Misplaced Pages

TrueCrypt

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Source-available software is software released through a source code distribution model that includes arrangements where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source . The licenses associated with the offerings range from allowing code to be viewed for reference to allowing code to be modified and redistributed for both commercial and non-commercial purposes.

#606393

66-761: TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a partition , or encrypt the whole storage device ( pre-boot authentication ). On 28 May 2014, the TrueCrypt website announced that the project was no longer maintained and recommended users find alternative solutions. Though development of TrueCrypt has ceased, an independent audit of TrueCrypt (published in March 2015) has concluded that no significant flaws are present. Two projects forked from TrueCrypt: VeraCrypt (active) and CipherShed (abandoned). TrueCrypt

132-449: A John Doe TrueCrypt user could not be compelled to decrypt several of his hard drives. The court's ruling noted that FBI forensic examiners were unable to get past TrueCrypt's encryption (and therefore were unable to access the data) unless Doe either decrypted the drives or gave the FBI the password, and the court then ruled that Doe's Fifth Amendment right to remain silent legally prevented

198-478: A TrueCrypt target called "tcw" since Linux version 3.13. Individual ciphers supported by TrueCrypt are AES , Serpent , and Twofish . Additionally, five different combinations of cascaded algorithms are available: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. The cryptographic hash functions available for use in TrueCrypt are RIPEMD-160 , SHA-512 , and Whirlpool . Early versions of TrueCrypt until 2007 also supported

264-467: A bus-mastering device capturing memory , or install any other malicious hardware or software , allowing the attacker to capture unencrypted data (including encryption keys and passwords), or to decrypt encrypted data using captured passwords or encryption keys. Therefore, physical security is a basic premise of a secure system. Attacks such as this are often called " evil maid attacks ". TrueCrypt documentation states that TrueCrypt cannot secure data on

330-562: A combination of the Apache License 2.0 and the Commons Clause. In September 2018, Matthew Garrett criticized Commons Clause calling it an "older way of doing things" and said it "doesn't help the commons ". Business Source License has been introduced by MariaDB Corporation in 2016 and rapidly became one of the most adopted "delayed open source" licenses. It prohibits use of the code in production environments, where

396-503: A commercial license is required. Functional Source License has been introduced in November 2023 by Sentry, as a simpler alternative to Business Source License. It prohibits any "competing" use of the code, to preserve the rights of the author to economically exploit it, but applies for a limited time, after which the code itself is considered to be available under Apache License or MIT License . The GitLab Enterprise Edition License

462-547: A computer if it has any kind of malware installed. Malware may log keystrokes, thus exposing passwords to an attacker. The "Stoned" bootkit , an MBR rootkit presented by Austrian software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009, has been shown capable of tampering TrueCrypt's MBR, effectively bypassing TrueCrypt's full volume encryption . Potentially every hard disk encryption software

528-580: A computer security company. According to the TrueCrypt Team, Hafner claimed in the email that the acknowledged author of E4M, developer Paul Le Roux , had stolen the source code from SecurStar as an employee. It was further stated that Le Roux illegally distributed E4M, and authored an illegal license permitting anyone to base derivative work on the code and distribute it freely. Hafner alleges all versions of E4M always belonged only to SecurStar, and Le Roux did not have any right to release it under such

594-442: A distributed .htaccess file: Here is an example using a .htaccess file to redirect a non-secure URL to a secure address without the leading "www": A custom directory redirect, using an index.html file: Here is an example using Perl CGI.pm : Here is an example using a PHP redirect: Here is one way to redirect using Express.js : Equivalently simple for an nginx configuration: Both Bing and Google recommend using

660-422: A file system protected by TrueCrypt. TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again (this does not apply to a common case of a stolen, lost, or confiscated computer). The attacker having physical access to a computer can, for example, install a hardware/software keylogger ,

726-571: A license. This led the TrueCrypt Team to immediately stop developing and distributing TrueCrypt, which they announced online through usenet . TrueCrypt Team member David Tesařík stated that Le Roux informed the team that there was a legal dispute between himself and SecurStar, and that he received legal advisement not to comment on any issues of the case. Tesařík concluded that should the TrueCrypt Team continue distributing TrueCrypt, Le Roux may ultimately be held liable and be forced to pay consequent damages to SecurStar. To continue in good faith, he said,

SECTION 10

#1732781058607

792-422: A paper published in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista , Microsoft Word , Google Desktop , and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature

