Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

TrueCrypt 5.0 Released, Now Encrypts Entire Drive 330

A funny little man writes "The popular open source privacy tool, TrueCrypt, has just received a major update. The most exciting new feature provides the ability to encrypt an entire drive, prompting the user for a password during boot up; this makes TrueCrypt the perfect tool for non-technical laptop users (the kind who are likely to lose all of that sensitive customer data). The Linux version receives a GUI and independence from the kernel internals, and a Mac version is at last available too."
This discussion has been archived. No new comments can be posted.

TrueCrypt 5.0 Released, Now Encrypts Entire Drive

Comments Filter:
  • Re:Slashdotted? (Score:2, Informative)

    by b100dian ( 771163 ) on Wednesday February 06, 2008 @09:54AM (#22319960) Homepage Journal
    ..redditted!
  • by Chris Mattern ( 191822 ) on Wednesday February 06, 2008 @09:59AM (#22320010)
    It is also, of course, impossible that it encrypts the *entire* disk. It may encrypt all the partitions your running system uses, but unless your BIOS has encryption support (which it doesn't), you can't have an encrypted boot partition.
  • by Sal Zeta ( 929250 ) on Wednesday February 06, 2008 @10:02AM (#22320062)
    Too Bad that for some reasons they refuse to upload any files on the sourceforge server. There is only a "the files are only on truecrypt.org.html" available.
  • by _bug_ ( 112702 ) on Wednesday February 06, 2008 @10:02AM (#22320064) Journal
    http://sourceforge.net/projects/truecrypt/ [sourceforge.net]

    Press release here [sourceforge.net].

    We are pleased to announce that TrueCrypt 5.0 has been released. Among the new features are the ability to encrypt a system partition or entire system drive (i.e. a drive where Windows is installed) with pre-boot authentication, pipelined operations increasing read/write speed by up to 100%, Mac OS X version, graphical interface for the Linux version, XTS mode, SHA-512, and more.

    After four years of development, during which millions of people downloaded a copy of TrueCrypt, it is the only open-source disk encryption software that runs on Windows, Mac OS X, and Linux. The newly implemented ability to encrypt system partitions and system drives provides the highest level of security and privacy, as all files, including any temporary files that Windows and applications create on system drives (typically, without the user's knowledge or consent), swap files, etc., are permanently encrypted. Large amounts of potentially sensitive data that Windows records, such as the names and locations of files opened by the user, applications that the user runs, etc., are always permanently encrypted as well. For more information, please see http://www.truecrypt.org/docs/?s=version-history [truecrypt.org]
  • by Scott Lockwood ( 218839 ) * on Wednesday February 06, 2008 @10:03AM (#22320076) Homepage Journal

    IMPORTANT: Official TrueCrypt distribution packages can be downloaded only from www.truecrypt.org (above, select 'Project' > 'Web Site')


    You Fail It.
  • by HP-UX'er ( 211124 ) on Wednesday February 06, 2008 @10:03AM (#22320082)
    Here it is [filehippo.com]
  • by base3 ( 539820 ) on Wednesday February 06, 2008 @10:04AM (#22320106)
    Thanks, but the packages are not available to download from SourceForge. "IMPORTANT: Official TrueCrypt distribution packages can be downloaded only from www.truecrypt.org (above, select 'Project' > 'Web Site') Notes"
  • by apathy maybe ( 922212 ) on Wednesday February 06, 2008 @10:09AM (#22320152) Homepage Journal
    In Windows at least (not sure with the other versions), you can set it to dismount mounted volumes whenever certain ACPI events (lid closing, suspend or hibernate etc.) happen.

    This forces you to re-enter your password to access the volume.

    Of course, you should have an option in your OS to ask you for your login password whenever you close and then open your lid as well.
  • Re:Slashdotted (Score:4, Informative)

    by telchine ( 719345 ) on Wednesday February 06, 2008 @10:10AM (#22320158)

    The site is sooo slooow. Mirror please! But the update seems great!
    http://sourceforge.net/projects/truecrypt/ [sourceforge.net]

  • by twoshortplanks ( 124523 ) on Wednesday February 06, 2008 @10:12AM (#22320184) Homepage
    No, but you should have a screensaver that won't let you use the computer unless you enter a password.

    Normally this wouldn't offer complete protection - you could just reboot from a system disk and access the filesystem, but with truecrypt (or FileVault, or any of the other encrypted file system solutions) they can't do this.

