Endpoint
5/30/2014
01:10 PM
50%
50%

The Mystery Of The TrueCrypt Encryption Software Shutdown

Developers of the open-source software call it quits, saying software "may contain unfixed security issues."

Not long after news spread that TrueCrypt was shutting down, enough theories were circulating about what happened to fill an episode of the TV show 24.

To recap: The developers of the TrueCrypt open-source, on-the-fly encryption software announced Wednesday that they were ending development of the software. In a post online, the developers state the software "is not secure as it may contain unfixed security issues." In addition, they note that the development was ended after Microsoft ended its support of Windows XP, and that later versions of the operating system "offer integrated support for encrypted disks and virtual disk images."

The post urges users to migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on their respective platforms.

"The whole situation is very odd, but there are clues to what might be happening," says Mark Bower, vice president at Voltage Security. "The TrueCrypt development team is largely anonymous, and has unclear origins. On the one hand, TrueCrypt is a product that is supposed to be transparent about its security design, yet there have always been unclear aspects to its origins. On the other hand, it was about to be put through a thorough crowd-funded technical audit. Was there something to hide? Maybe so."

Last month, iSEC Partners released a code audit of TrueCrypt and found no backdoors or serious vulnerabilities in the portion of code it reviewed, which included the Windows kernel driver and bootloader.

Tom Ritter, principal security consultant at iSEC Partners, considers the end of TrueCrypt to be a loss to the open-source community.

"They've been working on it for I think over a decade," says Ritter. "That's a very long time to work on a project, so it might be they had other commitments come up in their lives and didn't want to let the project peter out, so to speak."

The first version of TrueCrypt was released in February 2004. Since its release, it has been downloaded approximately 30 million times. While many people may have downloaded it multiple times over the years, they are still looking at millions of people who are "now stuck with a new version of the software that will only decrypt and a recommendation to move to other encryption software," blogs Steve Pate, chief architect at HyTrust:

Well, we know for sure that AES is still a rock solid encryption algorithm and is widely used across the commercial space and nation states to protect their data. As for TrueCrypt, perhaps a group of part timers just decided to call it a day and end with a cruel twist? Hopefully time will tell what really happened.

What we do know is that TrueCrypt had been put through its paces. In 2013, the Open Crypto Audit Project was funded to ensure that TrueCrypt could be analyzed from a security perspective. The first set of results were released last months and showed that there was no evidence of any backdoors. A second review is still pending and we eagerly await the results of that, but now it may be moot. Whatever the real story is, TrueCrypt's reputation has likely been fatally injured. IT managers that have been relying on TrueCrypt will rightly be concerned about their organizations data security and their own reputation, will be seeking professional alternatives. Strange days.

Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
freewill78
50%
50%
freewill78,
User Rank: Apprentice
11/11/2014 | 5:50:21 PM
It is Obvious
Common, for me it is very clear; that government or security agents; could not find a hole and convience truecrypt guys to close it. I am sure microsoft has special holes for bitlocker. Everybody knows; apple, microsoft and big companies share information with national security agent. Gates also stated in an interveiw that they can share information for national benefits.

On the other hand; Me from outside of U.S.  I have no offense on these companies or national security agent; I love microsoft and its products; they are doing great things for the world development progress; and I can make money by help of their products.

 

 

 

 
AbeG
50%
50%
AbeG,
User Rank: Apprentice
6/16/2014 | 10:36:29 PM
Re: TruCrypt users
I can't imagine how any corporation with a responsible IT Department would be able to justify widescale use of truecrypt.  Assuming that no security issues are found with TrueCrypt, it's a great program.  However, it cannot be centraly managed, and for an Enterprise, that alone is usually a deal breaker.

It's hard to get upset with an open source project like this that is loved by many yet funded by few.  It seems as though software development is sharing the same fate as media organizations.  The trend being that high quality content/software should be funded by advertising, except when advertising interferes too much with the product.  In those cases, the product should be free with no advertising.
AbeG
50%
50%
AbeG,
User Rank: Apprentice
6/16/2014 | 10:15:57 PM
Re: TruCrypt users
@shakeeb.  There are a number of alternatives for TrueCrypt.  I ran a search on alternative.to (http://alternativeto.net/software/truecrypt/) and looks like everyone should consider switching over to DiskCryptor.

I thought this was a compelling argument:

"The only open-source alternative to DiskCryptor that has comparable features is TrueCrypt. However, because of the restrictive license under which TrueCrypt is provided — the TrueCrypt Collective License — TrueCrypt cannot be classified as a truly free software, as it places limits on the use and modification of its source code by developers. There are other alternatives with similar functionality, but they are fully proprietary ones, which makes them unacceptable to use for protection of confidential data."
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
6/2/2014 | 2:54:51 PM
Re: Take it at face value
@gev

You wrote: 

"The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images."

What does it mean? Have any idea of the number of downloads collected by TrueCrypt?

 

Do you believe that TrueCrypt users are only XP users?

I believe that there is much more.

 
gev
50%
50%
gev,
User Rank: Moderator
6/2/2014 | 2:45:44 PM
Take it at face value
Right there at the top of the page, it says:

 

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images.

 

How come the author ignores the simplest explanation?

Because then there would be mistery, and hence no article.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/31/2014 | 10:47:50 PM
Re: http://truecrypt.ch/
I agree, we need to understand that though its difficult to update encryption technologies its very necessary. Think of it as patching a security safeguard. Security tools need to evolve in hopes to combat volatile emergent threats. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
5/31/2014 | 2:47:07 AM
Re: http://truecrypt.ch/
@christianabryant- I feel that these encryption tools need to evolve. Some of them are still in the initial versions (no one has taken steps to upgrade them as the threats increase). 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
5/31/2014 | 2:44:36 AM
Re: TruCrypt users
@theb0x – thanks for sharing, does this mean that hackers can't get through without having physical access to the system?
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
5/31/2014 | 2:42:18 AM
Re: TruCrypt users
It's scary to see how software encryption will no longer help us to protect our data. I wonder what TruCrypt users will do next to ensure their data is kept safe. 
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
5/30/2014 | 6:26:47 PM
http://truecrypt.ch/
I've never used TrueCrypt, but have always been aware of it as a FOSS user and supporter.  I find it interesting how quickly http://truecrypt.ch/ was raised with the seeming intent to continue TrueCrypt as a forked project.  In the FOSS world there is absolutely nothing odd about this; I'm forking a codebase right now, in fact.  But because this is TrueCrypt, one wonders at the motivation for the Swiss team.  I suspect there is a money pile waiting for the right group that can support TrueCrypt as a service provider for those IT shops using the software that would rather stagnate than evolve.  I think the fork is the right thing to do, provided the new team has the needed skills to move the project forward. 

Note:  Search off the phrase "TrueCrypt Developers Association. All rights reserved." and you will find many other projects that include embedded TrueCrypt code.  Food for thought...
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.