858-501: A security warning when mounting CBC mode volumes and recommend that they be replaced with new volumes in XTS mode. The header key and the secondary header key (XTS mode) are generated using PBKDF2 with a 512- bit salt and 1000 or 2000 iterations, depending on the underlying hash function used. TrueCrypt supports a concept called plausible deniability , by allowing a single "hidden volume" to be created within another volume. In addition,

924-484: A software to be both source-available software and proprietary software (e.g. id Software 's Doom ). In contrast, the definitions of free software and open-source software are much narrower. Free software and/or open-source software is also always source-available software , but not all source-available software is also free software and/or open-source software. This is because the official definitions of those terms require considerable additional rights as to what

990-406: A substantial order and sign a non-disclosure agreement before being allowed to review the code for security. Le Roux himself has denied developing TrueCrypt in a court hearing in March 2016, in which he also confirmed he had written E4M. Months later on 7 June 2004, TrueCrypt 2.0 was released. The new version contained a different digital signature from that of the original TrueCrypt Team, with

1056-427: A test carried out by Tom's Hardware , although TrueCrypt is slower compared to an unencrypted disk, the overhead of real-time encryption was found to be similar regardless of whether mid-range or state-of-the-art hardware is in use, and this impact was "quite acceptable". In another article the performance cost was found to be unnoticeable when working with "popular desktop applications in a reasonable manner", but it

1122-564: Is a modification of the GNU Affero General Public License created by the MongoDB project. It modifies a clause relating to usage of the licensed work over a network, stating that if SSPL-licensed software is incorporated into a "service" offered to other users, the source code for the entirety of the service (including without limitation all software and APIs that would be required for a user to run an instance of

1188-442: Is affected by this kind of attack if the encryption software does not rely on hardware-based encryption technologies like TPM , or if the attack is made with administrative privileges while the encrypted operating system is running. Two types of attack scenarios exist in which it is possible to maliciously take advantage of this bootkit: in the first one, the user is required to launch the bootkit with administrative privileges once

1254-433: Is deniable. When the TrueCrypt boot loader replaces the normal boot loader, an offline analysis of the drive can positively determine that a TrueCrypt boot loader is present and so lead to the logical inference that a TrueCrypt partition is also present. Even though there are features to obfuscate its purpose (i.e. displaying a BIOS-like message to misdirect an observer such as, "Non-system disk" or "disk error"), these reduce

1320-477: Is recommended as a precautionary measure. According to Gibson Research Corporation , Steven Barnhart wrote to an email address for a TrueCrypt Foundation member he had used in the past and received several replies from "David". According to Barnhart, the main points of the email messages were that the TrueCrypt Foundation was "happy with the audit, it didn't spark anything", and that the reason for

1386-580: Is the HTTP response status code for 301 Moved Permanently . It is used for permanent redirecting, meaning that links or records returning this response should be updated. The new URL should be provided in the Location field, included with the response. The 301 redirect is considered a best practice for upgrading users from HTTP to HTTPS . RFC 2616 states that: Client request: Server response: To fix problems with non-existing files or directories using

SECTION 20

#1732781058607

1452-665: Is used exclusively by GitLab 's commercial offering. GitLab Inc. openly discloses that the EE License makes their Enterprise Edition product "proprietary, closed source code." GitLab also releases an open-source Community Edition under the MIT License . This makes GitLab an example of an open core company. In 2016, Mega Ltd. released the source code of their Mega clients under the Mega Limited Code Review Licence, which only permits usage of

1518-546: The Apache License , but retained the TrueCrypt License for code inherited from TrueCrypt. The Open Source Initiative rejects the TrueCrypt License, as "it has elements incompatible with the OSD ." The Free Software Foundation criticizes the license for restricting who can execute the program, and for enforcing a trademark condition. BeeGFS EULA is the license of the distributed parallel file system BeeGFS, except

1584-570: The Open Source Initiative and free to the Free Software Foundation . The Commons Clause, created by Fossa, Inc., is an addendum to an open-source software license that restricts users from selling the software. Under the combined license, the software is source-available, but not open-source. On August 22, 2018, Redis Labs shifted some Redis Modules from the GNU Affero General Public License to

1650-467: The UK government filed an affidavit asking the court to allow them to retain possession of Miranda's belongings. The grounds for the request were that they could not break the encryption, and were only able to access 75 of the documents that he was carrying, which Greenwald said "most of which were probably ones related to his school work and personal use". In October 2013, British–Finnish activist Lauri Love