  • by Library Spoff ( 582122 ) on Wednesday February 06, 2008 @10:12AM (#22320188) Journal
    You can ONLY download from truecrypt.org. According to the sourceforge page anyway...
  • Re:Slashdotted (Score:2, Informative)

    by RandoX ( 828285 ) on Wednesday February 06, 2008 @10:12AM (#22320192)
    IMPORTANT--Official_TrueCrypt_distribution_packages_can_be_downloaded_only_from_www.truecrypt.org
  • by Chris Mattern ( 191822 ) on Wednesday February 06, 2008 @10:23AM (#22320326)
    Yes, they can recover key and encryption algorithms from the unencrypted boot sector. But if they can crack you simply by knowing the unencryption program, you're boned anyways. What they *can't* recover, assuming that your encryption vendor hasn't screwed up, is your key. And without that, they can't read your encrypted partitions. If they've done it right, it's secure. Somebody in possession of your laptop but without your passphrase cannot read the disk, no matter what he does, except for the boot partition, and there won't be any useful data there. I don't use Truecrypt and haven't researched them, so I can't guarantee that they did it right (look at WEP, where they managed to botch the encryption for a major standard, resulting in it having to be replaced by WPA). I believe every laptop should be "whole disk" encrypted--it's just too easy for a laptop to disappear. I run debian on my laptop, so I used cryptmount to encrypt my disk. If you're not encrypting your laptop's disk, you definitely should be. A brief glance over some recent news stories should tell you why.
  • by Maljin Jolt ( 746064 ) on Wednesday February 06, 2008 @10:26AM (#22320354) Journal
    It is also, of course, impossible that it encrypts the *entire* disk. It may encrypt all the partitions your running system uses, but unless your BIOS has encryption support (which it doesn't), you can't have an encrypted boot partition.

    Your concept of impossible is, of course, a little bit flawed, for I have at least 5 *entire* disks encrypted in this single box I am writing on. And some of them has no partitions, just a filesystem over raw disk.
  • Re:The final excuse. (Score:5, Informative)

    by Lord Ender ( 156273 ) on Wednesday February 06, 2008 @10:30AM (#22320404) Homepage
    No. Encryption imparts serious performance penalties. Normally, things like DMA allow you to transfer data directly from your disk to your RAM, another disk, or another device. With encryption, every bit must pass through the CPU to do crypto on it. It some cases, that is a very noticeable delay. At our company, that delay was too long for some purposes, so I had them use DriveLock instead, which has no performance penalty.
  • by CarpetShark ( 865376 ) on Wednesday February 06, 2008 @10:32AM (#22320426)

    unless your BIOS has encryption support (which it doesn't), you can't have an encrypted boot partition.


    Of course you can. You just can't have an encrypted MBR... unless you boot from a floppy or a USB drive you keep on your person, or something like that. Note that bios limitations can also be circumvented with linuxbios ;)
  • by gweihir ( 88907 ) on Wednesday February 06, 2008 @10:35AM (#22320460)
    I would like to encrypt my entire laptop drive, but I'm not going through all the trouble if its just another easy layer to break through. Any Truecrypt experts out there?

    I am not a TrueCrypt expert, but I follow the discoveries of the crypto community. It seems TrueCrypt is highly respected. While it cannot defeat a (hardare in this case) keylogger, the crypto used seems to be strong crypto implemented according to current standards. Not a snake-oil product with home-rolled ciphers or "passwordless" security or such nonsense. At the moment, nobody admits being able to breaking it and I am not aware of instances that indicate it has been broken. And, other than many other products, it is widely used. Personally I would say it is on a level with PGP/GnuPG/dm-crypt/LUKS with regard to security level offered.
  • by leuk_he ( 194174 ) on Wednesday February 06, 2008 @10:38AM (#22320528) Homepage Journal
    5.0

    February 5, 2008

    New features:

    *

    Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts). For more information, see the chapter System Encryption in the documentation. (Windows Vista/XP/2003)
    *

    Pipelined operations increasing read/write speed by up to 100% (Windows)
    *

    Mac OS X version
    *

    Graphical user interface for the Linux version of TrueCrypt
    *

    XTS mode of operation, which was designed by Phillip Rogaway in 2003 and which was recently approved as the IEEE 1619 standard for cryptographic protection of data on block-oriented storage devices. XTS is faster and more secure than LRW mode (for more information on XTS mode, see the section Modes of Operation in the documentation).

