> Put all the data that really needs to be encrypted on a separate slice,
> and encrypt that. Leave the rest unencrypted, especially /boot. As a
> rule of thumb; don't bother encrypting anything that you can just
> download from the internet. :-)

Fair enough, this makes sense. Thank you.

> As you can see only /home is encrypted because the rest doesn't hold
> data worth encrypting.

Well, on mine it will.

> If you encrypted / and /usr, you might actually make the system more
> vulnerable to a known-plaintext attack, because there are a lot of files
> with well-known contents there.

I can get away with not having / encrypted, but I need /var encrypted
for databases and logs etc, /tmp so any temporary files are secured and
the swap file (swap very rarely gets used).

So, I will test it as you suggested, however, would it be possible to
still house my key on a removable USB stick, and after the slices are
mounted into the file system successfully to then unmount and remove the
USB drive and have the box remain in operation, or does the key need to
be accessed throughout all disk reads/writes?

Essentially, I'd like it so that if the box reboots while I am gone, or
if I want to reboot it remotely there is theoretically no way for
someone at the console to re-mount the encrypted slices?

Thank you for all of this info!

Steve
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to