pgpfan:agevspgp
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:agevspgp [2021/06/10 14:55] – [Data Recovery] Orient the reader up front. b.walzer | pgpfan:agevspgp [2024/08/06 20:53] (current) – [File Substitution] From a HN comment. b.walzer | ||
---|---|---|---|
Line 34: | Line 34: | ||
The issue here is that tar might of had to deal with garbage for input. A potentially more serious issue would be if a malicious entity had enough knowledge of the unencrypted backup to allow them to modify files and/or file locations in a purposeful way. This might be a concern if you store your backups on a server that is not under your control. | The issue here is that tar might of had to deal with garbage for input. A potentially more serious issue would be if a malicious entity had enough knowledge of the unencrypted backup to allow them to modify files and/or file locations in a purposeful way. This might be a concern if you store your backups on a server that is not under your control. | ||
- | Age does an integrity check every 64KB along the encrypted stream. If the integrity check fails then it does not release the bad 64KB chunk and errors out thus truncating the output. This truncation might cause a problem in some cases, but the assumption is that no data is better than bad data. | + | Age does an integrity check every 64KB along the encrypted stream. If the integrity check fails then it does not release the bad 64KB chunk and errors out thus truncating the output. This allows an attacker to terminate your process at any point they choose. The assumption |
The solution to the GnuPG bad data and the age truncated data is the same. Check the integrity of the input file before attempting to do anything with it. I would think this step would be mandatory in a case where there is a possibility that someone might attempt to modify your encrypted file(s). A manual integrity check could be as simple as running GnuPG and dumping the output to see if an error message shows up: | The solution to the GnuPG bad data and the age truncated data is the same. Check the integrity of the input file before attempting to do anything with it. I would think this step would be mandatory in a case where there is a possibility that someone might attempt to modify your encrypted file(s). A manual integrity check could be as simple as running GnuPG and dumping the output to see if an error message shows up: | ||
Line 44: | Line 44: | ||
To be clear, " | To be clear, " | ||
- | Here is what this would look like in practice using the example of a single flipped bit near the start of the encrypted file. First age: | + | Here is what this would look like in practice using the example of a single flipped bit((Please note that the single flipped bit here is not a realistic example and that in practice damage tends to encompass one or more media blocks. Such blocks tend to be multiples of 512 bytes. Often the blocks are entirely missing.)) |
$ age -d -i key.txt -o totc_out.txt totc.txt.age | $ age -d -i key.txt -o totc_out.txt totc.txt.age | ||
Line 83: | Line 83: | ||
At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | At this point you might want to consider how often longer term backups end up with bad sections. Then consider how many attackers exist with sufficient skill, combined with sufficient knowledge of the organization and content of your backups to do reliable changes. Attackers that are willing to have their efforts revealed after the first attempt. This would seem to be where OpenPGP is superior to age. | ||
- | ====Signed Backups==== | + | Another more specific example could be the storage of passwords as is done with [[https:// |
- | Doing backups in this way means that you have to keep the public key secret((There | + | I admit that the previous two examples are contrived. But they are much less contrived than the example of the encrypted tar file. A lesson from application programming |
+ | |||
+ | ====File Substitution==== | ||
+ | |||
+ | Public key encryption has a generic consideration | ||
+ | |||
+ | The traditional fix for this weakness is to cryptographically sign the file ... and, once again, age does not do signatures. An age user would need to go through | ||
+ | |||
+ | The creator of age has suggested that you can just keep the recipient identity (public key) away from the attacker and prevent them from creating a valid ciphertext | ||
+ | |||
+ | >I am confident | ||
+ | |||
+ | ... but provided no explicit argument to that effect. ... and then continued: | ||
+ | |||
+ | >...but it's important not to advertise it as an age-wide property. | ||
+ | |||
+ | In practice the recipient identity key will show up on the command line and/or will be kept in an unencrypted file. So age itself treats it as a potentially public value. | ||
+ | |||
+ | If you and the recipient have the ability to share and keep a secret value secret, why use asymmetrical encryption in the first place? Symmetrical encryption | ||
=====Conclusion===== | =====Conclusion===== |
pgpfan/agevspgp.1623336945.txt.gz · Last modified: 2021/06/10 14:55 by b.walzer