- Oct 7, 2005
- 2,777
- 3
- 76
(Disclaimer: No, I didn't format my windows drive without backing up a recovery certificate
)
I kind of assumed that the process went like this:
- New user is created.
- EFS certificate is created. Private key is symmetrically encrypted using the user's password, then stored on disk.
- User logs in. Their password is used to decrypt their EFS private key, key is stored in memory.
- Private key in memory is used to decrypt FEK's and whatever else.
I skimmed most of the Microsoft documentation and googled around some, but I couldn't find anything that explicitly stated that the private key is actually encrypted.
If NTFS permissions were the only barrier, anyone who stole a hard drive could just mount it on another system, take ownership of the private keys, and decrypt the rest of the files (right?).
Or am I completely misunderstanding something?
I kind of assumed that the process went like this:
- New user is created.
- EFS certificate is created. Private key is symmetrically encrypted using the user's password, then stored on disk.
- User logs in. Their password is used to decrypt their EFS private key, key is stored in memory.
- Private key in memory is used to decrypt FEK's and whatever else.
I skimmed most of the Microsoft documentation and googled around some, but I couldn't find anything that explicitly stated that the private key is actually encrypted.
If NTFS permissions were the only barrier, anyone who stole a hard drive could just mount it on another system, take ownership of the private keys, and decrypt the rest of the files (right?).
Or am I completely misunderstanding something?
