Replies: 2 comments 1 reply
-
Just an idea: |
Beta Was this translation helpful? Give feedback.
-
This might be good and bad at the same time. Preventing propagation of the key change will for sure keep your backup copy accessible with the old key - but: If you change the key because it has been compromised, you have to make sure that in this case, the key change will be propagated. I think the really best thing would be to make the master key exportable. Of course this master key has to be kept most secure - but it is your life insurance. |
Beta Was this translation helpful? Give feedback.
-
This has already been discussed and having an attacker gaining root access to your system is already bad enough - but:
File by file encryption or even encryption of a whole block device takes time.
You don't want to present an already complete encryption of your data to an attacker by giving him such simple means like "zfs change-key" to render your data inaccessable.
He has to become root first - yes - but we all know how easy this sometimes is. The damage is immediate and no one can save you. Especially if your backup concept is replication of raw encrypted data (-w) as in that case the changed-key will also be replicated and thus you even loose access to your backup. This is Bingo! for any attacker.
So zfs change-key should not be possible without entering the old key.
Beta Was this translation helpful? Give feedback.
All reactions