{"id":13782,"date":"2018-11-07T16:30:03","date_gmt":"2018-11-08T00:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/07\/news-7549\/"},"modified":"2018-11-07T16:30:03","modified_gmt":"2018-11-08T00:30:03","slug":"news-7549","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/11\/07\/news-7549\/","title":{"rendered":"BitLocker on self-encrypted SSDs blown; Microsoft advises you switch to software protection"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 07 Nov 2018 16:08:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday, Microsoft released ADV180028, <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180028\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Guidance for configuring BitLocker to enforce software encryption<\/span><\/a><span style=\"font-weight: 400;\">, in response to a clever crack published on Monday by Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands (<\/span><a href=\"https:\/\/www.ru.nl\/publish\/pages\/909275\/draft-paper_1.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">PDF<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The paper (marked \u201cdraft\u201d) explains how an attacker can decrypt a hardware-encrypted SSD without knowing the password. Due to a flaw in the way self-encrypting drives are implemented in firmware, a miscreant can get at all of the data on the drive, no key required. G\u00fcnter Born reports on his <\/span><a href=\"https:\/\/borncity.com\/win\/2018\/11\/06\/ssd-vulnerability-breaks-bitlocker-encryption\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Borncity blog<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The security researchers explain that they were able to modify the firmware of the drives in a required way, because they could use a debugging interface to bypass the password validation routine in SSD drives. It does require physical access to a (internal or external) SSD. But the researchers were able to decrypt hardware-encrypted data without a password. The researchers write that they will not release any details in the form of a proof of concept (PoC) for exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft\u2019s BitLocker feature encrypts all the data on a drive. When you run BitLocker on a Win10 system with a solid state drive that has built-in hardware encryption, BitLocker relies on the self-encrypting drive\u2019s own capabilities. If the drive doesn\u2019t have hardware self-encryption (or you&#8217;re using Win7 or 8.1), BitLocker implements software encryption, which is less efficient, but still enforces password protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hardware-based self-encryption flaw seems to be present on most, if not all, self-encrypting drives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft\u2019s solution is to unencrypt any SSD that implements self-encryption, then re-encrypt it with software-based encryption. Performance takes a hit, but data will be protected by software, not hardware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For details on the re-encryption technique, <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180028\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">see ADV180028.<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3319736\/microsoft-windows\/bitlocker-on-self-encrypted-ssds-blown-microsoft-advises-you-switch-to-software-protection.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 07 Nov 2018 16:08:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Yesterday, Microsoft released ADV180028, <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180028\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Guidance for configuring BitLocker to enforce software encryption<\/span><\/a><span style=\"font-weight: 400;\">, in response to a clever crack published on Monday by Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands (<\/span><a href=\"https:\/\/www.ru.nl\/publish\/pages\/909275\/draft-paper_1.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">PDF<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3319736\/microsoft-windows\/bitlocker-on-self-encrypted-ssds-blown-microsoft-advises-you-switch-to-software-protection.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-13782","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13782"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13782\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}