Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
FileVault
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Apple disk encryption software}} {{Use mdy dates|date=October 2013}} {{Infobox software | name = FileVault | logo = | logo_size = x64px | screenshot = | screenshot_size = 300px | caption = FileVault in the [[System Preferences]] under Security | other_names = [[Disk encryption software]] | operating system = [[macOS]] | license = Proprietary }} '''FileVault''' is a [[disk encryption software|disk encryption program]] in [[Mac OS X Panther|Mac OS X 10.3 Panther]] (2003) and later. It performs [[on-the-fly encryption]] with [[Volume (computing)|volumes]] on [[Macintosh|Mac]] computers. ==Versions and key features== FileVault was introduced with [[Mac OS X Panther|Mac OS X 10.3 Panther]],<ref>{{cite web | url=https://www.apple.com/newsroom/2003/06/23Apple-Previews-Mac-OS-X-Panther/ | title=Apple Previews Mac OS X "Panther" | publisher=Apple | work=Apple Press Info | date=June 23, 2003 | access-date=January 21, 2013}}</ref> and could only be applied to a user's home directory, not the startup volume. The [[operating system]] uses an encrypted [[sparse disk image]] (a large single file) to present a volume for the home directory. [[Mac OS X Leopard|Mac OS X 10.5 Leopard]] and [[Mac OS X Snow Leopard|Mac OS X 10.6 Snow Leopard]] use more modern [[Sparse image#Sparse bundle|sparse bundle disk images]]<ref>{{cite web | url=http://macosx.com/forums/articles/296196-live-filevault-sparse-bundle-backups-leopard.html | title=Live FileVault and Sparse Bundle Backups in Leopard | website=macosx.com | date=November 5, 2007 | access-date=January 21, 2013 | author=ScottW | archive-url=https://web.archive.org/web/20131029200702/http://macosx.com/forums/articles/296196-live-filevault-sparse-bundle-backups-leopard.html | archive-date=October 29, 2013 | url-status=dead }}</ref> which spread the data over 8 MB files (called ''bands'') within a bundle. Apple refers to this original iteration of FileVault as "legacy FileVault".<ref name=aboutfv2 /> [[OS X Lion|OS X 10.7 Lion]] and newer versions offer '''FileVault 2''',<ref name=aboutfv2>{{cite web|title=OS X: About FileVault 2|url=http://support.apple.com/kb/HT4790|publisher=Apple Inc|access-date=September 5, 2012|author=Apple Inc |date=August 9, 2012|archive-url=https://web.archive.org/web/20141029195559/http://support.apple.com/kb/HT4790|archive-date=2014-10-29}}</ref> which is a significant redesign. This encrypts the entire OS X startup volume and typically includes the home directory, abandoning the disk image approach. For this approach to [[disk encryption]], authorised users' information is loaded from a separate non-encrypted [[boot volume]]<ref>{{cite web|title=Best Practices for Deploying FileVault 2|url=http://training.apple.com/pdf/WP_FileVault2.pdf|publisher=Apple Inc|access-date=September 5, 2012|author=Apple Inc|page=40|date=August 17, 2012|archive-url=https://web.archive.org/web/20170822164742/http://training.apple.com/pdf/WP_FileVault2.pdf|archive-date=August 22, 2017|url-status=dead}}</ref> (partition/slice type Apple_Boot). ==FileVault== The original version of FileVault was added in Mac OS X Panther to encrypt a user's home directory. ===Master passwords and recovery keys=== When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.<ref name="aboutfv2" /> FileVault recovery key is different from a [[macOS|Mac]] recovery key, which is a 28-character code used to reset your password or regain access to your [[Apple ID]]. ===Migration=== Migration of FileVault home directories is subject to two limitations:<ref>{{cite web | url=https://support.apple.com/kb/HT1554 | title=Archived - Mac OS X 10.3, 10.4: Transferring data with Setup Assistant / Migration Assistant FAQ | publisher=Apple | work=Apple support | access-date=January 21, 2013}}</ref> * there must be no prior migration to the target computer * the target must have no existing user accounts. If Migration Assistant has already been used or if there are user accounts on the target: * before migration, FileVault must be disabled at the source. If transferring FileVault data from a previous Mac that uses 10.4 using the built-in utility to move data to a new machine, the data continues to be stored in the old sparse image format, and the user must turn FileVault off and then on again to re-encrypt in the new sparse bundle format. ===Manual encryption=== Instead of using FileVault to encrypt a user's home directory, using [[Disk Utility]] a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, {{mono|~/Documents/private}}). This encrypted image behaves similar to a FileVault encrypted home directory, but is under the user's maintenance. Encrypting only a part of a user's home directory might be problematic when applications need access to the encrypted files, which will not be available until the user mounts the encrypted image. This can be mitigated to a certain extent by making [[symbolic links]] for these specific files. ===Limitations and issues=== ====Backups==== {{hatnote|These limitations apply to versions of Mac OS X prior to OS X 10.7 Lion only.