members whose names appear in red bold have donated recently. Green bold denotes those who have recently donated to keep the server carbon neutral.


Special Thanks To:
  • Aaron Holmes
  • Aaron Wheeler
  • Adam Horden
  • Alan Scrimgeour
  • Andre
  • Andrew Haynes
  • Anonymous000
  • asabase
  • Austin Weil
  • barney
  • Barry
  • Bert Hickman
  • Bill Kukowski
  • Blitzorn
  • Brandon Paradelas
  • Bruce Bowling
  • BubeeMike
  • Byong Park
  • Cesiumsponge
  • Chris F.
  • Chris Hooper
  • Corey Worthington
  • Derek Woodroffe
  • Dalus
  • Dan Strother
  • Daniel Davis
  • Daniel Uhrenholt
  • datasheetarchive
  • Dave Billington
  • Dave Marshall
  • David F.
  • Dennis Rogers
  • drelectrix
  • Dr. John Gudenas
  • Dr. Spark
  • E.TexasTesla
  • eastvoltresearch
  • Eirik Taylor
  • Erik Dyakov
  • Erlend^SE
  • Finn Hammer
  • Firebug24k
  • GalliumMan
  • Gary Peterson
  • George Slade
  • GhostNull
  • Gordon Mcknight
  • Graham Armitage
  • Grant
  • GreySoul
  • Henry H
  • IamSmooth
  • In memory of Leo Powning
  • Jacob Cash
  • James Howells
  • James Pawson
  • Jeff Greenfield
  • Jeff Thomas
  • Jesse Frost
  • Jim Mitchell
  • jlr134
  • Joe Mastroianni
  • John Forcina
  • John Oberg
  • John Willcutt
  • Jon Newcomb
  • klugesmith
  • Leslie Wright
  • Lutz Hoffman
  • Mads Barnkob
  • Martin King
  • Mats Karlsson
  • Matt Gibson
  • Matthew Guidry
  • mbd
  • Michael D'Angelo
  • Mikkel
  • mileswaldron
  • mister_rf
  • Neil Foster
  • Nick de Smith
  • Nick Soroka
  • nicklenorp
  • Nik
  • Norman Stanley
  • Patrick Coleman
  • Paul Brodie
  • Paul Jordan
  • Paul Montgomery
  • Ped
  • Peter Krogen
  • Peter Terren
  • PhilGood
  • Richard Feldman
  • Robert Bush
  • Royce Bailey
  • Scott Fusare
  • Scott Newman
  • smiffy
  • Stella
  • Steven Busic
  • Steve Conner
  • Steve Jones
  • Steve Ward
  • Sulaiman
  • Thomas Coyle
  • Thomas A. Wallace
  • Thomas W
  • Timo
  • Torch
  • Ulf Jonsson
  • vasil
  • Vaxian
  • vladi mazzilli
  • wastehl
  • Weston
  • William Kim
  • William N.
  • William Stehl
  • Wesley Venis
The aforementioned have contributed financially to the continuing triumph of 4hv.org. They are deserving of my most heartfelt thanks.
Forums
4hv.org :: Forums :: Computer Science
« Previous topic | Next topic »   

Electrically Isolated HDD for File Server, and method

Move Thread LAN_403
Hon1nbo
Tue Jul 12 2011, 03:10AM Print
Hon1nbo Registered Member #902 Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Hello all,

I am thinking about putting back up a web based file server for emergency use, but these files are meant to be kept Confidential. On top of the serious encryption I will have, I am also making the HDD of the server which has said files Electrically Isolated from the server until Authentication is done via a secondary method, which involves One Time Passwords (OTPs). This way, even if my server box is rooted the HDD is still inaccessible unless the second server with the OTP authentication restores electrical power to the drive.

Now, the reason I haven't implemented this in the past is that the OTP server must be put online then to authenticate the user, and that would be prone to security issues and make the physical isolation a waste as then that box would be rooted instead.
I thought about an Arduino or other uC based web server to make it less likely that a hack take place due to their extreme simplicity, but if it got DOS'd and restarted then the pins might spike on (and hence activate the switch timer for the HDD)...

And while I thought about using a uC for the web server and another for the actual control of the switch (so if the server went down and spiked then the other uC wouldn't necessarily reset)... However, since security of uC's via web servers is still relatively unknown, I didn't want to have a connection that could possibly work two ways and I wanted the OTP authentication to be independent to save resources and prevent possible electrical attacks by the hardware.

