If you need assistance, please send an email to forum at 4hv dot org. To ensure your email is not marked as spam, please include the phrase "4hv help" in the subject line. You can also find assistance via IRC, at irc.shadowworld.net, room #hvcomm.
Support 4hv.org!
Donate:
4hv.org is hosted on a dedicated server. Unfortunately, this server costs and we rely on the help of site members to keep 4hv.org running. Please consider donating. We will place your name on the thanks list and you'll be helping to keep 4hv.org alive and free for everyone. Members whose names appear in red bold have donated recently. Green bold denotes those who have recently donated to keep the server carbon neutral.
Special Thanks To:
Aaron Holmes
Aaron Wheeler
Adam Horden
Alan Scrimgeour
Andre
Andrew Haynes
Anonymous000
asabase
Austin Weil
barney
Barry
Bert Hickman
Bill Kukowski
Blitzorn
Brandon Paradelas
Bruce Bowling
BubeeMike
Byong Park
Cesiumsponge
Chris F.
Chris Hooper
Corey Worthington
Derek Woodroffe
Dalus
Dan Strother
Daniel Davis
Daniel Uhrenholt
datasheetarchive
Dave Billington
Dave Marshall
David F.
Dennis Rogers
drelectrix
Dr. John Gudenas
Dr. Spark
E.TexasTesla
eastvoltresearch
Eirik Taylor
Erik Dyakov
Erlend^SE
Finn Hammer
Firebug24k
GalliumMan
Gary Peterson
George Slade
GhostNull
Gordon Mcknight
Graham Armitage
Grant
GreySoul
Henry H
IamSmooth
In memory of Leo Powning
Jacob Cash
James Howells
James Pawson
Jeff Greenfield
Jeff Thomas
Jesse Frost
Jim Mitchell
jlr134
Joe Mastroianni
John Forcina
John Oberg
John Willcutt
Jon Newcomb
klugesmith
Leslie Wright
Lutz Hoffman
Mads Barnkob
Martin King
Mats Karlsson
Matt Gibson
Matthew Guidry
mbd
Michael D'Angelo
Mikkel
mileswaldron
mister_rf
Neil Foster
Nick de Smith
Nick Soroka
nicklenorp
Nik
Norman Stanley
Patrick Coleman
Paul Brodie
Paul Jordan
Paul Montgomery
Ped
Peter Krogen
Peter Terren
PhilGood
Richard Feldman
Robert Bush
Royce Bailey
Scott Fusare
Scott Newman
smiffy
Stella
Steven Busic
Steve Conner
Steve Jones
Steve Ward
Sulaiman
Thomas Coyle
Thomas A. Wallace
Thomas W
Timo
Torch
Ulf Jonsson
vasil
Vaxian
vladi mazzilli
wastehl
Weston
William Kim
William N.
William Stehl
Wesley Venis
The aforementioned have contributed financially to the continuing triumph of 4hv.org. They are deserving of my most heartfelt thanks.
Registered Member #902
Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Hello all,
I am thinking about putting back up a web based file server for emergency use, but these files are meant to be kept Confidential. On top of the serious encryption I will have, I am also making the HDD of the server which has said files Electrically Isolated from the server until Authentication is done via a secondary method, which involves One Time Passwords (OTPs). This way, even if my server box is rooted the HDD is still inaccessible unless the second server with the OTP authentication restores electrical power to the drive.
Now, the reason I haven't implemented this in the past is that the OTP server must be put online then to authenticate the user, and that would be prone to security issues and make the physical isolation a waste as then that box would be rooted instead. I thought about an Arduino or other uC based web server to make it less likely that a hack take place due to their extreme simplicity, but if it got DOS'd and restarted then the pins might spike on (and hence activate the switch timer for the HDD)...
And while I thought about using a uC for the web server and another for the actual control of the switch (so if the server went down and spiked then the other uC wouldn't necessarily reset)... However, since security of uC's via web servers is still relatively unknown, I didn't want to have a connection that could possibly work two ways and I wanted the OTP authentication to be independent to save resources and prevent possible electrical attacks by the hardware.
