pgpfan:agevspgp
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:agevspgp [2021/01/02 20:52] – [Signed Backups] added point b.walzer | pgpfan:agevspgp [2024/08/06 20:53] (current) – [File Substitution] From a HN comment. b.walzer | ||
---|---|---|---|
Line 34: | Line 34: | ||
The issue here is that tar might of had to deal with garbage for input. A potentially more serious issue would be if a malicious entity had enough knowledge of the unencrypted backup to allow them to modify files and/or file locations in a purposeful way. This might be a concern if you store your backups on a server that is not under your control. | The issue here is that tar might of had to deal with garbage for input. A potentially more serious issue would be if a malicious entity had enough knowledge of the unencrypted backup to allow them to modify files and/or file locations in a purposeful way. This might be a concern if you store your backups on a server that is not under your control. | ||
- | Age does an integrity check every 64KB along the encrypted stream. If the integrity check fails then it does not release the bad 64KB chunk and errors out thus truncating the output. This truncation might cause a problem in some cases, but the assumption is that no data is better than bad data. | + | Age does an integrity check every 64KB along the encrypted stream. If the integrity check fails then it does not release the bad 64KB chunk and errors out thus truncating the output. This allows an attacker to terminate your process at any point they choose. The assumption |
The solution to the GnuPG bad data and the age truncated data is the same. Check the integrity of the input file before attempting to do anything with it. I would think this step would be mandatory in a case where there is a possibility that someone might attempt to modify your encrypted file(s). A manual integrity check could be as simple as running GnuPG and dumping the output to see if an error message shows up: | The solution to the GnuPG bad data and the age truncated data is the same. Check the integrity of the input file before attempting to do anything with it. I would think this step would be mandatory in a case where there is a possibility that someone might attempt to modify your encrypted file(s). A manual integrity check could be as simple as running GnuPG and dumping the output to see if an error message shows up: | ||
Line 42: | Line 42: | ||
====Data Recovery==== | ====Data Recovery==== | ||
- | Here is what this would look like in practice using the example of a single flipped bit near the start of the encrypted file. First age: | + | To be clear, " |
+ | |||
+ | Here is what this would look like in practice using the example of a single flipped bit((Please note that the single flipped bit here is not a realistic example and that in practice damage tends to encompass one or more media blocks. Such blocks tend to be multiples of 512 bytes. Often the blocks are entirely missing.)) | ||
$ age -d -i key.txt -o totc_out.txt totc.txt.age | $ age -d -i key.txt -o totc_out.txt totc.txt.age | ||
Line 51: | Line 53: | ||
-rw-r--r-- | -rw-r--r-- | ||
- | Age has returned a zero length file. Those that have spent time maintaining backups for others might be suffering some vicarious anxiety at this point. A single bit error has nerfed the entire backup. | + | Age has returned a zero length file. Those that have spent time maintaining backups for others might be suffering some vicarious anxiety at this point. A single bit error has nerfed the entire backup. |
+ | |||
+ | The published standard for age (([[https:// | ||
+ | |||
+ | It is quite common for media problems to result in the loss of one or more media blocks. Since the 64k chunk used by age is likely going to be larger, an age recovery process would require a search for the start of the next chunk. | ||
Now GnuPG: | Now GnuPG: | ||
Line 73: | Line 79: | ||
... | ... | ||
| | ||
- | So we have lost 5 words out of 800KB of text((GnuPG noticed that I was encrypting text and helpfully compressed it thus eliminating my example. The addition of a "--compress-algo none" | + | So we have lost 5 words out of 800KB of text((GnuPG noticed that I was encrypting text and helpfully compressed it thus eliminating my example. The addition of a '' |
At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | ||
- | ====Signed Backups==== | + | Another more specific example could be the storage of passwords as is done with [[https:// |
- | Doing backups in this way means that you have to keep the public key secret. Otherwise an attacker could replace something like a backup with a completely new file that would pass the integrity check(s). If the public key can not be kept secret then the backup would have to be signed. That would be as simple as adding a " | + | I admit that the previous two examples are contrived. But they are much less contrived than the example of the encrypted tar file. A lesson from application programming is that it is often better |
+ | |||
+ | ====File Substitution==== | ||
+ | |||
+ | Public key encryption has a generic consideration | ||
+ | |||
+ | The traditional fix for this weakness is to cryptographically sign the file ... and, once again, | ||
+ | |||
+ | The creator of age has suggested that you can just keep the recipient identity (public key) away from the attacker | ||
+ | |||
+ | >I am confident the property holds for the X25519 recipients, and that it would hold for a hypothetical Kyber768+X25519 one,... | ||
+ | |||
+ | ... but provided no explicit argument to that effect. ... and then continued: | ||
+ | |||
+ | >...but it's important not to advertise it as an age-wide property. | ||
+ | |||
+ | In practice the recipient identity key will show up on the command line and/or will be kept in an unencrypted file. So age itself treats it as a potentially public value. | ||
+ | |||
+ | If you and the recipient have the ability to share and keep a secret value secret, why use asymmetrical encryption in the first place? Symmetrical encryption | ||
=====Conclusion===== | =====Conclusion===== | ||
Age should be considered where a simple encryption utility is needed that will not under any circumstances release unauthenticated data. Where that behaviour is undesirable, | Age should be considered where a simple encryption utility is needed that will not under any circumstances release unauthenticated data. Where that behaviour is undesirable, | ||
+ | |||
+ | [[pgpfan: | ||
pgpfan/agevspgp.1609620761.txt.gz · Last modified: 2021/01/02 20:52 by b.walzer