You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
and then I add a TPM to the system and I want to keep the encryption key stored on the TPM, is there any way to find out which is the current encryption key (the real one, not the wrapping key) and to remove it from the ZFS storage? I am thinking on a scenario in which somebody gets their hands on the disk, with enough computational power to do a brute force on the key... if the key is not at all in the disk, because is in the TPM, this attack is not possible anymore... right? if that is possible, then the TPM could deliver the key to a file in ram, upon successful authentication.
This discussion was converted from issue #12517 on September 02, 2021 21:30.
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
I am playing with ZFS on debian 11.0, and I am facing a question I cannot answer: if I create a pool like
and then I add a TPM to the system and I want to keep the encryption key stored on the TPM, is there any way to find out which is the current encryption key (the real one, not the wrapping key) and to remove it from the ZFS storage? I am thinking on a scenario in which somebody gets their hands on the disk, with enough computational power to do a brute force on the key... if the key is not at all in the disk, because is in the TPM, this attack is not possible anymore... right? if that is possible, then the TPM could deliver the key to a file in ram, upon successful authentication.
Beta Was this translation helpful? Give feedback.
All reactions