[tor-relays] Encrypting the DataDir
Cristian Consonni
cristian at balist.es
Wed May 31 11:36:31 UTC 2017
Hi,
thanks everybody for your replies.
On 30/05/2017 15:52, dawuud wrote:
> Is there a clear threat model justifying use of disk encryption here?
On 30/05/2017 15:52, dawuud wrote:> The decryption keys sit in system
memory so an adversary with physical
> access will surely win. I just don't see the point.
On 30/05/2017 20:30, tor wrote:
> I also don't understand the point of encrypting this directory.
On 30/05/2017 20:40, diffusae wrote:
> Me too not.
>
> If the machine is running, the content is always unencrypted.
On 31/05/2017 02:41, teor wrote:
> On a relay, the most sensitive content is in DataDir/keys.
> You could encrypt that if you want to protect your keys when your
> relay is powered off.
I was asking mostly out of curiosity, I do not have a specific threat in
mind, but I was following the scenario "node is seized" like it has
recently happened for some of the relays and was announced on this
list[1a][1b].
My relays are running as VPSes on a third-party provider, so - yeah -
they are exposed to attacks from the providers themselves. But I have to
trust them in any case, anyhow, don't I?
I understand that what I am getting is very limited. It basically works
if the provider decides to shut down the machine or I am able to shut
down the machine before it is seized/analysed.
And again, if I know (i.e. I am notified) that the machine is seized,
whether it is running or not I can always write here to ask that node to
be cut out of the network.
So, the difference is that *if* the machine is shut down before it is
inspected then I just have a little more time to ask for the node to be
removed. Is this correct?
In the end, probably this is quite some hassle for very little gain.
On 31/05/2017 02:41, teor wrote:
> Or you could use OfflineMasterKey for the ed25519 keys, which is
> even safer. (But doesn't do anything for the RSA keys.)
I will probably set up the OfflineMasterKey (I still have a couple of
questions, see the other thread).
> I wouldn't bother encrypting the entire DataDir, it contains
> consensuses and descriptors, and (as of 0.3.1) will contain consensus
> diffs and compressed consensuses, so it will get a bit larger.
>
> The most sensitive part is probably the state file, but a relay's
> guards are not that sensitive.
Encrypting the whole DataDir seemed to me the only viable configuration
given that in torrc you can only specify where the DataDir is.
Cristian
[1a]: https://lists.torproject.org/pipermail/tor-relays/2017-May/012281.html
[1b]: https://lists.torproject.org/pipermail/tor-relays/2017-May/012406.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20170531/bab01bc2/attachment.sig>
More information about the tor-relays
mailing list