Changeset 56609 in vbox for trunk/doc/manual
- Timestamp:
- Jun 23, 2015 5:35:00 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/doc/manual/en_US/user_AdvancedTopics.xml
r56451 r56609 3761 3761 hard disk images transparently for the guest. It does not depend on a specific 3762 3762 image format to be used. Images which have the data encrypted are not portable 3763 between VirtualBox and other virtualization software though.3763 between VirtualBox and other virtualization software. 3764 3764 </para> 3765 3765 … … 3771 3771 </para> 3772 3772 3773 <para> 3774 Since the DEK is stored as part of the VM configuration file, it is 3775 important that it is kept safe. Losing the DEK means that the data stored 3776 in the disk images is lost irrecoverably. Having complete and up to 3777 date backups of all data related to the VM is the responsibility of the 3778 user. 3779 </para> 3780 3773 3781 <sect2 id="diskencryption-limitations"> 3774 3782 <title>Limitations</title> … … 3782 3790 3783 3791 <listitem> 3784 <para>This feature is currently closed source and requires the VirtualBox extension 3785 pack to be installed to work.</para> 3792 <para>This feature is part of the Oracle VM VirtualBox Extension 3793 Pack, which needs to be installed. Otherwise disk encryption 3794 is unavailable.</para> 3786 3795 </listitem> 3787 3796 … … 3789 3798 <para>Since encryption works only on the stored user data, 3790 3799 it is currently not possible to check for metadata integrity of the disk image. 3791 Attackers might take advantage of this to remove or insert blocks of data 3792 into the image or change certain metadata items such as the disk size.</para> 3800 Attackers might destroy data by removing or changing blocks of data 3801 in the image or change metadata items such as the disk size. 3802 </para> 3793 3803 </listitem> 3794 3804 … … 3803 3813 decrypt data read and encrypt data written by the guest. While this should 3804 3814 be obvious the user needs to be aware of this because an attacker might be able 3805 to extract the key on a compromised host and get access to the data later.</para>3815 to extract the key on a compromised host and decrypt the data.</para> 3806 3816 </listitem> 3807 3817 3808 3818 <listitem> 3809 <para>When encrypting or decrypting the images, the password is passed unencrypted 3810 via the Main API from the frontend to VBoxSVC. This needs to be kept in mind, 3811 especially when using third party frontends which make use of the webservice 3812 where the password might be transmitted unencrypted over the network.</para> 3819 <para>When encrypting or decrypting the images, the password is 3820 passed in clear text via the VirtualBox API. This needs to be kept 3821 in mind, especially when using third party API clients which make 3822 use of the webservice where the password might be transmitted 3823 over the network. The use of HTTPS is mandatory in such a case. 3824 </para> 3813 3825 </listitem> 3814 3826 3815 3827 <listitem> 3816 <para>Encrypting images with differencing images is only possible if there3817 are no branches. This limitation may be addressed in a future3818 VirtualBox version.</para>3828 <para>Encrypting images with differencing images is only possible if 3829 there are no snapshots or a linear chain of snapshots. This 3830 limitation may be addressed in a future VirtualBox version.</para> 3819 3831 </listitem> 3820 3832
Note:
See TracChangeset
for help on using the changeset viewer.