}} Without Mac OS X Server, [[Time Machine (macOS)|Time Machine]] will back up a FileVault home directory only while the user is logged out. In such cases, Time Machine is limited to backing up the home directory in its entirety. Using Mac OS X Server as a Time Machine destination, backups of FileVault home directories occur while users are logged in. Because FileVault restricts the ways in which other users' processes can access the user's content, some third party backup solutions can back up the contents of a user's FileVault home directory only if other parts of the computer (including other users' home directories) are excluded.<ref>{{cite web | url=http://support.crashplanpro.com/doku.php/recipe/encrypted_disks | title=Using Encrypted Disks | publisher=CrashPlan PROe | work=CrashPlan PROe support | access-date=January 21, 2013 | archive-date=January 14, 2013 | archive-url=https://web.archive.org/web/20130114071806/http://support.crashplanpro.com/doku.php/recipe/encrypted_disks | url-status=dead }}</ref><ref>{{cite web | url=http://support.crashplan.com/doku.php/how_to/use_with_filevault | title=Using CrashPlan with FileVault | publisher=CrashPlan | work=CrashPlan support | access-date=January 21, 2013 | archive-date=October 20, 2013 | archive-url=https://web.archive.org/web/20131020011200/http://support.crashplan.com/doku.php/how_to/use_with_filevault | url-status=dead }}</ref> ====Issues==== Several shortcomings were identified in legacy FileVault. Its security can be broken by cracking either 1024-bit [[RSA (algorithm)|RSA]] or [[3DES-EDE]]. Legacy FileVault used the CBC mode of operation (see [[Disk encryption theory#CBC-based approaches|disk encryption theory]]); FileVault 2 uses stronger XTS-AES mode. Another issue is storage of keys in the macOS "safe sleep" mode.<ref name="nsa-vilefault">{{Cite conference |conference=23rd Chaos Communication Congress |location=Berlin |author-link1=Jacob Appelbaum |first1=Jacob |last1=Appelbaum |first2=Ralf-Philipp |last2=Weinmann |date=December 29, 2006 |title=Unlocking FileVault: An Analysis of Apple's disk encryption |url=https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf |access-date=March 31, 2007}}</ref> A study published in 2008 found [[data remanence]] in [[dynamic random-access memory]] (DRAM), with data retention of seconds to minutes at room temperature and much longer times when memory chips were cooled to low temperature. The study authors were able to use a [[cold boot attack]] to recover cryptographic keys for several popular disk encryption systems, including FileVault, by taking advantage of redundancy in the way keys are stored after they have been expanded for efficient use, such as in [[key scheduling]]. The authors recommend that computers be powered down, rather than be left in a "sleep" state, when not in physical control by the owner.<ref>{{Cite conference |conference=17th USENIX Security Symposium |location=San Jose, CA |title=Lest We Remember: Cold Boot Attacks on Encryption Keys |first=J. Alex |last=Halderman |date=February 2008 |url=http://citpsite.s3.amazonaws.com/wp-content/uploads/2019/01/23195456/halderman.pdf |display-authors=etal |df=mdy |author-link=J. Alex Halderman}}</ref> Early versions of FileVault automatically stored the user's passphrase in the system keychain, requiring the user to notice and manually disable this security hole. In 2006, following a talk at the 23rd [[Chaos Communication Congress]] titled ''Unlocking FileVault: An Analysis of Apple's Encrypted Disk Storage System'', [[Jacob Appelbaum]] & Ralf-Philipp Weinmann released ''VileFault'' which decrypts encrypted Mac OS X disk image files.<ref name="nsa-vilefault" /> A free space wipe using [[Disk Utility]] left a large portion of previously deleted file remnants intact. Similarly, FileVault compact operations only wiped small parts of previously deleted data.