    Note: New volumes created by this version of TrueCrypt can be encrypted only in XTS mode. However, volumes created by previous versions of TrueCrypt can still be mounted using this version of TrueCrypt.
    *

    SHA-512 hash algorithm (replacing SHA-1, which is no longer available when creating new volumes).

    Note: To re-encrypt the header of an existing volume with a header key derived using HMAC-SHA-512 (PRF), select 'Volumes' > 'Set Header Key Derivation Algorithm'.

    Improvements, bug fixes, and security enhancements:

    *

    The Linux version of TrueCrypt has been redesigned so that it will no longer be affected by changes to the Linux kernel (kernel upgrades/updates).
    * Many other minor improvements, bug fixes, and security enhancements. (Windows and Linux)

    If you are using an older version of TrueCrypt, it is strongly recommended that you upgrade to this version.

    4.3a.......

    ==============
    System Encryption

    TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots (a TrueCrypt-encrypted system drive may also contain non-system partitions, which are encrypted as well).

    System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), swap files, etc., are permanently encrypted. Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and registry entries are always permanently encrypted as well.

    System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots (starts). Pre-boot authentication is handled by the TrueCrypt Boot Loader, which resides in the first cylinder of the boot drive.

    Note that TrueCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual with
  • Linux 64bit? (Score:3, Informative)

    by Wubby ( 56755 ) on Wednesday February 06, 2008 @10:40AM (#22320552) Homepage Journal
    Any word on 64bit binaries for Linux? I've compiled the Non-gui version without issue before, but with a gui, things get more complicated. GTK/KDE? Which libraries? etc etc etc etc etc
  • by filbranden ( 1168407 ) on Wednesday February 06, 2008 @10:54AM (#22320760)

    Oh, I forgot to mention. According to their website, TrueCrypt can encrypt the boot partition even after the OS is installed, even with Windows.

    Basically, you install it, then you ask it to encrypt the whole disk. It will install the boot code to ask the password and decrypt the partition before loading the OS, and then it will start encrypting your partition in the background, you may continue using the OS. You may even reboot the machine, it will boot correctly and continue encrypting from where it stopped. If it really works as they say it does, this version is indeed amazing.

  • Re:Slashdotted (Score:5, Informative)

    by InvisiBill ( 706958 ) on Wednesday February 06, 2008 @11:10AM (#22320954) Homepage
  • Re:download link NOT (Score:2, Informative)

    by treak007 ( 985345 ) on Wednesday February 06, 2008 @11:14AM (#22321006)

    If you'd take a moment and actually LOOK at their Sourceforge entry, you'd not have posted this
    If YOU would have taken a moment to actually look at their Sourceforge page, you would realize the page also includes the details of the 5.0 release and in fact has answers to some of the questions that are being asked in this thread.
  • by imsabbel ( 611519 ) on Wednesday February 06, 2008 @11:19AM (#22321092)
    My personal experience with TC 4.0 (and, obviously, not my boot disk):

    Random accesses arent slowed down noticable, but large STR (like copying 50Gbyte to another HD) are. For me, the limit was about 30Mbyte/s.
    But as this is driver-level CPU load, and not interupt driven, the system responsitivity was not negatively affected.

    Memory usage is neglectable, and CPU load scales linearly with bytes/s. So in most scenarios, or multicores, its not the limiting factor.

    But you would NOT want to capture video or stuff like that onto a truecrypt volume
  • by XMyth ( 266414 ) on Wednesday February 06, 2008 @11:27AM (#22321238) Homepage
    TrueCrypt can do this when used in 'Traveler' mode.

    It does install a system driver when in use, but the driver can reside purely on the unencrypted portion of the flash drive.

    James
  • Re:Risky? (Score:2, Informative)

    by tracerjpn4k ( 1230566 ) on Wednesday February 06, 2008 @11:30AM (#22321300)
    Not really.

    I also duel boot windows / linux, and ran into the following errors tryin to set it up with TC

    You can't encrypt the whole drive if you have more than 1 OS on 1 drive (not partition)

    You can encrypt only your windows partition, but ONLY if you are using the windows boot manager in your MBR, and move grub to your linux partition.

    If you have 2 drives, 1 for windows and 1 for linux, you should be home free.

