파일시스템
2011.03.17 13:42

Issues with EFS

조회 수 1473 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제

Issues with EFS

Temporary file is not erased. When EFS encrypts file, it copies its contents into temporary hidden file named Efs0.tmp in the same folder, as encrypting file. Then, it encrypts plain text by blocks and writes encrypted data into original file. After the process is done, temporary file is deleted. The problem is that EFS simply marks it as deleted without actually erasing its contents, which makes possible easy access to unprotected data by low-level data recovery software like Active@ Undelete. Solution - to wipe free disk space. Usually, even if plain text overwritten ones, small magnetic traces remain detectible, thus giving a chance to read erased data with proper equipment. To minimize this possibility, use commercially available software providing sophisticated data erasing algorithms like Active@ Eraser or ZDelete.NET or wipe unused volume and MFT space with Active@ KillDisk.

File names in encrypted folder are not protected. Actually, encrypting folder contents means automatically applying encryption to all files in the folder, not encrypting directory data itself. Since the file name itself could contain sensitive information, it could be a breach in security. One of the solutions would be using encrypted .zip archives instead of folders, which are treated by Windows XP almost like folders. Thus, only one file is needed to be encrypted and archived data themselves are harder to crack.

EFS security relies on public/private key pair which is stored on local computer. Windows protects all private keys by encrypting them through Protected Storage service. Protected Storage encrypts all private keys with Session Key, derived from 512 bit Master Key, and stores them in %User Profile%Application DataMicrosoftCryptoRSAUser SID. The Master Key is encrypted by Master Key Encryption Key, which is derived from user password by using a Password Based Key Derivation Function and stored in %User Profile%Application DataMicrosoftProtectUser SID. Despite the efforts Windows takes to protect keys, the fact, that all information is stored on local computer, gives an attacker, who's got an access to hard drive, a chance to figure out keys and use them to decrypt protected data. The overall security could be significantly enhanced by encrypting private keys with System Key. The syskey.exe utility can be used to store System Key on a floppy disk and remove it from computer. In this case user must insert a diskette with System Key when computer boots up. Nevertheless, this method should be taken with precautions since if key diskette is lost, there's no way to get access to computer.

?

List of Articles
번호 분류 제목 글쓴이 날짜 조회 수
67 서버/레이드 RAID 1E admin 2011.03.30 1809
66 포렌식 Digital Forensic 의 정의 admin 2011.03.19 102386
65 파일시스템 hfs+ 개요 admin 2011.03.19 172813
64 파일시스템 ext2 개요 admin 2011.03.19 6030
63 파일시스템 EXT3 개요 admin 2011.03.19 2548
62 파일시스템 파일시스템의 정의 admin 2011.03.17 1723
61 파일시스템 NTFS Optimization admin 2011.03.17 9386
60 파일시스템 NTFS vs FAT admin 2011.03.17 4181
59 파일시스템 Data Integrity and Recoverability with NTFS admin 2011.03.17 1487
58 파일시스템 NTFS Sparse Files (NTFS5 only) admin 2011.03.17 1655
» 파일시스템 Issues with EFS admin 2011.03.17 1473
56 파일시스템 $EFS Attribute admin 2011.03.17 1513
55 파일시스템 EFS Internals admin 2011.03.17 112603
54 파일시스템 Using EFS admin 2011.03.17 1536
53 파일시스템 EFS - Encrypting File System admin 2011.03.17 1560
52 파일시스템 NTFS Compressed Files admin 2011.03.17 1478
51 파일시스템 NTFS Multiple Data Streams admin 2011.03.17 1387
50 파일시스템 NTFS 시스템 파일 admin 2011.03.17 1558
49 파일시스템 NTFS 파일속성 admin 2011.03.17 1311
48 파일시스템 NTFS MFT 분석 admin 2011.03.17 1432
Board Pagination Prev 1 2 3 4 5 6 Next
/ 6