Quantcast
Channel: VeraCrypt
Viewing all 7620 articles
Browse latest View live

Commented Unassigned: A "security Leak". [348]

$
0
0
Veracrypt 1.17 beta remember the location (path) and the name of the last used keyfile. Now, every person that uses my computer knows the last keyfile I used. The Veracrypt 1.16 does not remember that and always takes the user to the home folder. An additional suggestion: like the PIM, there should be an option for caching the HMAC for faster mount.
Comments: Veracrypt 1.16 behavior seems more reasonable!

New Post: Veracrypt with online cloud storage

$
0
0
Data in transit will use SSL/TLS with certificates = asymmetric encryption, data in transit should be secure, and data at rest will use AES = symmetric encryption, of course you could also send data already encrypted too which if intercepted should be ok.

Attack: Possibilities depending on the setup:

1.If your entering sending a password over an SSL/TLS connection to decrypt the data otherwise you won't have access to it over the net (even if decryption is done on your system you still need to send the password) which sounds secure, as the connection is encrypted, but not quite, all it takes is an exploit like heartbleed http://heartbleed.com/ or you could use that exploit to get your password.

The problem is many websites still use OpenSSL for SSL/TLS as its free (unlike BlackboxSSL/TLS) and many servers are still left unpatched today.

Anyhow even if no exploit was used, SSL/TLS encryption strength is deliberately weakened for the mass surveillance systems in place, so with all the above in mind that's what I meant when I said " what use is that if a public hosted server has encrypted copies and it gets attacked"

2.If the data is downloaded to your system first and then you decrypt it on your system then your password will be fine unless the server gets hacked and sends out malware, the server will always have a copy of your shared data and every public facing server is vulnerable to attacks of all sorts and as mentioned earlier your password could be got through a hacked server sending out malware in the form of updates etc, and your system already trusts the sync app, and you prob installed it logged in as admin, that's half the battle.

It's entirely up to yourself, but as you know, nothing, absolutely nothing is safe on the Internet, thousands of zero day exploits are taken place now and most have no idea.

Created Unassigned: 3 individual Keyfile entry limit [354]

$
0
0
VeraCrypt version 1.17-BETA15 is only allowing a maximum of 3 individual keyfiles to be entererd. If, for example, I use 5 key files after I enter the third key file the selection window no longer allows me to select additional key files. There are temporary work arounds such as having all the key files in just 1 folder and selecting the folder but if I want to select the keyfiles individually VeraCrypt version 1.17-BETA15 is only allowing a maximum of 3 individual files to be selected. This was not an issue with Ver 1.16

New Post: Veracrypt with online cloud storage

$
0
0
OK Paul, you make a lot of points that I will need time to digest. I won't pretend that I understand everything that you say, but I will state that it prompts me to learn more about what you are describing, so thank you for your input, which I respect.

(Sigh) so much to learn, so little time.

Thanks for taking the time to reply. Appreciate it.

New Post: Veracrypt with online cloud storage

$
0
0
Folks, it's over a week since I started the thread and you've given me much food for thought. My original queries were 'open questions' which did not expect definitive answers. I appreciate very much the responses that you have made: thank you all.

So I propose to close this thread with this post. I'll wait a few days in case anyone wants to post a follow up, but then I'll mark this reply as the 'answer' to my question. (If I'm allowed that is: I wonder if I'll be blocked from answering my own question? We'll see.)

Thanks again and good 2016 to you all.

Rob

Commented Unassigned: A "security Leak". [348]

$
0
0
Veracrypt 1.17 beta remember the location (path) and the name of the last used keyfile. Now, every person that uses my computer knows the last keyfile I used. The Veracrypt 1.16 does not remember that and always takes the user to the home folder. An additional suggestion: like the PIM, there should be an option for caching the HMAC for faster mount.
Comments: Yes, it is essential that VeraCrypt does not remember the keyfile location. I use VeraCrypt and KeePass and I always configure KeePass to not remember the keyfile location. Not using keyfiles is not a very sane choice. Keyfiles allow you to rest assured that your files are safe even if there's a key logger in the system. There might be multiple users of VeraCrypt on the same system so the "Only one account" option is not good.

