Mike Hommey, 2010-09-23 17:14:01 +0200 :

> On Thu, Sep 23, 2010 at 11:50:26PM +0900, Osamu Aoki wrote:
>> On Thu, Sep 23, 2010 at 03:13:06PM +0100, Simon McVittie wrote:
>> ...
>> > By policy, we use full-disk encryption at my workplace (where full-disk
>> > really means "except the bootloader and /boot"). For a 2-year-old recipe 
>> > for
>> > it, which I believe still mostly works with grub2, see
>> > http://smcv.pseudorandom.co.uk/2008/09/cryptroot/
>> 
>> Can we maintain suspend/resume type-features with such configuration?
>> 
>> Unless we use unencrypted swap, it seems we have to give up
>> suspend/resume.  Then we a bit of loose security ....
>> 
>> How people cope with this on laptop ... I am curious.
>
> You only need to give up *randomized* swap encryption. You can still
> have an encrypted swap, you just can't use a random key.

Indeed.  My current setup is that sda1 is small, unencrypted and holds
/boot only.  sda2 is the whole rest of the hard disk, and it's mapped to
a LUKS device used as a physical volume for LVM, and there are several
LVs on there, including those mounted as filesystems and one for swap.

Roland.
-- 
Roland Mas

Au royaume des aveugles, il y a des borgnes à ne pas dépasser.
  -- in Soeur Marie-Thérèse des Batignoles (Maëster)


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/87lj6seask....@mirexpress.internal.placard.fr.eu.org

Reply via email to