I came up with this method which, while overkill for my purposes, might work very well and be relatively simple. Opto-isolation would be used to make sure that no one can cause the uC to fail in a way that might send out a spike on the sensitive logic pins and prevent HV probing, as this uC will be encased in epoxy)

Here is the run through: 1) HDD is electrically severed from file server, making it impossible to access even with root account. 2) user connects to uC with web server to provide OTP 3) uC web server sends OTP to second uC via optoisolators to prevent probing the uC for my secret key should physical access occur. 4) second uC verifies OTP ,and will activate timed relay to HDD to allow mounting on the server 5) relay will deactivate on a timer or manually if triggered by either web server

Anyone got any comments on this?
The only weakness here that I can see is physical theft of the drive (which would be in a heavily monitored datacenter and under layers of encryption), or not checking for breaches to the server before opening the drive's connection.
It may be a little bit complicated with the optoisolators, but it is to protect my Secret Keys for my OTP generation by being able to encase the entire drive in epoxy preventing electrical connections that might dump the code.

-Jimmy

P.S: here is a block diagram:


1310440217 902 FT0 Electrically Isolated Dataserver Jpeg
Back to top
Carbon_Rod
Tue Jul 12 2011, 08:09AM
Carbon_Rod Registered Member #65 Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.

Even better security:
Link2

=)
Back to top
Hon1nbo
Tue Jul 12 2011, 02:02PM
Hon1nbo Registered Member #902 Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Carbon_Rod wrote ...

I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.

Even better security:
Link2

=)

I have encryption on the drive array, the optical would be to protect my micro-controller from having the code, which has my OTP generator keys, from being dumped.
By using optical isolation, an attacker would have no usable electrical channels to the chip, which would be encased in epoxy.

-Jimmy
Back to top
Nicko
Tue Jul 12 2011, 02:10PM
Nicko Registered Member #1334 Joined: Tue Feb 19 2008, 04:37PM
Location: Nr. London, UK
Posts: 615
Carbon_Rod wrote ...

I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.

Even better security:
Link2

=)
Not original at all. Bruce Schneier, in his seminal text "Applied Cryptography", refers to the use of physical brute force as "Rubber Hose Cryptanalysis". Its not only cheaper, its generally far faster...

Link2

You are far better of using some form of deniable encryption, such as that employed by TrueCrypt and others. Then, if implemented correctly, you cannot differentiate between a disk that is just unformatted rubbish, and encrypted data. If the attacker knows there is something there, then they can go after it. If its not possible to state with any certainty at all that there is encrypted data there, then the whole nature of the "discussion" changes...
Back to top
Hon1nbo
Tue Jul 12 2011, 03:01PM
Hon1nbo Registered Member #902 Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Nicko wrote ...

Carbon_Rod wrote ...

I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.

Even better security:
Link2

=)
Not original at all. Bruce Schneier, in his seminal text "Applied Cryptography", refers to the use of physical brute force as "Rubber Hose Cryptanalysis". Its not only cheaper, its generally far faster...

Link2

You are far better of using some form of deniable encryption, such as that employed by TrueCrypt and others. Then, if implemented correctly, you cannot differentiate between a disk that is just unformatted rubbish, and encrypted data. If the attacker knows there is something there, then they can go after it. If its not possible to state with any certainty at all that there is encrypted data there, then the whole nature of the "discussion" changes...


The physical attack would assume someone has access to the datacenter and my rack there, which is unlikely but possible - it would just be nice to not worry about that. If the drive were physically removed, I would know about it and the datacenter logs every last person in and out and what they had with them (you can't even bring in a computer assembled, it must be disassembled for inspection of what's inside).
,
The data will be encrypted as I stated originally, but if someone rooted my box I would still not like having an entire drive with nothing but apparently garbage data visible to an attacker! - the box will be a server for my business as well, but there is clearly another server there that just appears to have nothing on it. (one physical unit, but I'm giving one CPU to each server of the two Xeons inside)

I know how to setup deniability etc, but I am still concerned about someone being able to steal a copy of it and try to get it offline. I may not have much for many attackers, but running a business server which is at risk, then there being a second data storage server on the same machine with no apparent web use, might appear lead the attacker to think he has found customer data, business records, etc.

-Jimmy
Back to top

Moderator(s): Chris Russell, Noelle, Alex, Tesladownunder, Dave Marshall, Dave Billington, Bjørn, Steve Conner, Wolfram, Kizmo, Mads Barnkob

Go to:

Powered by e107 Forum System
 
Legal Information
This site is powered by e107, which is released under the GNU GPL License. All work on this site, except where otherwise noted, is licensed under a Creative Commons Attribution-ShareAlike 2.5 License. By submitting any information to this site, you agree that anything submitted will be so licensed. Please read our Disclaimer and Policies page for information on your rights and responsibilities regarding this site.