I came up with this method which, while overkill for my purposes, might work very well and be relatively simple. Opto-isolation would be used to make sure that no one can cause the uC to fail in a way that might send out a spike on the sensitive logic pins and prevent HV probing, as this uC will be encased in epoxy)
Here is the run through: 1) HDD is electrically severed from file server, making it impossible to access even with root account. 2) user connects to uC with web server to provide OTP 3) uC web server sends OTP to second uC via optoisolators to prevent probing the uC for my secret key should physical access occur. 4) second uC verifies OTP ,and will activate timed relay to HDD to allow mounting on the server 5) relay will deactivate on a timer or manually if triggered by either web server
Anyone got any comments on this? The only weakness here that I can see is physical theft of the drive (which would be in a heavily monitored datacenter and under layers of encryption), or not checking for breaches to the server before opening the drive's connection. It may be a little bit complicated with the optoisolators, but it is to protect my Secret Keys for my OTP generation by being able to encase the entire drive in epoxy preventing electrical connections that might dump the code.
Registered Member #65
Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.
Registered Member #902
Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Carbon_Rod wrote ...
I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.
Even better security:
=)
I have encryption on the drive array, the optical would be to protect my micro-controller from having the code, which has my OTP generator keys, from being dumped. By using optical isolation, an attacker would have no usable electrical channels to the chip, which would be encased in epoxy.
Registered Member #1334
Joined: Tue Feb 19 2008, 04:37PM
Location: Nr. London, UK
Posts: 615
Carbon_Rod wrote ...
I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.
Even better security:
=)
Not original at all. Bruce Schneier, in his seminal text "Applied Cryptography", refers to the use of physical brute force as "Rubber Hose Cryptanalysis". Its not only cheaper, its generally far faster...
You are far better of using some form of deniable encryption, such as that employed by TrueCrypt and others. Then, if implemented correctly, you cannot differentiate between a disk that is just unformatted rubbish, and encrypted data. If the attacker knows there is something there, then they can go after it. If its not possible to state with any certainty at all that there is encrypted data there, then the whole nature of the "discussion" changes...
Registered Member #902
Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
Nicko wrote ...
Carbon_Rod wrote ...
I am not sure why you chose the optical interface, but there are existing tamper resistant enclosures that have specially designed RAID cards with very strong transparent "volatile" encryption on-chip.
Even better security:
=)
Not original at all. Bruce Schneier, in his seminal text "Applied Cryptography", refers to the use of physical brute force as "Rubber Hose Cryptanalysis". Its not only cheaper, its generally far faster...
You are far better of using some form of deniable encryption, such as that employed by TrueCrypt and others. Then, if implemented correctly, you cannot differentiate between a disk that is just unformatted rubbish, and encrypted data. If the attacker knows there is something there, then they can go after it. If its not possible to state with any certainty at all that there is encrypted data there, then the whole nature of the "discussion" changes...
The physical attack would assume someone has access to the datacenter and my rack there, which is unlikely but possible - it would just be nice to not worry about that. If the drive were physically removed, I would know about it and the datacenter logs every last person in and out and what they had with them (you can't even bring in a computer assembled, it must be disassembled for inspection of what's inside). , The data will be encrypted as I stated originally, but if someone rooted my box I would still not like having an entire drive with nothing but apparently garbage data visible to an attacker! - the box will be a server for my business as well, but there is clearly another server there that just appears to have nothing on it. (one physical unit, but I'm giving one CPU to each server of the two Xeons inside)
I know how to setup deniability etc, but I am still concerned about someone being able to steal a copy of it and try to get it offline. I may not have much for many attackers, but running a business server which is at risk, then there being a second data storage server on the same machine with no apparent web use, might appear lead the attacker to think he has found customer data, business records, etc.
This site is powered by e107, which is released under the GNU GPL License. All work on this site, except where otherwise noted, is licensed under a Creative Commons Attribution-ShareAlike 2.5 License. By submitting any information to this site, you agree that anything submitted will be so licensed. Please read our Disclaimer and Policies page for information on your rights and responsibilities regarding this site.