Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
apropos man
Sep 5, 2016

You get a hundred and forty one thousand years and you're out in eight!

Klyith posted:

This was my favorite part:

<several chortles>
<belly-laugh>

~ laptop.

Bravo!

Adbot
ADBOT LOVES YOU

Antillie
Mar 14, 2015

EssOEss posted:

I run software BitLocker on all my mobile computers and I have never felt any performance degradation. Sure copying 50 GB of files might take a bit longer but that is not even remotely part of my daily workload. With an SSD you're not really waiting behind I/O as much as you are waiting behind poorly designed synchronous software that can only do 1 thing at a time.

Bitlocker totally off loads all crypto work to hardware acceleration when an SSD with said acceleration is detected. So people using bitlocker with an SSD that has a broken encryption implementation are getting effectively zero security and would never know it.

Some of the performance difference comes down the mode of cipher operation. CBC for example cannot be multi threaded when encrypting but can be multi threaded when decrypting. GCM can be done multi threaded when both encrypting and decrypting.

Antillie fucked around with this message at 15:29 on Nov 7, 2018

The Fool
Oct 16, 2003



This is good stuff

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Theris posted:

What are you considering an "average CPU" here? Software Bitlocker on my 950 Pro (thanks for never actually enabling eDrive like you said you would, Samsung :v:) with a 6700k has zero performance impact in disk benchmarks and CPU usage low enough that it more or less blends into the background noise of how much CPU gets used when hitting a disk hard anyway.

I was testing on a 6th gen i5 quad core mobile and whatever mid-range rebrand SSD Dell ships these days. A single IO heavy thread (think steam doing an update) was enough to saturate one of the cores and bottleneck IO. Running a db synthetic load (4 thread, random IO, queue depth 8) took all 4 cores to 100% which bottlenecked IO and the disk had plenty more to give

e: XTS mode, 128 and 256bit both gave effectively the same results

BangersInMyKnickers fucked around with this message at 19:11 on Nov 7, 2018

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Antillie posted:

Bitlocker totally off loads all crypto work to hardware acceleration when an SSD with said acceleration is detected. So people using bitlocker with an SSD that has a broken encryption implementation are getting effectively zero security and would never know it.

Some of the performance difference comes down the mode of cipher operation. CBC for example cannot be multi threaded when encrypting but can be multi threaded when decrypting. GCM can be done multi threaded when both encrypting and decrypting.
https://twitter.com/msftsecresponse/status/1059877873924755456

Horse Clocks
Dec 14, 2004


How does that work? If a drive has been encrypted with broken hardware, and then you turn on software encryption... isn’t it still broken?

Or will bitlocker slowly reencrypt the drive?

The Fool
Oct 16, 2003


The drive is unlocked, then re-encrypted.

Proteus Jones
Feb 28, 2013



Yeah, you’re basically unencrypting and then turning it back on and making the OS handle things and re-encrypting the drive.

Antillie
Mar 14, 2015

Well at least there is a work around. I wonder how many people will just keep on trucking totally oblivious to the issue.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer
We encrypt every drive, mobile or not, with bitlocker. I feel bad for my helpdesk.

Mr Chips
Jun 27, 2007
Whose arse do I have to blow smoke up to get rid of this baby?
Apart from the low level attack the original researchers used, has anyone come up with an easy way to test from Windows to see if any drive's TCG Opal implementation is broken?

The Fool
Oct 16, 2003


From this tweet: https://twitter.com/MattiasBorg82/status/1060053502267981825

code:
Get-BitLockerVolume | select encryptionmethod,mountpoint,VolumeType
EncryptionMethod will contain the encryption used if software, "Default" if hardware, "None" if un-encrypted.


edit:

Mr Chips posted:

Apart from the low level attack the original researchers used, has anyone come up with an easy way to test from Windows to see if any drive's TCG Opal implementation is broken?

Upon re-reading, I don't think I actually answered your question. The above will tell you if bitlocker is using hardware encryption. At this point in time, I am not aware of an easy way to detect if a given ssd has the vulnerability, so we should assume
all ssd hardware encryption is suspect.

The Fool fucked around with this message at 00:55 on Nov 8, 2018

Mr Chips
Jun 27, 2007
Whose arse do I have to blow smoke up to get rid of this baby?
Edit2:

The Fool posted:

You're too fast, see my edit.



