On Wed, Apr 08, 2009 at 11:26:20AM -0400, H.S. wrote:
> Douglas A. Tutty wrote:
> > On Tue, Apr 07, 2009 at 06:17:56PM -0400, H.S. wrote:
> >> Douglas A. Tutty wrote:
> >>> On Tue, Apr 07, 2009 at 05:46:31PM -0400, H.S. wrote:
> >>>> Douglas A. Tutty wrote:
 
> > $ cat /proc/swaps:
> > Filename                    Type            Size    Used    Priority
> > /dev/mapper/sda2_crypt              partition       979956  0       -1
> > 
> > $ mount | grep -i /tmp
> > /dev/mapper/sdb1_crypt on /var/tmp type ext3 (rw,data=journal)
> > tmpfs on /tmp type tmpfs (rw,size=500m)
 
> > There are a limited number of place where a piece of software can leak
> > info:
> > 
> > 1.  to /tmp:                Its encrypted
> > 2.  to /var/tmp:            Its encrypted
> > 3.  to somewhere on ~/      I have /home encrypted
> > 4.  left in swap            its encrypted
> > 5.  in a core dump after a crash:   use ulimit (see man bash) to
> >                                     limit core dump size to 0
> > 
> > Of course, the uncrypted data is in memory, so anything that can read
> > any memory segment can read your data.
 
 
> I am curious, what is the performance cost to have your ~/ and /tmp and
> /swap encrypted? What kind of machine are you using?

I see no performance cost and I've done this on a PII-233 on old IDE
disks and now on a PII-450 with two SCSI disks.

Think of it this way:  Data has to go out to disk.  That takes a lot of
time compared to moving data in the memory.  It doesn't take that much
time to start the encryption process (which can continue while the data
is streaming to the disk).  I'm sure its more complex than this, but
that's the idea.

If I want to have the fastest streaming possible, I'll have a
non-encrypted partition in a convenient spot, say /var/local/cache but
I've found that I haven't had a problem without it.  I suppose it may be
important if you're doing streaming video or something, but you'd want a
separate raid array for that anyway.

> Also, since you have to use mount, which requires root privileges, the
> above method is not possible for a normal (non-root) user, is it?

These partitions are all mounted on boot.  I set up the encrypted
partitions during the install (Etch).  Here's fstab:


# /etc/fstab: static file system information.
#
# <file system>                         <mount point>   <type>                  
<options>                               <dump>  <pass>
proc                                    /proc           proc                    
defaults                                0       0

#/dev/sda1                              /               ext3                    
defaults,data=journal,errors=remount-ro 0       1
LABEL=root                              /               ext3                    
defaults,data=journal,errors=remount-ro 0       1

/dev/mapper/sdb2_crypt                  /home           ext3                    
defaults,data=journal                   0       2

#/dev/sda3                              /usr            ext3                    
defaults,data=journal                   0       2
LABEL=usr                               /usr            ext3                    
defaults,data=journal                   0       2

#/dev/sda5                              /var            ext3                    
defaults,data=journal                   0       2
LABEL=var                               /var            ext3                    
defaults,data=journal                   0       2

/dev/mapper/sda6_crypt                  /var/local      ext3                    
defaults,data=journal                   0       2

/dev/mapper/sdb1_crypt                  /var/tmp        ext3                    
defaults,data=journal                   0       2

/dev/mapper/sda2_crypt                  none            swap                    
sw                                      0       0

tmpfs                                   /tmp            tmpfs                   
size=500m                               0       0

/dev/hda                                /media/cdrom0   udf,iso9660             
user,noauto                             0       0

/dev/fd0                                /media/floppy0  auto                    
rw,user,noauto                          0       0


Thus, its totally transparent to the normal user.  I have to enter the
pass phrases at boot; I've been too lazy to set it up to only require
one, so I have to do it three times (one for each encrypted partition)
(swap doesn't need a passphrase).  LUKS is flexible enough that you
could use a USB key if you like.

Doug.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to