LUKS encryption keys are not dumped on suspend/hibernate

Bug #937361 reported by Steven Keys
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Ubuntu
New
Undecided
Unassigned

Bug Description

I have installed Xubuntu 11.10 from the "alternate" installer disc and set up whole-disk encryption through the official installer. I am almost 100% certain that when I suspend my machine, my disk's encryption key is left in RAM, and when I hibernate, my key is saved to disk (very bad!). My evidence for this is pretty simple: Upon resuming the machine, no password needs to be entered in order to unlock the disk (only the xscreensaver password, which can be entirely different). This is a major security vulnerability because it means that someone who steals a suspended or hibernated laptop could decrypt its disk using the (unencrypted, readily available) key in RAM or on disk. Worse, I suspect the key would remain on disk even after a shutdown (following a hibernate) unless some secure erase method is used. Since laptops are both the types of machines that people typically encrypt and the types of machines that people typically suspend/hibernate, this seems like a huge security issue to me.

Steven Keys (steevven1)
visibility: private → public
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.

To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/937361/+editstatus and add the package name in the text box next to the word Package.

[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]

tags: added: bot-comment
Revision history for this message
Fabio Marconi (fabiomarconi) wrote :

Thank you for taking the time to report this issue and helping to make Ubuntu better. Examining the information you have given us, this does not appear to be a bug report so we are closing it and converting it to a question in the support tracker. We understand the difficulties you are facing, but it would make more sense to raise problems you are having in the support tracker at https://answers.launchpad.net/ubuntu if you are uncertain if they are bugs. For help on reporting bugs, see https://help.ubuntu.com/community/ReportingBugs.

Changed in ubuntu:
status: New → Invalid
status: Invalid → New
Revision history for this message
Fabio Marconi (fabiomarconi) wrote :

---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad

Changed in ubuntu:
status: New → Invalid
Revision history for this message
Steven Keys (steevven1) wrote :

This is a solvable security issue, not something that users ought to just deal with. The solution is to dump the key from RAM on suspend and to NOT write it to disk on Hibernate, and to ask the user to unlock the disk on resume. Disk encryption is useless on machines that get suspended or hibernated without this solution. At the absolute least, there should be a massive, all-caps warning to users during installation that their disk is NOT PROTECTED if they suspend or hibernate. I believe this should be converted back into a bug and dealt with.

Steven Keys (steevven1)
Changed in ubuntu:
status: Invalid → Opinion
Revision history for this message
Erno Kuusela (erno-iki) wrote :

Sounds like catastrophic leak of key material if hibernate writes keys to disk?

Changed in ubuntu:
status: Opinion → New
tags: added: security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.