PDA

View Full Version : [ubuntu] Keystroke encryption



shad0w_crash
March 23rd, 2009, 04:48 PM
Heey,

I'm looking for a tool, package for keystroke encryptions. On windows I did use Bluegem, because it's closed source i don't know if it did really encrypted the keystrokes but it sounds usefull.

Is there an alternative for Bluegem, keystroke encryption on Ubuntu?

Is it an alternative to make lots of calculations (perl script oid) to fill my RAM with? My aim is to make it impossible for a forensic or a hacker using forensic toolkits to extract my truecrypt password (or other passwords) out of my RAM.

Lisa Y
March 23rd, 2009, 05:14 PM
Hi there,

Try this site

http://www.rootkit.nl/projects/rootkit_hunter.html

That might be of some help to you.

shad0w_crash
March 23rd, 2009, 05:39 PM
Thanks for the repley, but this is not where i'm looking for. I'm allready running OSSEC (file integrity scanner). And rkhunter to check for rootkits (and double check ossec, but what if rkhunter is rootkitted;)?.

I'm looking for defense against the following situation:

I forgot my laptop somebody quickly inserts an liveCD and makes a full copy of my RAM memory. Passwords are all unencrypted in the RAM. Bluegem claims to have protection against that type of attack by encrypting the keystrokes.

hyper_ch
March 23rd, 2009, 06:33 PM
I don't think there's any protection against cold boot attacks.

shad0w_crash
March 23rd, 2009, 08:01 PM
Now but it isn't a cold boot attack, it's encrypting the trafic from your keyboard to you RAM.

hyper_ch
March 23rd, 2009, 08:26 PM
reading out ram for encryption keys --> cold boot attack

Tubes6al4v
March 24th, 2009, 08:29 AM
I am pretty sure everything on RAM has to be decrypted to be used for processing. There are two ways I can think of to prevent RAM attacks,
1) Build some kind of barrier around it so it cannot be frozen. You'll probably need some cool cooling setup.
2) Write some scripts to fill your RAM with random bits. This would take a while I think, but you may be able to have it target the most recently used sectors first, then work back.

Just some thoughts...

shad0w_crash
March 24th, 2009, 11:03 AM
Yes I was also thinkin on that, Of course you got a risk that your secret information is in your swap file.

But if you mounth your truecrypt volume and then run the script the password i typed is gone out of ram.

hyper_ch
March 24th, 2009, 01:43 PM
But if you mounth your truecrypt volume and then run the script the password i typed is gone out of ram.

Are you sure of that? I think that won't work.

shad0w_crash
March 24th, 2009, 02:46 PM
No I'm not 100% sure,
But when you type your password it's in your RAM for sure. I don't know how truecrypt works or Amsn or other applications but i guess they set a flag or create a session when you logged in.

If you make a memory dump you'll get a whole bunch of information. wich is allowed to get overwriten because it's not used anymore. If you overwrite the allowed possitions with just say the letter 'a' there's nothing you can find.

Next saturday if've time to do some testing. This will be my test case:

Entering a string in gedit.
Dumping memory of the specified program and try searching my string.
Trying a perl script to search for prime numbers (ore some like) at least enough to use 756MB of RAM.
Dumping the memory again and search on the string.

Maby proces memory locations can't be overwritten i don't know yet how the Ubuntu architecture works. But maby it'll work fine.

Anyone having suggestions?

hyper_ch
March 24th, 2009, 07:26 PM
IMHO they key stays clear in memory as tc and dm-crypt do on-the-fly en/decryption.

Tubes6al4v
March 25th, 2009, 06:39 AM
I think hyper is right. Your processer needs the key to decrypt your data. It is always encrypted on the drive, so you need it as long as you are looking at the drive.

As for SWAP, that should be encrypted as well.

shad0w_crash
March 25th, 2009, 09:46 AM
I think he's right to for the fact TC needs the encryption key. But i could still test if the RAM could be cleared after the program is quited isn't?

hyper_ch
March 25th, 2009, 07:51 PM
you can check that :)