    Guess i'll stick to encrypted volumes :)
  • by Nimey ( 114278 ) on Wednesday February 06, 2008 @11:43AM (#22321508) Homepage Journal
    If the Mac version is any example, TrueCrypt now uses FUSE. That's not /completely/ independent of the kernel, but it's still rather more stable than having to recompile TC every time you build a new kernel.
  • Re:Slashdotted (Score:3, Informative)

    by SScorpio ( 595836 ) on Wednesday February 06, 2008 @12:16PM (#22321986)
    You're able to write protect the hidden area and write to the dummy partition. The only bad thing that it reports is that data written to the hidden partition area will appear as a write error. So you can technically have updated files in the dummy area.
  • Re:FIPS 140-2? (Score:3, Informative)

    by SuperBanana ( 662181 ) on Wednesday February 06, 2008 @01:11PM (#22322578)

    The algorithms used are fine, but this stamp of approval would be very useful for federal Linux and Mac users!

    http://www.extrapepperoni.com/2007/09/10/fips-140-2-for-mac-os-x/

    Filevault already provides FIPS 140-2 compliant encryption.

  • Re:The final excuse. (Score:2, Informative)

    by TAiNiUM ( 66843 ) on Wednesday February 06, 2008 @01:18PM (#22322642)
    But if your backups are unencrypted then what is the point of encrypting the primary operating drive?

    From their FAQ: [truecrypt.org]

    Q: I forgot my password - is there any way to recover the files from my TrueCrypt volume?

    A: TrueCrypt does not contain any mechanism or facility that would allow partial or complete recovery of your encrypted data without knowing the correct password or the key used to encrypt the data. The only way to recover your files is to try to "crack" the password or the key, but it could take thousands or millions of years depending on the length and quality of the password/keyfiles, on software/hardware efficiency, and other factors.
  • Re:ZFS Encryption (Score:3, Informative)

    by Sloppy ( 14984 ) on Wednesday February 06, 2008 @01:24PM (#22322718) Homepage Journal

    File servers might not be able to tolerate the performance penalty of encryption.
    Huh. I guess different people have seen different things, but in my experience, fileservers tend to have underworked CPUs. And it just becomes more extreme ever year, as CPUs double in speed more frequently than I/O devices do.
  • by Skapare ( 16644 ) on Wednesday February 06, 2008 @01:30PM (#22322798) Homepage

    If it runs while loading the OS (kernel), and then runs when that OS mounts a filesystem, it must be running in two different places since in one case the I/O is done through BIOS calls and in the other case through device driver calls in a kernel. That doesn't sound like independence from the kernel to me. It sounds like it has to be compiled into the kernel (otherwise the / filesystem isn't encrypted), or at least inside initramfs (which is still compiled into the kernel).

    I'm really not concerned about the install process. I'm concerned about reliability aspects, including the ability to support the way I structure my file systems. Performance would be good, too, but there is obviously a certain amount of performance hit for the encryption. For example, things like direct write should still continue to work faster, by doing the encryption of data blocks directly from the original buffer to a temporary (not copy to a temporary first), then completing the write.

  • by rdradar ( 1110795 ) on Wednesday February 06, 2008 @01:42PM (#22322958)
    Only the Windows version supports whole disk encryption, not Linux one.
  • Re:Slashdotted (Score:2, Informative)

    by Anonymous Coward on Wednesday February 06, 2008 @02:31PM (#22323496)

    The ability to back-up headers makes this software great for businesses or governments
    I think a small business or home based business where everyone is on board that WDE is a good thing could get away with using Truecrypt's WDE feature. Unfortionatly it is not ready for any government agency, nor any business of significant size. Several problems exists:
    • Anybody with admin rights to the machine can remove the FDE (And even though the FDCC guidelines (Which all government agencies are supposed to follow and implement as of Jan 31, 2008 (yea right)) [nist.gov] say this is a no-no, all it takes is someone, somewhere to sign off saying "We allow local admin rights because: " and viola! Admin rights.
    • No support for two factor authentication.
    • No support for the "I forgot my password" syndrome beyond saying: Here is a rescue CD, and here is the password, and have fun! Commercial products allow for a challenge-response one time login/password change request.
    • No support for multiple users to log in to the laptop (Ties into the point above).
    • No support for policies (Password length/complexity, time restrictions, that sort of thing)
    • No support for automatic updates (which I guess is a moot point because of the above issue)
    • No support for automatically updating the header files (Needed when the user changes password, a new user is given rights to the machine, etc.)
    • And the biggest one: Truecrypt would need to have a champion at the highest levels before it has a chance of being deployed.
    Some of these problems also prevent Truecrypt from being used as a portable media encryption option in the government as well. For example there is no easy way that a end user can create a container and say "Only myself and Bob can open it".

