-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cryptsetup Nuke Keys Patch #921
Comments
Modified by marmarek on 11 Nov 2014 02:44 UTC |
Comment by John on 2 Dec 2014 05:53 UTC https://github.com/mbroz/cryptsetup/blob/master/FAQ In short: it fails to increase security to any significant degree. |
Recent discussion about the usefulness of this feature: |
Older thread on the same topic: |
To be effective, this needs to either:
Otherwise it must be assemed that the key can be recovered (at significant expense) by someone with specialized tools and prolonged physical access. |
Reported by anonymous on 9 Nov 2014 21:03 UTC
Feature Request: Cryptsetup Nuke Keys Patch
Upstream Provider: Kali Linux
Kali Linux webpage: kali.org
Nuke Keys Git Repo: https://github.com/offensive-security/cryptsetup-nuke-keys
Arch Linux AUR package: https://aur.archlinux.org/packages/cryptsetup-nuke-keys/
Where: dom0
Purpose: Allows user to erase keyslots using an alternate "nuke" password.
Easier than other erasure methods.
Does not require input of decryption password.
Resistant to user error via overwriting non-keyslot data using alternate erasure methods.
How: User chooses a 'nuke' passphrase.
Upon using nuke passphrase, all keyslots are wiped, rendering drive unusable.
Keyslots can be restored later using keyslot backups.
Note: May require modification from original files to work.
Migrated-From: https://wiki.qubes-os.org/ticket/921
The text was updated successfully, but these errors were encountered: