파일시스템
2011.03.17 13:42

Issues with EFS

조회 수 1475 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제

Issues with EFS

Temporary file is not erased. When EFS encrypts file, it copies its contents into temporary hidden file named Efs0.tmp in the same folder, as encrypting file. Then, it encrypts plain text by blocks and writes encrypted data into original file. After the process is done, temporary file is deleted. The problem is that EFS simply marks it as deleted without actually erasing its contents, which makes possible easy access to unprotected data by low-level data recovery software like Active@ Undelete. Solution - to wipe free disk space. Usually, even if plain text overwritten ones, small magnetic traces remain detectible, thus giving a chance to read erased data with proper equipment. To minimize this possibility, use commercially available software providing sophisticated data erasing algorithms like Active@ Eraser or ZDelete.NET or wipe unused volume and MFT space with Active@ KillDisk.

File names in encrypted folder are not protected. Actually, encrypting folder contents means automatically applying encryption to all files in the folder, not encrypting directory data itself. Since the file name itself could contain sensitive information, it could be a breach in security. One of the solutions would be using encrypted .zip archives instead of folders, which are treated by Windows XP almost like folders. Thus, only one file is needed to be encrypted and archived data themselves are harder to crack.

EFS security relies on public/private key pair which is stored on local computer. Windows protects all private keys by encrypting them through Protected Storage service. Protected Storage encrypts all private keys with Session Key, derived from 512 bit Master Key, and stores them in %User Profile%Application DataMicrosoftCryptoRSAUser SID. The Master Key is encrypted by Master Key Encryption Key, which is derived from user password by using a Password Based Key Derivation Function and stored in %User Profile%Application DataMicrosoftProtectUser SID. Despite the efforts Windows takes to protect keys, the fact, that all information is stored on local computer, gives an attacker, who's got an access to hard drive, a chance to figure out keys and use them to decrypt protected data. The overall security could be significantly enhanced by encrypting private keys with System Key. The syskey.exe utility can be used to store System Key on a floppy disk and remove it from computer. In this case user must insert a diskette with System Key when computer boots up. Nevertheless, this method should be taken with precautions since if key diskette is lost, there's no way to get access to computer.

?

List of Articles
번호 분류 제목 글쓴이 날짜 조회 수
41 파일시스템 NTFS 파티션 부트섹터 admin 2011.03.17 2074
40 파일시스템 NTFS 시스템 파일 admin 2011.03.17 1560
39 파일시스템 NTFS 기초 admin 2011.03.17 1087
38 파일시스템 NTFS vs FAT admin 2011.03.17 4183
37 파일시스템 NTFS Sparse Files (NTFS5 only) admin 2011.03.17 1659
36 파일시스템 NTFS Optimization admin 2011.03.17 9389
35 파일시스템 NTFS Multiple Data Streams admin 2011.03.17 1389
34 파일시스템 NTFS MFT 분석 admin 2011.03.17 1434
33 파일시스템 NTFS Compressed Files admin 2011.03.17 1482
32 파일시스템 NTFS 파일속성 admin 2011.03.17 1313
31 기타 newsletter-2017-04-17 file master 2017.04.17 118
30 NAS란? master 2017.03.20 2048
29 SQL서버 MSSQL Server 2008 R2 테이블 삭제(Drop Table) 복구 master 2017.03.28 1783
28 하드디스크 motor controller file admin 2008.11.20 490
27 motor file admin 2008.11.20 219
26 하드디스크 MHT2040AT file admin 2008.11.27 421
25 PC관리 MALWARE MAINTENANCE admin 2013.06.29 365524
24 PC관리 Maintaining your System admin 2013.06.29 1582
» 파일시스템 Issues with EFS admin 2011.03.17 1475
22 하드디스크 IC35L060AVV207 file admin 2008.11.27 410
Board Pagination Prev 1 2 3 4 5 6 Next
/ 6