파일시스템
2011.03.17 13:42

Issues with EFS

조회 수 1475 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제

Issues with EFS

Temporary file is not erased. When EFS encrypts file, it copies its contents into temporary hidden file named Efs0.tmp in the same folder, as encrypting file. Then, it encrypts plain text by blocks and writes encrypted data into original file. After the process is done, temporary file is deleted. The problem is that EFS simply marks it as deleted without actually erasing its contents, which makes possible easy access to unprotected data by low-level data recovery software like Active@ Undelete. Solution - to wipe free disk space. Usually, even if plain text overwritten ones, small magnetic traces remain detectible, thus giving a chance to read erased data with proper equipment. To minimize this possibility, use commercially available software providing sophisticated data erasing algorithms like Active@ Eraser or ZDelete.NET or wipe unused volume and MFT space with Active@ KillDisk.

File names in encrypted folder are not protected. Actually, encrypting folder contents means automatically applying encryption to all files in the folder, not encrypting directory data itself. Since the file name itself could contain sensitive information, it could be a breach in security. One of the solutions would be using encrypted .zip archives instead of folders, which are treated by Windows XP almost like folders. Thus, only one file is needed to be encrypted and archived data themselves are harder to crack.

EFS security relies on public/private key pair which is stored on local computer. Windows protects all private keys by encrypting them through Protected Storage service. Protected Storage encrypts all private keys with Session Key, derived from 512 bit Master Key, and stores them in %User Profile%Application DataMicrosoftCryptoRSAUser SID. The Master Key is encrypted by Master Key Encryption Key, which is derived from user password by using a Password Based Key Derivation Function and stored in %User Profile%Application DataMicrosoftProtectUser SID. Despite the efforts Windows takes to protect keys, the fact, that all information is stored on local computer, gives an attacker, who's got an access to hard drive, a chance to figure out keys and use them to decrypt protected data. The overall security could be significantly enhanced by encrypting private keys with System Key. The syskey.exe utility can be used to store System Key on a floppy disk and remove it from computer. In this case user must insert a diskette with System Key when computer boots up. Nevertheless, this method should be taken with precautions since if key diskette is lost, there's no way to get access to computer.

?

List of Articles
번호 분류 제목 글쓴이 날짜 조회 수
67 용산본사 클린작업장 file admin 2013.06.20 1312
66 용산본사 상담데스크 file admin 2013.06.20 1167
65 용산본사 보안작업실 file admin 2013.06.20 1099
64 용산본사 하드자재실 file admin 2013.06.20 1154
63 용산본사 하드디스크 자재 file admin 2013.06.20 533
62 데이타관리 안전한 데이타관리 방법 admin 2013.06.13 1699
61 메모리 낸드 플래시 서비스 가능 메모리 admin 2013.06.07 2529
60 파일시스템 EXFAT 개요 admin 2011.09.26 2365
59 서버/레이드 RAID 1E admin 2011.03.30 1811
58 포렌식 Digital Forensic 의 정의 admin 2011.03.19 102466
57 파일시스템 hfs+ 개요 admin 2011.03.19 172949
56 파일시스템 ext2 개요 admin 2011.03.19 6036
55 파일시스템 EXT3 개요 admin 2011.03.19 2551
54 파일시스템 파일시스템의 정의 admin 2011.03.17 1725
53 파일시스템 NTFS Optimization admin 2011.03.17 9388
52 파일시스템 NTFS vs FAT admin 2011.03.17 4183
51 파일시스템 Data Integrity and Recoverability with NTFS admin 2011.03.17 1489
50 파일시스템 NTFS Sparse Files (NTFS5 only) admin 2011.03.17 1659
» 파일시스템 Issues with EFS admin 2011.03.17 1475
48 파일시스템 $EFS Attribute admin 2011.03.17 1515
Board Pagination Prev 1 2 3 4 5 6 Next
/ 6