On Mon, Feb 21, 2011 at 2:00 AM, Heddle Weaver <[email protected]>wrote:

>
>
> On 21 February 2011 15:32, Erwan David <[email protected]> wrote:
>
>> On 21/02/11 05:05, Ron Johnson wrote:
>> > On 02/20/2011 09:46 PM, Heddle Weaver wrote:
>> >> Greetings all,
>> >>
>> >> looking at the collective knowledge factor, what's the best disc
>> >> encryption package?
>> >
>> > Do you want to encrypt *everything* of just a few folders?
>>
>
> Everything, including swap.
>

Like Erwan, I use cryptsetup/LUKS. Doing so through the installer will
allow/require you to encrypt swap. However, you will be unable to encrypt
/boot. The boot manager will need to access /boot to be able to access
cryptsetup to decrypt the filesystems.

That said, if you don't want a decrypted /boot living on your hard drive,
you can insert a thumb drive (512MB-1GB if you can find one that small)
during install and configure it as /boot. Have a backup stick and regularly
rsync it to account for updated packages, etc as well as in case the first
drive fails. I have done this on a couple of laptops.



>  >
>> >> What's everybody using?
>> >> Two examples of Xzibit this week and hash changes showing up in the
>> >> logs.
>>
>
>
Also, please remember, when the system is running, the filesystem is
*decrypted*. Encryption is not going to protect you when the system is
running. I am not familiar with the xzibit rootkit, but you should probably
be looking more toward an IDS/IPS (intrusion detection/prevention system),
such as snort, ossec, etc rather than encryption as your defense...try and
have multiple layers of security, so that bypassing one will trigger
another.

--b

Reply via email to