T60 & Truecrypt

T60/T61 series specific matters only
Post Reply
Message
Author
selector
Posts: 19
Joined: Fri Aug 18, 2006 3:43 pm
Location: US

T60 & Truecrypt

#1 Post by selector » Mon Mar 24, 2008 7:59 pm

Hi,

Has anyone installed Truecrypt with full system drive encryption on their T60?

I have a T60 with pretty much all of the IBM/Lenovo software installed (via System Update).

- Fingerprint software applied for bootup and login
- ThinkVantage button enabled on bootup to access hidden partition

Have any of these caused any problems or am I safe to proceed?

Thanks!

pae77
Senior Member
Senior Member
Posts: 738
Joined: Tue Mar 29, 2005 10:59 am
Location: Honolulu, HI, USA

#2 Post by pae77 » Mon Mar 24, 2008 9:22 pm

I haven't tried it yet, however, from reviewing the Truecrypt user guide, I came away with the impression that the TC's boot loader would kick in after the hardware stuff and before windows boots.
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)

o1001010
Sophomore Member
Posts: 165
Joined: Sat Nov 05, 2005 3:38 am

#3 Post by o1001010 » Tue Mar 25, 2008 1:27 am

if you want security i simply recommend that you go with aes 256 encryption, 7 zip does that free of charge.
Thinkpad T60 2613-HDU
1.66 Core 2 2gb x1400-128 Fujitsu 60 14" sxga Chicony TP a/b/g BT

Thinkpad T42 2373-N1U
1.8 p-m 2gb 9600-64 Fujitsu 80 LG 15" Flexview Chicony TP a/b/g BT

pae77
Senior Member
Senior Member
Posts: 738
Joined: Tue Mar 29, 2005 10:59 am
Location: Honolulu, HI, USA

#4 Post by pae77 » Tue Mar 25, 2008 1:30 am

FYI TrueCrypt is totally FREE, and does a heck of a lot more in the security department than 7zip.
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)

o1001010
Sophomore Member
Posts: 165
Joined: Sat Nov 05, 2005 3:38 am

#5 Post by o1001010 » Tue Mar 25, 2008 2:11 am

i do understand it is opensource and automatic.
but it is subject to cold boot attacks. which easily defeats the scheme.

http://en.wikipedia.org/wiki/TrueCrypt

7zip with 256 aes is on demand, which only encrypts the file he needs, and if you use passphrases, it will probably be your best bet,

do undestand that nothing is absolute secure. it is all about how badly someone wants your files. nsa probably already cracked aes.
Thinkpad T60 2613-HDU
1.66 Core 2 2gb x1400-128 Fujitsu 60 14" sxga Chicony TP a/b/g BT

Thinkpad T42 2373-N1U
1.8 p-m 2gb 9600-64 Fujitsu 80 LG 15" Flexview Chicony TP a/b/g BT

pae77
Senior Member
Senior Member
Posts: 738
Joined: Tue Mar 29, 2005 10:59 am
Location: Honolulu, HI, USA

#6 Post by pae77 » Tue Mar 25, 2008 4:02 am

I was aware of the cold boot vulnerability due to recent tech news reports on it. Nevertheless, I don't agree that the scheme is defeated "easily." From what I understand, a "cold boot" attack is not something just anyone can do. And even if one is concerned about a technically sophisticated attacker who might have the ability to exploit that particular vulnerability, all one has to do is use a TrueCrypt container for particularly sensitive material (in addition to or rather than encrypting the entire system) and 5 minutes after it's been dismounted, that kind of attack won't work, if I'm understanding how it works correctly. And even on an encrypted system volume, there is only a 5 minute window of vulnerability after shut down, so long as the system is not placed on standby.

So for me personally, that means I will continue to use a TrueCrypt container for any very confidential material even if I decide to use TrueCrypt to encrypt the entire system volume and when I am particularly concerned about the security of my system, for example, when I'm traveling, I won't be using standby as much.

So while it is important to be aware of that particular vulnerability, I really don't think it is that big of a deal, as there are simple ways to protect against it and therefore I don't think it is a valid reason to abandon TrueCrypt. Jmo.

From the above referenced Wikepedia article:

"Truecrypt, alongside with all other programs tested by Princeton University, is susceptible to cold boot attacks. These allow the encryption/decryption keys (used to secure data) to be determined without the password, by reading this information directly from memory after rebooting the computer[4]

However, preventing physical access to the DRAM memory during ~5 minutes after shutdown or hibernation will prevent this attack, assuming you hibernate to an encrypted volume. On the other hand, 'sleeping' the computer leaves the memory accessible and thus vulnerable[5].

It should be noted that when properly dismounting a TrueCrypt volume, it securely erases[6] the master keys to the volume. This prevents an attacker from gaining access to the master keys if the encrypted volume has been properly dismounted. The cold boot attack is only used if the machine has a mounted TrueCrypt volume currently accessible, and the machine itself is unsecured. [7]"
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “ThinkPad T6x Series”

Who is online

Users browsing this forum: No registered users and 26 guests