1 | <?xml version='1.0' encoding='UTF-8'?>
|
---|
2 | <!DOCTYPE topic PUBLIC "-//OASIS//DTD DITA Topic//EN" "topic.dtd">
|
---|
3 | <topic xml:lang="en-us" id="diskencryption-limitations">
|
---|
4 | <title>Limitations of Disk Encryption</title>
|
---|
5 |
|
---|
6 | <body>
|
---|
7 | <p>There are some limitations the user needs to be aware of when using this feature: </p>
|
---|
8 | <ul>
|
---|
9 | <li>
|
---|
10 | <p>This feature is part of the <ph conkeyref="vbox-conkeyref-phrases/vbox-ext"/>, which needs to be installed.
|
---|
11 | Otherwise disk encryption is unavailable. </p>
|
---|
12 | </li>
|
---|
13 | <li>
|
---|
14 | <p>Since encryption works only on the stored user data, it is currently not possible to check for metadata
|
---|
15 | integrity of the disk image. Attackers might destroy data by removing or changing blocks of data in the image
|
---|
16 | or change metadata items such as the disk size. </p>
|
---|
17 | </li>
|
---|
18 | <li>
|
---|
19 | <p>Exporting appliances which contain encrypted disk images is not possible because the OVF specification does
|
---|
20 | not support this. All images are therefore decrypted during export. </p>
|
---|
21 | </li>
|
---|
22 | <li>
|
---|
23 | <p>The DEK is kept in memory while the VM is running to be able to decrypt data read and encrypt data written by
|
---|
24 | the guest. While this should be obvious the user needs to be aware of this because an attacker might be able
|
---|
25 | to extract the key on a compromised host and decrypt the data. </p>
|
---|
26 | </li>
|
---|
27 | <li>
|
---|
28 | <p>When encrypting or decrypting the images, the password is passed in clear text using the <ph
|
---|
29 | conkeyref="vbox-conkeyref-phrases/product-name"/> API. This needs to be kept in mind, especially when using
|
---|
30 | third party API clients which make use of the webservice where the password might be transmitted over the
|
---|
31 | network. The use of HTTPS is mandatory in such a case. </p>
|
---|
32 | </li>
|
---|
33 | <li>
|
---|
34 | <p>Encrypting images with differencing images is only possible if there are no snapshots or a linear chain of
|
---|
35 | snapshots. This limitation may be addressed in a future <ph conkeyref="vbox-conkeyref-phrases/product-name"/>
|
---|
36 | version. </p>
|
---|
37 | </li>
|
---|
38 | <li>
|
---|
39 | <p>The disk encryption feature can protect the content of the disks configured for a VM only. It does not cover
|
---|
40 | any other data related to a VM, including saved state or the configuration file itself. </p>
|
---|
41 | </li>
|
---|
42 | </ul>
|
---|
43 | </body>
|
---|
44 |
|
---|
45 | </topic>
|
---|