1716-452: The XTS mode of operation . Prior to this, TrueCrypt used LRW mode in versions 4.1 through 4.3a, and CBC mode in versions 4.0 and earlier. XTS mode is thought to be more secure than LRW mode, which in turn is more secure than CBC mode. Although new volumes can only be created in XTS mode, TrueCrypt is backward compatible with older volumes using LRW mode and CBC mode. Later versions produce

1782-547: The "Stoned" bootkit intercepts it thereafter because, from that moment on, the Stoned bootkit is loaded before TrueCrypt's MBR in the boot sequence. The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted executables with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone he/she does not trust, by booting

1848-480: The DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack

1914-498: The GPL license. Version 2.1a of the software was released on 1 October 2004 on truecrypt.sourceforge.net sub-domain . By May 2005, the original TrueCrypt website returned and truecrypt.sourceforge.net redirected visitors to truecrypt.org . On 28 May 2014, the TrueCrypt official website, truecrypt.org , began redirecting visitors to truecrypt.sourceforge.net with a HTTP 301 "Moved Permanently" status , which warned that

1980-484: The Government from making them do so. On 18 August 2013 David Miranda , partner of journalist Glenn Greenwald , was detained at London's Heathrow Airport by Metropolitan Police while en route to Rio de Janeiro from Berlin . He was carrying with him an external hard drive said to be containing sensitive documents pertaining to the 2013 global surveillance disclosures sparked by Edward Snowden . Contents of

2046-776: The Microsoft Limited Public License (Ms-LPL), the Microsoft Limited Reciprocal License (Ms-LRL), and the Microsoft Reference Source License (Ms-RSL). Prior to version 5, Scilab described itself as "the open source platform for numerical computation " but had a license that forbade commercial redistribution of modified versions. Versions 5 and later are distributed under the GPL -compatible CeCILL license. The Server Side Public License

TrueCrypt - Misplaced Pages Continue

2112-471: The PC has already booted into Windows; in the second one, analogously to hardware keyloggers , a malicious person needs physical access to the user's TrueCrypt-encrypted hard disk: in this context this is needed to modify the user's TrueCrypt MBR with that of the Stoned bootkit and then place the hard disk back on the unknowing user's PC, so that when the user boots the PC and types his/her TrueCrypt password on boot,

2178-489: The TrueCrypt Team. In the FAQ section of its website, SecurStar maintains its claims of ownership over both E4M and Scramdisk , another free encryption program. The company states that with those products, SecurStar "had a long tradition of open source software", but that "competitors had nothing better to do but to steal our source code", causing the company to make its products closed-source , forcing potential customers to place

2244-471: The Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose existence may be denied . The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third-party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In

2310-617: The announcement was that "there is no longer interest [in maintaining the project]." According to a study released 29 September 2015, TrueCrypt includes two vulnerabilities in the driver that TrueCrypt installs on Windows systems allowing an attacker arbitrary code execution and privilege escalation via DLL hijacking. In January 2016, the vulnerability was fixed in VeraCrypt , but it remains unpatched in TrueCrypt's unmaintained installers. In July 2008, several TrueCrypt-secured hard drives were seized from Brazilian banker Daniel Dantas , who

2376-665: The audit would continue as planned, with Phase II expected to begin in June 2014 and wrap up by the end of September. The Phase II audit was delayed, but was completed 2 April 2015 by NCC Cryptography Services. This audit "found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances". The French National Agency for the Security of Information Systems (ANSSI) stated that while TrueCrypt 6.0 and 7.1a have previously attained ANSSI certification, migration to an alternate certified product

2442-404: The block ciphers Blowfish , CAST-128 , TDEA and IDEA ; but these were deprecated due to having relatively lower 64-bit security and patent licensing issues. The practical security provided by TrueCrypt depends altogether on the applied encyption algorithms and their different weaknesses. TrueCrypt by itself offers no extra protection against a weak trusted algorithm. TrueCrypt currently uses

2508-448: The block size of the cipher mode and key data is either 512 bytes stored separately in the case of system encryption or two 128 kB headers for non-system containers. Forensics tools may use these properties of file size, apparent lack of a header, and randomness tests to attempt to identify TrueCrypt volumes. Although these features give reason to suspect a file to be a TrueCrypt volume, there are, however, some programs which exist for

2574-469: The client for Linux, which is licensed under GPLv2 . BeeGFS source code is publicly available from their website, and because of this they claiming BeeGFS as "Open-Source" software; it is in fact not because this license prohibits distributing modified versions of the software, or using certain features of the software without authorization. HTTP 301 On the World Wide Web , HTTP 301

