On Saturday, February 2, 2002, at 10:58 PM, Dr. Evil wrote:

>>> Encrypted disks are still rare, but that is because raids
>>> that seize people's computers are rare.  Of course it is
>>> regrettable that disk encryption is not part of the operating
>>> system -- but if Microsoft put it in before we had a strong,
>>> widely adopted system, they would doubtless muck it up.
>>
>>      Even if they do it after they will still muck it up.
>
> Microsoft does support encrypted disks.  They do in Windows XP and I
> think they may have had it earlier too.  Who doesn't support encrypted
> disk?  The open source guys.  There is only _one_ open source OS that

        Encrypting disks on server type systems is of really marginal utility.

        You have 2 choices of when to "mount" a volume, on boot, or on demand. 
For a system that runs for long periods of time:

example01: uptime
  9:51AM  up 292 days, 23:46, 22 users, load averages: 0.09, 0.09, 0.08

[iso:~] petro% uptime
10:41AM  up 12 days,  9:12, 7 users, load averages: 0.81, 0.58, 0.44

[petro@lists petro]$ uptime
  10:29am  up 45 days, 18:37,  5 users,  load average: 0.00, 0.00, 0.00

Mounting a file system, especially the OS/Application parts (as opposed to 
user or "home" directories) is, quite frankly silly. Once the disk is 
mounted an attacker has plenty of access to the volume, and the disk is 
likely to stay mounted for weeks at a time. To have to enter a password to 
boot the machine can really be a pain in the ass, especially if the one or 
two people who know the password aren't around when you need the machine 
restarted.

Mounting home directories makes more sense, and the proper way to do that 
is when the user logs in, but you still have the issue of the contents 
being exposed while they are logged in.

Allowing the user--any user--to mount and unmount encrypted filesystems at 
will *is* the proper way to do this, and that is, on Unix, best done via 
some sort of loopback filesystem It allows for all of the things that 
Admins want to be able to do with their systems, back them up, move files 
from one disk to another, volume management (like LVM) etc. *and* allows 
the end user to *control their own level of privacy*.


> currently supports encrypted disk in a non-kludge way (loopback FS
> counts as a kludge).  That is Mandrake Linux in their 8.2 beta

        No, Blazes local NFS is a kludge. Some sort of Loopback is the *right* 
way to go about this for most needs.

> version.  That's it.  OpenBSD with its "crypto everywhere"?  No, it
> should be "crypto everywhere except on the disk."  The upcoming

        Funny, aren't they the ones that allow the use of an encrypted swap 
partition? Now *that* is the right way to do it.

> versions of ResierFS for Linux will support plugable modules which
> will allow easier encryption, so eventually it will be availbe for
> Linux.  I just wish OpenBSD would get this in there so they could
> actually live up to their reputation.

        I'd prefer they get dual processor support working first. For that 
much encryption, they're going to need it.

--
Crypto is about a helluva lot more than just PGP and RSA...it's about
building the I-beams and sheetrock that will allow robust structures to be
built, it's about the railroad lines and power lines that will connect the
structures, and it's about creating Galt's Gulch in cyberspace, where it
belongs.--Tim May

Reply via email to