New Post: Veracrypt with online cloud storage

$
0
0
Just one thing came to my mind - if you store your encrypted volume on a cloud, you cannot believe in a change of the password, because of older copies. When you change password, only header is modified, so if somene has copy the old container and knows the old password, he can unlock your new container without the knowledge of the new password, because your password only protects header with "internal password", which protects the data (pardon my french if it is too simply said, I don't know the correct terms).

So when you work with group of people and one becomes distrusted, you should create the whole new container with a new password.

You will also have to avoid 2 or more people opening the same container, or you will get many confilicted copies. This is the hardest part, that's why we abandoned the idea of sharing the vc container and we use encfs.

New Post: Veracrypt with online cloud storage

$
0
0
If I understand you correctly you are discussing the possibility of storing the entire container file in the cloud, which is not what I am proposing. It would be very bandwidth heavy to synch a container of several GB. So it is individual files that will be synched, files that are normally stored inside containers on our laptops and only exposed to view when the container is mounted as a drive.

But your point about changing passwords is a powerful one. I think that existing files (including earlier versions) on the sync.com servers might get decrypted then re-encrypted when the password changes - but I don't know. I'll try a few experiments and/or ask support at sync.com.

Created Unassigned: Error "Incorrect function" when trying to access mounted file [355]

$
0
0
Hello,

I get the error "Incorrect function" when I try to access the mounted encrypted file.
its on Windows 10.

What can be wrong?

Commented Unassigned: Error "Incorrect function" when trying to access mounted file [355]

$
0
0
Hello,

I get the error "Incorrect function" when I try to access the mounted encrypted file.
its on Windows 10.

What can be wrong?
Comments: When I try to create a new Volume I get the error. Windows failed to format the volume as NTFS. Do you want to format the volume as FAT instead? FAT is not an option cause I like to save big files.

Source code checked in, #9788103f4aed827d47c93d2de01b3c28ef061a1a

$
0
0
Windows: avoid leaking location of selected keyfiles by clearing global variable used to store multiple file selection path.

Released: VeraCrypt version 1.17-BETA16 (Jan 16, 2016)

$
0
0

Changes between 1.16 and 1.17-BETA16 (16 January 2016) :

  • All OSs:
    • Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption)
    • Cut mount/boot time by half thanks to a clever optimization of key derivation (found by http://home.arcor.de/skanthak/)
    • Sign binaries using both SHA-1 and SHA-256 to follow new Microsoft recommendations.
    • Solve issues under Comodo/Kaspersky when running an application from a VeraCrypt volume (Reported and fixed by Robert Geisler)
    • Bootloader: Protect password/PIM length by filling the fields to maximum length with '*' after ENTER
    • Solve issue with system favorites not being able to be mounted to drive A:
    • Solve lost focus issues for after displaying the waiting dialog
    • Implement PIM caching, for both system encryption and normal volumes. Add options to activate it.
    • Internal rewrite to make VeraCrypt native UNICODE application.
    • Workaround to avoid false positive detection by some anti-virus software.
    • Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
    • Solve issue that caused in some cases configuration and history XML files to be updated even when not needed.
    • Fix leak of path of selected keyfiles in RAM.
    • Fix TB unit can't be deselected in VeraCryptExpander.
    • Add Alt+i keyboard shortcut for "Use PIM" checkbox.
    • Minor GUI and translations fixes.

Updated Release: VeraCrypt version 1.17-BETA16 (janv. 16, 2016)

$
0
0

Changes between 1.16 and 1.17-BETA16 (16 January 2016) :

