파일시스템
2011.03.17 13:42

Issues with EFS

조회 수 1475 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄 수정 삭제

Issues with EFS

Temporary file is not erased. When EFS encrypts file, it copies its contents into temporary hidden file named Efs0.tmp in the same folder, as encrypting file. Then, it encrypts plain text by blocks and writes encrypted data into original file. After the process is done, temporary file is deleted. The problem is that EFS simply marks it as deleted without actually erasing its contents, which makes possible easy access to unprotected data by low-level data recovery software like Active@ Undelete. Solution - to wipe free disk space. Usually, even if plain text overwritten ones, small magnetic traces remain detectible, thus giving a chance to read erased data with proper equipment. To minimize this possibility, use commercially available software providing sophisticated data erasing algorithms like Active@ Eraser or ZDelete.NET or wipe unused volume and MFT space with Active@ KillDisk.

File names in encrypted folder are not protected. Actually, encrypting folder contents means automatically applying encryption to all files in the folder, not encrypting directory data itself. Since the file name itself could contain sensitive information, it could be a breach in security. One of the solutions would be using encrypted .zip archives instead of folders, which are treated by Windows XP almost like folders. Thus, only one file is needed to be encrypted and archived data themselves are harder to crack.

EFS security relies on public/private key pair which is stored on local computer. Windows protects all private keys by encrypting them through Protected Storage service. Protected Storage encrypts all private keys with Session Key, derived from 512 bit Master Key, and stores them in %User Profile%Application DataMicrosoftCryptoRSAUser SID. The Master Key is encrypted by Master Key Encryption Key, which is derived from user password by using a Password Based Key Derivation Function and stored in %User Profile%Application DataMicrosoftProtectUser SID. Despite the efforts Windows takes to protect keys, the fact, that all information is stored on local computer, gives an attacker, who's got an access to hard drive, a chance to figure out keys and use them to decrypt protected data. The overall security could be significantly enhanced by encrypting private keys with System Key. The syskey.exe utility can be used to store System Key on a floppy disk and remove it from computer. In this case user must insert a diskette with System Key when computer boots up. Nevertheless, this method should be taken with precautions since if key diskette is lost, there's no way to get access to computer.

?

List of Articles
번호 분류 제목 글쓴이 날짜 조회 수
101 용산본사 하드자재실 file admin 2013.06.20 1154
100 기타 하드디스크란? master 2017.03.14 11663
99 하드디스크 콘트롤러 file admin 2008.11.20 340
98 하드디스크 하드디스크 주요 장애원인 및 복구절차 admin 2011.03.14 5082
97 용산본사 하드디스크 자재 file admin 2013.06.20 533
96 메모리 플래시메모리의 장애원인과 복구절차 admin 2011.03.14 5140
95 메모리 플래시메모리복구 ECC적용효과 file admin 2011.03.16 1560
94 기타 플래시메모리란? master 2017.03.15 4475
93 DIY복구 포맷 후 복구 admin 2013.06.22 2167
92 문서파일 파일의 장애원인과 주의사항 admin 2011.03.14 1829
91 파일시스템 파일시스템의 정의 admin 2011.03.17 1725
90 암호/복호 파일 암호 admin 2011.03.14 1655
89 용산본사 클린작업장 file admin 2013.06.20 1312
88 PC관리 컴퓨터 수리 필수 상식! master 2017.02.01 263
87 기타 이메일이란? master 2017.03.14 2103
86 오라클 오라클(Oracle) 11g R2 데이타베이스 복구 master 2017.03.28 901
85 핸드폰 액정파손, 핵심 지식! master 2017.02.01 2057
84 데이타관리 안전한 데이타관리 방법 admin 2013.06.13 1699
83 용산본사 상담데스크 file admin 2013.06.20 1167
82 용산본사 보안작업실 file admin 2013.06.20 1099
Board Pagination Prev 1 2 3 4 5 6 Next
/ 6