<ref>{{cite web | url=http://www.zdziarski.com/blog/?p=266 | title=File Vault's Dirty Little Secrets |date=January 1, 2008 |first=Jonathan |last=Zdziarski}}</ref> ==FileVault 2== ===Security=== FileVault uses the user's login password as the encryption passphrase. It uses the [[Disk encryption theory|XTS-AES]] mode of [[Advanced Encryption Standard|AES]] with 128 bit blocks and a 256 bit key to encrypt the disk, as recommended by [[NIST]].<ref name="wpfv2" /><ref>{{cite journal | url=http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf | title=Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices | author=Dworkin, Morris | journal=NIST Special Publication |date=January 2010 | issue=800–3E| doi=10.6028/NIST.SP.800-38E }}</ref> Only unlock-enabled users can start or unlock the drive. Once unlocked, other users may also use the computer until it is shut down.<ref name=aboutfv2 /> ===Performance=== The [[I/O]] performance penalty for using FileVault 2 was found to be in the order of around 3% when using CPUs with the [[AES instruction set]], such as the [[Broadwell (microarchitecture)|Intel Core i]], and [[OS X Yosemite|OS X 10.10.3 Yosemite]].<ref>{{cite web |url=https://archive.techarp.com/showarticle0037.html?artno=877&pgno=1 |website=Tech ARP |title=How Fast is the 512 GB PCIe X4 SSD in the 2015 MacBook Pro?}}</ref> Performance deterioration will be larger for CPUs without this instruction set, such as older [[Intel Core (microarchitecture)|Core]] CPUs. ===Master passwords and recovery keys=== When FileVault 2 is enabled while the system is running, the system creates and displays a recovery key for the computer, and optionally offers the user to store the key with Apple. The 120 bit recovery key is encoded with all letters and numbers 1 through 9, and read from {{mono|/dev/random}}, and therefore relies on the security of the [[Pseudorandom number generator|PRNG]] used in macOS. During a cryptanalysis in 2012, this mechanism was found safe.<ref name=choudary2012>{{cite journal|last=Choudary|first=Omar|author2=Felix Grobert |author3=Joachim Metz |title=Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption|date=July 2012|url=http://eprint.iacr.org/2012/374|access-date=January 19, 2013}}</ref> Changing the recovery key is not possible without re-encrypting the File Vault volume.<ref name="aboutfv2" /> ===Validation=== Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running {{mono|sudo fdesetup validaterecovery}} in Terminal after encryption has finished. The key must be in form {{mono|xxxx-xxxx-xxxx-xxxx-xxxx-xxxx}} and will return true if correct.<ref>{{cite web | url=https://developer.apple.com/library/Mac/documentation/Darwin/Reference/ManPages/man8/fdesetup.8.html | title=fdesetup(8) Mac OS X Manual Page | publisher=[[Apple Inc.|Apple]] | date=August 21, 2013 | access-date=August 9, 2014}}</ref> ==Starting the OS with FileVault 2 without a user account== If a volume to be used for startup is erased and encrypted before clean installation of OS X 10.7.4 Lion or 10.8 Mountain Lion: * there is a password for the volume * the clean system will immediately behave as if FileVault was enabled ''after'' installation * there is no recovery key, no option to store the key with Apple (but the system will behave as if a key was created) * when the computer is started, ''Disk Password'' will appear at the EfiLoginUI – this may be used to unlock the volume and start the system * the running system will present the traditional login window. Apple describes this type of approach as ''Disk Password—based DEK''.<ref name="wpfv2">{{cite web|title=Best Practices for Deploying FileVault 2|url=http://training.apple.com/pdf/WP_FileVault2.pdf|publisher=Apple, Inc|access-date=September 5, 2012|author=Apple, Inc|page=28|date=August 17, 2012|archive-url=https://web.archive.org/web/20170822164742/http://training.apple.com/pdf/WP_FileVault2.pdf|archive-date=August 22, 2017|url-status=dead}}</ref> ==See also== * [[Keychain (software)|Keychain]] * [[BitLocker]] * [[TrueCrypt]] * [[VeraCrypt]] * [[Linux Unified Key Setup]] ==References== {{Reflist|30em}} {{macOS}} [[Category:MacOS]] [[Category:Cryptographic software]] [[Category:Disk encryption]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite conference
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Hatnote
(
edit
)
Template:Infobox
(
edit
)
Template:Infobox software
(
edit
)
Template:MacOS
(
edit
)
Template:Main other
(
edit
)
Template:Mono
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Template other
(
edit
)
Template:Use mdy dates
(
edit
)