On Wednesday, December 4, 2019 5:09:55 PM MST Chris Murphy wrote:
> On Wed, Dec 4, 2019 at 4:41 PM Marius Schwarz <fedora...@cloud-foo.de>
> wrote:
> >
> >
> > Am 04.12.19 um 02:02 schrieb Chris Murphy:
> > 
> > > Anaconda custom partitioning has a per mount point encryption option.
> > > I can LUKS encrypt only the volume mounted at /home. And if I do this,
> > 
> > If you do this, someone can manipulate your system to trojan horse your
> > passwords,
> > when he has physical access to it.
> >
> >
> >
> > Full-Diskencryption ( /boot included ) is the only way to protect the
> > system itself.
> > Anything else is simply not secure.
> 
> 
> systemd-homed doesn't depend on /etc/passwd or /etc/shadow for
> authentication. By all means its security guarantees should be
> evaluated.
> https://github.com/systemd/systemd/pull/14096
> 
> What you're talking about is entirely up to the user to configure
> manually. Fedora installations today don't support bootloader lock
> down, encrypted /boot, or purging the LUKS key from memory during
> suspend, out of the box. And therefore I'm not sure what your goal
> posts are, what two things you're comparing.

It may be the case that the GNOME Spin doesn't support that, but it is 
supported with the KDE Spin. I don't think it's likely that anything in the 
GNOME image would break that, but it's possible I suppose.

-- 
John M. Harris, Jr.
Splentity

_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to