  • All OSs:
    • Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption)
    • Cut mount/boot time by half thanks to a clever optimization of key derivation (found by Xavier de Carné de Carnavalet)
  • Windows:
    • Fix dll hijacking issue affecting installer that allows code execution with elevation of privilege (CVE-2016-1281). Reported by Stefan Kanthak (http://home.arcor.de/skanthak/)
    • Sign binaries using both SHA-1 and SHA-256 to follow new Microsoft recommendations.
    • Solve issues under Comodo/Kaspersky when running an application from a VeraCrypt volume (Reported and fixed by Robert Geisler)
    • Bootloader: Protect password/PIM length by filling the fields to maximum length with '*' after ENTER
    • Solve issue with system favorites not being able to be mounted to drive A:
    • Solve lost focus issues for after displaying the waiting dialog
    • Implement PIM caching, for both system encryption and normal volumes. Add options to activate it.
    • Internal rewrite to make VeraCrypt native UNICODE application.
    • Workaround to avoid false positive detection by some anti-virus software.
    • Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
    • Solve issue that caused in some cases configuration and history XML files to be updated even when not needed.
    • Fix leak of path of selected keyfiles in RAM.
    • Fix TB unit can't be deselected in VeraCryptExpander.
    • Add Alt+i keyboard shortcut for "Use PIM" checkbox.
    • Minor GUI and translations fixes.

Commented Unassigned: A "security Leak". [348]

$
0
0
Veracrypt 1.17 beta remember the location (path) and the name of the last used keyfile. Now, every person that uses my computer knows the last keyfile I used. The Veracrypt 1.16 does not remember that and always takes the user to the home folder. An additional suggestion: like the PIM, there should be an option for caching the HMAC for faster mount.
Comments: Thanks for spotting this. The issue was caused by a RAM buffer containing the last selected keyfiles and this buffer was not sanitized correctly. I have corrected this: https://veracrypt.codeplex.com/SourceControl/changeset/9788103f4aed827d47c93d2de01b3c28ef061a1a I have uploaded the new installer for version 1.17-BETA16 that contains this fix but most importantly that brings a huge performance enhancement for mounting/booting since it cuts these operations times by half! Get at: https://veracrypt.codeplex.com/releases/view/619351 I'll close this issue. Don't hesitate to report any further issue.

Closed Unassigned: A "security Leak". [348]

$
0
0
Veracrypt 1.17 beta remember the location (path) and the name of the last used keyfile. Now, every person that uses my computer knows the last keyfile I used. The Veracrypt 1.16 does not remember that and always takes the user to the home folder. An additional suggestion: like the PIM, there should be an option for caching the HMAC for faster mount.

Commented Unassigned: Error "Incorrect function" when trying to access mounted file [355]

$
0
0
Hello,

I get the error "Incorrect function" when I try to access the mounted encrypted file.
its on Windows 10.

What can be wrong?
Comments: Are you running an Apple machine (like MacBook Pro)? If yes, then this has been reported before: - https://veracrypt.codeplex.com/workitem/177 - https://veracrypt.codeplex.com/workitem/341 - https://veracrypt.codeplex.com/workitem/177#CommentContainer22 You'll find the solution in these links. Waiting for your confirmation before closing this issue.

New Post: 1.17 Beta Release - Feedback or Issues

New Post: Changing PIM bug

$
0
0
What PIM value did you enter for the Current which automatically fills-in the New section and did you use a different PIM value in the New?

New Post: transparen mounting of extended partitions

$
0
0
Hello

I have a question about mounting extended volumes.
At the time of Truecrypt I had problems when mounting extended volumes.
The Boot partitions where windows was installed was fully transparent meaning that the c: partition was mounted as it was not encrypted but the extended partition like d: or e: etc were seen twice one encrypted volume and one unencrypted volume.
This is a big problem when it comes to backups. E.g. Acronis could not backup these volumes since it wants to access also the encrypted one which fails.
Also other tools showing e.g. hard disk performance tools have problems when having this "double" partitions.
Today I'm using Diskcryptor which works well because you will only see one partition (one drive). If it is loaded it is unencrypted and when unloaded the same partition (drive) is encrypted (and windows immediately asks if it should format , since it cannot read it). So everything is transparent for all SW.
As I remember on Truecrypt it was only fully transparent for the boot partition.
So the question is if this is still the same behavior on VeraCrypt? I could not find something in the documentation.

New Post: Changing PIM bug

$
0
0
Enigma2Illusion
I enter PIM - "1" in Current and don't enter anything in "New section". PIM value set up automatically
Viewing all 7620 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>