this post was submitted on 22 Jun 2024
37 points (93.0% liked)

Linux

48229 readers
845 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

(More) Specifics:

  • Undoing the protection should include filling in a password.
  • The password should be different from the one used with sudo or any other passwords that are used for acquiring elevated privileges.

All (possible) solutions and suggestions are welcome! Thanks in advance!

Edit: Perhaps additional specifications:

  • With 'displace‘, I mean anything involving that resembles the result of mv, cp (move, cut, copy) or whatsoever. The files should remain in their previously assigned locations/places and should not be able to 'pop up' anywhere.
  • I require for the files to be unreadable.
  • I don't care if it's modifiable or not.
  • I don't require this for my whole system! Only for a specific set of files.
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 4 months ago (1 children)

"undoing the protection should include filling in a password" That sounds like an encrypted drive. There are USB keys that'll require software to enter an encryption password before you can do anything (including deleting the contents).

If you're on Windows, try Bitlocker or Veracrypt. You can create hard disk images that can be mounted temporarily with a password.

Same can also be done on other operating systems, though I don't know what tools yours come with.

In a pinch, you can just create a password protected 7zip archive, though viewing and editing those files usually involves a temporary copy.

There's no way to prevent a file that's loaded in memory from making it back to the disk. The best you can do is also encrypt the system drive so only people who know the encryption password can boot the computer that's accessing these files.

[–] [email protected] -1 points 4 months ago (3 children)

It seems I wasn't clear as most people misunderstood me.

But, to give a very precise example; say

  • I had a folder called ~/some/folder.
  • It was on an encrypted drive.
  • And I had done additional work to encrypt the folder again.
  • And say, I used chattr, chmod or chown or similar utilities that remove access as long as one doesn't have elevated privileges.
  • And say, I had done whatever (additional thing) mentioned in your comment.

Then, what prevents whosoever, to copy that file through cloning the complete disk?

Even if they're not able to get past the password, it will be found on the cloned disk. SO, basically, I ask for some method that prevents the file to even be copied through a disk clone. I don't care that it has three passwords protecting it. What I want is for the disk clone (or whatever sophisticated copy/mv/cut or whatsoever utility exists) to somehow fail while trying to attempt the action on the protected files.

[–] [email protected] 5 points 4 months ago* (last edited 4 months ago) (1 children)

By definition, you can't. Any software level solution will fail since you can just move the drive somewhere else. It must be baked into the hardware and firmware.

Edit to add further clarification. Do you need it to be failing on every device or just on a device that you control? Since as stated before, moving a mass storage will completely overthrow any software solution

[–] [email protected] 1 points 4 months ago (1 children)

Do you need it to be failing on every device or just on a device that you control?

Actually, I'm fine with a solution that only works on a device that I control. But, failing on every device is nice as well.

[–] [email protected] 2 points 4 months ago (1 children)

Right, working on every device requires a hardware solution. I haven't encountered any such hardware yet but I do know that it is possible. Next, your second requirement makes what you're trying to accomplish impossible. Privilege escalation by definition will escalate the privilege. The problem lies in the fact that the root user is basically a god in linux. You can even wipe your system if you so desire. However, you can read more into SELinux or other similar systems. It works by basically running check on the kernel level not user level. But the only solutions I can think of will make other day-to-day tasks more of a hassle. Also, note that whoever knows how to modify the SELinux can also bypass the system. I found an answer on serverfault that points to a blog. However, I haven't read the blog yet. You may find an answer there.

[–] [email protected] 1 points 4 months ago (1 children)
[–] [email protected] 2 points 4 months ago (1 children)

You're welcome. I also recommends Arch Wiki on SELinux. It helps clarify a lot of things and how different it is with traditional linux privilege escalation.

[–] [email protected] 1 points 4 months ago
[–] [email protected] 4 points 4 months ago (1 children)

Then, what prevents whosoever, to copy that file through cloning the complete disk?

Nothing. At most, you can have a hardware encrypted drive that won't permit access to the encrypted data without a password, but the file will remain available after unlocking that. Plus, dedicated people (law enforcement, data recovery specialists) may be able to get access to the flash chip itself unless you buy one that self destruct on any tampering attempts (and even those have flaws).

You cannot prevent copying of data if that data is readable at disk level. At most, you can make the data useless by padding a layer of encryption (as well-encrypted data may as well be random data without the key material). That's why everyone is going for encryption: encrypted files may as well be inaccessible to anyone who doesn't know the passphrase. There's no sense in copying a file which you cannot possibly read any bytes from.

If the key is gone (i.e. the real key is a password protected file that gets overwritten so even the password doesn't work anymore), the file becomes irretrievable. This is sometimes called "cryptographic erase" in the context of disks. There are variations of this, for instance, storing the key in the computer's processor (fTPM) behind a password, and clearing that key out. There's no way to get the key out of the fTPM so it cannot be backed up. Even if someone were to guess your password, the file will forever remain locked. Or at least until someone manages to break all cryptography, but even quantum computers don't know how to do that part yet.

If you're willing to go deep, you could reprogram the firmware on your SSD/HDD to refuse reading the file. A few years back, someone made a proof of concept firmware that detected disk imaging attempts (because all blocks on the disk were read in order) and had the firmware return garbage while secretly wiping the disk when this detection triggered. You could, in theory, write firmware that refuses to read that block of data. However, if whoever you're hiding this file from know about that, they can take out the platter/memory chips and dump them directly, bypassing your firmware entirely.

[–] [email protected] 3 points 4 months ago

Very informative. I appreciate it!

[–] [email protected] 3 points 4 months ago (1 children)

I ask for some method that prevents the file to even be copied through a disk clone

Oh that's quite simple! Just don't have the files on the first disk in the first place. Make them a remote mount from a server, for example via sshfs, webdav, etc. Heck, even ftp if it comes down to it. That way, even though you can clone the disks, you can not get to the files if you don't also have the full authentication requirements for the remote server (such as a password).

At a conceptual level, you can't do anything via root to prevent someone who clones the disk from... well, cloning the disk. Having physical access to a disk is a much higher level of access than even root, so if what you are looking for is for your content to not be cloned, you need to fortify physical access to the device.

[–] [email protected] 2 points 4 months ago

Understood. Thank you!