2640-494: The code "for the purposes of review and commentary". The source code was released after former director Kim Dotcom stated that he would "create a Mega competitor that is completely open source and non-profit" following his departure from Mega Ltd. Microsoft's Shared Source Initiative , launched in May 2001, comprises 5 licenses, 2 of which are open-source and 3 of which are restricted. The restricted licenses under this scheme are

2706-494: The computer could have been modified by the attacker e.g. a malicious component—such as a hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent an attacker from maliciously modifying the computer, TrueCrypt will not support the TPM. In 2013 a graduate student at Concordia University published a detailed online report, in which he states that he has confirmed

TrueCrypt - Misplaced Pages Continue

2772-591: The confiscated property. In February 2014, an Arizona Department of Real Estate IT department employee, James DeSilva, was arrested on charges of sexual exploitation of a minor through the sharing of explicit images over the Internet . His computer, encrypted with TrueCrypt, was seized, and DeSilva refused to reveal the password. Forensics detectives from the Maricopa County Sheriff's Office were unable to gain access to his stored files. In

2838-449: The developers now being referred to as "the TrueCrypt Foundation." The software license was also changed to the open source GNU General Public License (GPL). However, given the wide range of components with differing licenses making up the software, and the contested nature of the legality of the program's release, a few weeks later on 21 June, version 2.1 was released under the original E4M license to avoid potential problems relating to

2904-402: The drive were encrypted by TrueCrypt, which authorities said "renders the material extremely difficult to access". Detective Superintendent Caroline Goode stated the hard drive contained around 60 gigabytes of data, "of which only 20 have been accessed to date." She further stated the process to decode the material was complex and "so far only 75 documents have been reconstructed since the property

2970-494: The encrypted operating system with TrueCrypt's Rescue Disk instead of booting it directly from the hard disk. With the rescue disk, the user can restore TrueCrypt's MBR to the hard disk. The FAQ section of the TrueCrypt website states that the Trusted Platform Module (TPM) cannot be relied upon for security, because if the attacker has physical or administrative access to the computer and you use it afterwards,

3036-520: The end of life announcement of TrueCrypt, Gibson Research Corporation posted an announcement titled "Yes... TrueCrypt is still safe to use" and a Final Release Repository to host the last official non-crippled version 7.1a of TrueCrypt. They no longer host the final release repository as of 2022. Truecrypt.org has been excluded from the Internet Archive Wayback Machine . The exclusion policy says they will exclude pages at

3102-499: The first drive track and overwriting whatever non-Windows bootloader exists there. TrueCrypt is vulnerable to various known attacks which are also present in other disk encryption software releases such as BitLocker . To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions. Some of those attacks are detailed below. TrueCrypt stores its keys in RAM; on an ordinary personal computer

3168-408: The functionality of the TrueCrypt boot loader and do not hide the content of the TrueCrypt boot loader from offline analysis. Here again, the use of a hidden operating system is the suggested method for retaining deniability. TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations (a form of asynchronous processing) to reduce

3234-545: The integrity of the distributed Windows binaries of version 7.1a. A crowdfunding campaign attempting to conduct an independent security audit of TrueCrypt was successfully funded in October 2013. A non-profit organization called the Open Crypto Audit Project (OCAP) was formed, calling itself "a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of

3300-535: The performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally use direct memory access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM. In

3366-421: The purpose of securely erasing files by employing a method of overwriting file contents, and free disk space, with purely random data (i.e. "shred" & "scrub"), thereby creating reasonable doubt to counter pointed accusations declaring a file, made of statistically random data, to be a TrueCrypt file. If a system drive, or a partition on it, has been encrypted with TrueCrypt, then only the data on that partition

SECTION 50

#1732781058607

3432-514: The service themselves) must be released under the SSPL. The license is considered non-free by the Open Source Initiative , Debian and Red Hat , as it contains conditions that are unduly discriminatory towards commercial use of the software. In 2007 Michael Tiemann , president of OSI, had criticized companies such as SugarCRM for promoting their software as "open source" when in fact it did not have an OSI-approved license. In SugarCRM's case, it

3498-550: The site owner's request. TrueCrypt supports Windows , OS X , and Linux operating systems. Both 32-bit and 64-bit versions of these operating systems are supported, except for Windows IA-64 (not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process). The version for Windows 7, Windows Vista, and Windows XP can encrypt the boot partition or entire boot drive. There is an independent, compatible implementation, tcplay, for DragonFly BSD and Linux . The Dm-crypt module included in default Linux kernel supports