New question edit:
https://imgur.com/a/19ToXVb

If a Samsung Evo 850 can be configured with the ATA Master Password Capability set to Max, it's apparently not vulnerable to the attack methods the researchers use. Is setting that value a BIOS/UEFI config item? RTFMing at the moment but it will take me some time

Mr Chips fucked around with this message at 04:04 on Nov 8, 2018

The Fool
Oct 16, 2003


You're too fast, see my edit.

apropos man
Sep 5, 2016

You get a hundred and forty one thousand years and you're out in eight!
I have about four 850 Evo's, ranging back to about 3 years old for the first one I bought.

Man, it would be loving cool if we could all return them and get replacement 860's.

That's never gonna happen though. It would make a huge dent in Samsung's accounts, considering how many they must've sold.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Mr Chips posted:

Apart from the low level attack the original researchers used, has anyone come up with an easy way to test from Windows to see if any drive's TCG Opal implementation is broken?

they're unaudited black boxes so its best to treat them all as broken at this point until some kind of proper standard and validation program is created

Potato Salad
Oct 23, 2014

nobody cares


adorai posted:

We encrypt every drive, mobile or not, with bitlocker. I feel bad for my helpdesk.

Not necessarily too hard to fix, if you have sccm or some other tool that can turn bde off and on after you update your GPO

Otherwise, wolololo :smithicide:


Edit: Heck, you can even set up a Desired State Config pull or push server really drat quick following tutorials on YouTube. Or even just an arbitrary script host permitted to access your fleet via winrm that slowly churns though a big powershell background job.

You can MacGuyver a halfway decent tool to help you out here if you've got thousands of machines is what I'm saying.

Potato Salad fucked around with this message at 19:23 on Nov 8, 2018

Potato Salad
Oct 23, 2014

nobody cares


In an unrelated note,

The Infosec Thread: The Fault in Our JARs

AlternateAccount
Apr 25, 2005
FYGM
Enjoying that we have hundreds of 840s and 850s in production with BitLocker and I've heard jack nor poo poo from our CISO on this.

astral
Apr 26, 2004

Don't you have to go out of your way to enable the hardware encryption on Samsung SSDs, anyway? If you/they didn't take the time to enable it, Bitlocker just uses software encryption.

And afaik even if it is enabled on the drive, if you chose a cipher/strength via group policy that the drive doesn't natively support, Bitlocker uses software encryption.

Diva Cupcake
Aug 15, 2005

astral posted:

Don't you have to go out of your way to enable the hardware encryption on Samsung SSDs, anyway? If you/they didn't take the time to enable it, Bitlocker just uses software encryption.

And afaik even if it is enabled on the drive, if you chose a cipher/strength via group policy that the drive doesn't natively support, Bitlocker uses software encryption.

Yes. We have roughly 300 EVO 850s in the environment and none are vulnerable. The encryption process done during imaging (Lenovo firmware) defaults to software encryption.

Pretty sure you have explicitly enable hardware encryption via Samsung Magician and then do a full re-install.

Proteus Jones
Feb 28, 2013



astral posted:

Don't you have to go out of your way to enable the hardware encryption on Samsung SSDs, anyway? If you/they didn't take the time to enable it, Bitlocker just uses software encryption.

And afaik even if it is enabled on the drive, if you chose a cipher/strength via group policy that the drive doesn't natively support, Bitlocker uses software encryption.

Bitlocker will automatically use drive HW encryption unless you specify otherwise via GP or during bitlocker setup on the computer.

astral
Apr 26, 2004

Proteus Jones posted:

Bitlocker will automatically use drive HW encryption unless you specify otherwise via GP or during bitlocker setup on the computer.

Right, and the Samsung drive itself doesn't offer the HW encryption unless you go through a process (described by Diva Cupcake) to enable that.

Proteus Jones
Feb 28, 2013



astral posted:

Right, and the Samsung drive itself doesn't offer the HW encryption unless you go through a process (described by Diva Cupcake) to enable that.

Ah, I see. I misunderstood, thanks.

Diva Cupcake
Aug 15, 2005

Here is that process:
https://www.itsupportguides.com/knowledge-base/tech-tips-tricks/how-to-enable-disk-encryption-on-samsung-evo-ssd-hard-drive/

What Astral said. It's a big pain in the rear end that I can't imagine too many enterprises have gone through just for a mild performance increase.