    In short, it is close to being useful beyond the SOHO market, but not quite there. Reading through there todo's I see that they are going to be addressing some of these issues, and I suspect that with enough constructive input, they will eventually meet the other requirements as well.

  • Re:The final excuse. (Score:3, Informative)

    by Lord Ender ( 156273 ) on Wednesday February 06, 2008 @02:32PM (#22323506) Homepage
    Disk encryption is meant to counter a specific threat--laptop theft. Your backup server, hopefully, isn't sitting on a coffee table in an airport. Protecting your backup server is an entirely different issue.

    Also, yes you CAN recover truecrypt volumes if you lose the password. If you backup the volume header and store that with a password, you may later get back at your data by restoring the volume header.

    That FAQ is either out of context or out dated. I've recovered TC volumes using volume headers.
  • by Anonymous Coward on Wednesday February 06, 2008 @03:11PM (#22324056)
    FileVault is actually pretty much useless on laptops. You see, Apple's laptops and some of their desktops do something called "Safe Sleep". I first saw it on IBM machines a while ago. Essentially, the system performs a hibernate operation, then goes to sleep. That way, if it still has power, it just resumes from RAM. If it loses power (you swap batteries, for example), it resumes from the disk.

    The problem is that the image of your RAM is not encrypted (in Tiger, at least; I'm not sure about Leopard). The RAM needs to have your crypto keys in it in order to read from and write to the FileVault volume. Pull the drive, find the sleepimage file (it's in /var/vm, with the swap files) then cat it and run it through strings. Admittedly, you'll have quite a lot of potential passwords, but far fewer than the entire potential keyspace of an arbitrary password. It would be trivial to turn that into a dictionary and feed it to a traditional password cracker.

    Further, someone who really knows what he's looking at might be able to just find the key outright and wouldn't need the password.
  • by Atti K. ( 1169503 ) on Wednesday February 06, 2008 @03:11PM (#22324062)
    In Truecrypt's menu, under Settings -> Preferences, there is an Auto-Dismount section. TrueCrypt volumes can be automatically dismounted when:
    • user logs off
    • screen saver is started
    • enters power saving mode
    • no data has been written for x minutes
    Dismounting can be forced even if there are open files on the volume. All those options were there even in TrueCrypt 4.3.
  • Not anytime soon. (Score:3, Informative)

    by Ayanami Rei ( 621112 ) * <rayanami&gmail,com> on Wednesday February 06, 2008 @04:37PM (#22325154) Journal
    For whatever reason, the author of TrueCrypt wrote his own implementation of AES. This means even if someone put up the cash to apply for a cert, it'd probably take much longer to get anything other than assurance level 1 than most people are willing to wait.

    In any case it costs a lot of money and they only test binaries which makes anything that links into a kernel difficult unless it's only a library core common among implementations which is linked at install time or something.

    It's a real pain. :-(

    Most people are fine with FIPS-compliant but not listed, and not many government types use anything but windows on laptops, so you're kinda screwed there being one of very few who need it.
  • Re:Recovery CD (Score:4, Informative)

    by Xenoflargactian ( 883930 ) on Wednesday February 06, 2008 @06:56PM (#22326756)
    TrueCrypt requires that you burn a Rescue Disk before encrypting your boot partition. It saves a 2-meg ISO to 'My Documents' and gives you links to free burning software. It won't let you proceed without the burned CD in the drive. The rescue disk can be used to restore the boot loader (which has the password-encrypted keys, etc) in case of corruption, but it also has a 'Decrypt entire disk now' option. If you need to boot from a BartPE, you can decrypt your whole disk, then boot from the BartPE.

    They've really thought this through. I've gotta hand it to the people at Truecrypt.org. I'm impressed, especially considering this is the first release of their whole disk encryption product.
  • Re:Recovery CD (Score:1, Informative)

    by Anonymous Coward on Thursday February 07, 2008 @12:29AM (#22329910)
    The whole disk encryption process requires the creation of a recovery CD that can be used to decrypt the drive in the event of drive problems. In XP, I haven't actually found a way to skip this recovery CD feature.

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...