3564-430: The software at sourceforge.net/truecrypt was updated to display the same initial message, and the status was changed to "inactive". The page also announced a new software version, 7.2, which only allows decryption. Initially, the authenticity of the announcement and new software was questioned. Multiple theories attempting to explain the reason behind the announcement arose throughout the tech community. Shortly after

3630-546: The software may contain unfixed security issues, and that development of TrueCrypt was ended in May 2014, following Windows XP's end of support. The message noted that more recent versions of Windows have built-in support for disk encryption using BitLocker , and that Linux and OS X had similar built-in solutions, which the message states renders TrueCrypt unnecessary. The page recommends any data encrypted by TrueCrypt be migrated to other encryption setups and offered instructions on moving to BitLocker. The SourceForge project page for

3696-470: The special prosecutor investigation for Druking in South Korea, the special prosecutor decrypted some of the files encrypted by TrueCrypt by guessing the passphrase . Source-available Any software is source-available in the broad sense as long as its source code is distributed along with it, even if the user has no legal rights to use, share, modify or even compile it. It is possible for

3762-481: The team would need to verify the validity of the E4M license. However, because of Le Roux's need to remain silent on the matter, he was unable to confirm or deny its legitimacy, keeping TrueCrypt development in limbo. Thereafter, would-be visitors reported trouble accessing the TrueCrypt website, and third-party mirrors appeared online making the source code and installer continually available, outside of official sanction by

3828-479: The user can do with the available source (including, typically, the right to use said software, with attribution, in derived commercial products). In the broad sense, any FOSS license is a source-available license. In the narrow sense, the term source-available specifically excludes FOSS software. The following source-available software licenses are considered non-free licenses because they have limitations that prevent them from being open-source according to

3894-441: The widely used encryption software TrueCrypt". The organization established contact with TrueCrypt developers, who welcomed the audit. Phase I of the audit was successfully completed on 14 April 2014, finding "no evidence of backdoors or malicious code". Matthew D. Green , one of the auditors, added "I think it's good that we didn't find anything super critical." One day after TrueCrypt's end of life announcement, OCAP confirmed that

3960-654: Was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released. There was a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks. When analyzed, TrueCrypt volumes appear to have no header and contain random data. TrueCrypt volumes have sizes that are multiples of 512 due to

4026-635: Was arrested by the National Crime Agency (NCA) on charges of hacking into a US department or agency computer and one count of conspiring to do the same. The government confiscated all of his electronics and demanded he provide them with the necessary keys to decrypt the devices. Love refused. On 10 May 2016 a District Judge ( Magistrate's Court ) rejected a request by the NCA that Love be forced to turn over his encryption keys or passwords to TrueCrypt files on an SD card and hard drives that were among

SECTION 60

#1732781058607

4092-528: Was because the software is so-called " badgeware " since it specified a "badge" that must be displayed in the user interface. SugarCRM's open source version was re-licensed under the GPL version 3 in 2007, and later the GNU Affero GPL version 3 in 2010. The TrueCrypt License was used by the TrueCrypt disk encryption utility . When TrueCrypt was discontinued, the VeraCrypt fork switched to

4158-452: Was initially received." Guardian contributor Naomi Colvin concluded the statements were misleading, stating that it was possible Goode was not even referring to any actual encrypted material, but rather deleted files reconstructed from unencrypted, unallocated space on the hard drive, or even plaintext documents from Miranda's personal effects . Greenwald supported this assessment in an interview with Democracy Now! , mentioning that

4224-559: Was initially released as version 1.0 in February 2004, based on E4M (Encryption for the Masses). Several versions and many additional minor releases have been made since then, with the most current version being 7.1a. Original release of TrueCrypt was made by anonymous developers called "the TrueCrypt Team". Shortly after version 1.0 was released in 2004, the TrueCrypt Team reported receiving email from Wilfried Hafner, manager of SecurStar,

4290-415: Was noted that "power users will complain". Installing third-party software which uses FlexNet Publisher or SafeCast (which are used for preventing software piracy on products by Adobe such as Adobe Photoshop ) can damage the TrueCrypt bootloader on Windows partitions/drives encrypted by TrueCrypt and render the drive unbootable. This is caused by the inappropriate design of FlexNet Publisher writing to

4356-589: Was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected disks. They enlisted the help of the FBI , who used dictionary attacks against Dantas' disks for over 12 months, but were still unable to decrypt them. In 2012 the United States 11th Circuit Court of Appeals ruled that

#606393