AlternateAccount
Apr 25, 2005
FYGM

astral posted:

Right, and the Samsung drive itself doesn't offer the HW encryption unless you go through a process (described by Diva Cupcake) to enable that.

That's a pretty big fuckin' relief.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

Potato Salad posted:

Not necessarily too hard to fix, if you have sccm or some other tool that can turn bde off and on after you update your GPO

Otherwise, wolololo :smithicide:


Edit: Heck, you can even set up a Desired State Config pull or push server really drat quick following tutorials on YouTube. Or even just an arbitrary script host permitted to access your fleet via winrm that slowly churns though a big powershell background job.

You can MacGuyver a halfway decent tool to help you out here if you've got thousands of machines is what I'm saying.
We already made the GPO change, that was the easy part. Don't you have to follow that up with a decrypt / reencrypt of all the drives? We do have over 1000 machines so if that is the case, we will definitely be trying to script it.

Potato Salad
Oct 23, 2014

nobody cares


You need to:
-totally turn bitlocker OFF, not just disabled

-wait for decryption to complete

-re-ecnrypt

Mustache Ride
Sep 11, 2001



Who wants good new for your favorite Math based security tool?

apropos man
Sep 5, 2016

You get a hundred and forty one thousand years and you're out in eight!

Potato Salad posted:

You need to:
-totally turn bitlocker OFF, not just disabled

-wait for decryption to complete

-re-ecnrypt

During which time, Windows restarts to apply an update to fix the Bitlocker problem, and you're left with half-disk encryption!

The Iron Rose
May 12, 2012

:minnie: Cat Army :minnie:

Hey maybe they'll make their cloud offering not poo poo now :lol:

Good software but managing that thing was awful and the client was hilariously bad on macs.

Thanks Ants
May 21, 2004

#essereFerrari


Wow, Crackberry is still going

Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop
The samsung attack is clear, but getting the drive into the vulnerable state is not so much.

* Enable encryption with the MPC bit set to HIGH.
* Drive creates a configuration table with a password validation hash and an unrelated randomly-generated DEK.
* Set the MPC bit to MAXIMUM
* Drive writes a new configuration table with the previous DEK encrypted by a key derived from the password, and stores it to disk.
* The old configuration is still sitting in the system reserved space, able to be read via forensics, and you can recover the data via a vendor internal command re-instituting the previous configuration then bypassing the password via jtag.

Obviously the fault is on samsung for not supporting writing zeros to partially-used sectors to completely wipe them prior to erase, but why would the OS setup the drive encryption this way? If you're going to be using maximum master password capability, do it from the outset.

In that setup, the DEK is always encrypted with a password.

Daman
Oct 28, 2011
bitlocker doesn't even default to hw encryption for any ssds I've seen, including my 850 evo running in transparent mode.

Catatron Prime
Aug 23, 2010

IT ME



Toilet Rascal
One of my co-workers recommended the bandit series from over the wire, so I just wanted to pass it along here if anyone is looking for a good refresher or introduction to *nix command line and whatnot.


That is all... :ninja:

my cat is norris
Mar 11, 2010

#onecallcat

I guess this question is semi-related to InfoSec...

Anyone have a go-to tool for data recovery? Like, is there anything that'll recover from a formatted SSD, or am I pretty boned? ETA I do not know what kind of formatting was performed.

my cat is norris fucked around with this message at 20:32 on Nov 13, 2018

AlternateAccount
Apr 25, 2005
FYGM

my cat is norris posted:

I guess this question is semi-related to InfoSec...

Anyone have a go-to tool for data recovery? Like, is there anything that'll recover from a formatted SSD, or am I pretty boned? ETA I do not know what kind of formatting was performed.

Never done it on an SSD, but GetDataBack has saved me a few times. Free trial will at least show you what it can get.

If the drive was just quick formatted, then the blocks were marked empty, but the data is still there.

Potato Salad
Oct 23, 2014

nobody cares


apropos man posted:

During which time, Windows restarts to apply an update to fix the Bitlocker problem, and you're left with half-disk encryption!

If the bde vbs that ships with mdt is used it can be pretty resilient

apropos man
Sep 5, 2016

You get a hundred and forty one thousand years and you're out in eight!
I was flippantly joking.

Adbot
ADBOT LOVES YOU

Potato Salad
Oct 23, 2014

nobody cares


i claim immunity under Poe's Law, forgive me my sins

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply