On (15/06/2012 15:39), Aaron Zauner wrote: > AFAIK you'd need something similary to initrd > (http://en.wikipedia.org/wiki/Initrd), which, to the best of my > knowledge, does not currently exist in freebsd.
FreeBSD well supports booting from memory disk which can be either embedded in kernel itself or loaded by boot loader. I think Robert meant extending loader(8) to load and boot kernel from geli encrypted file system. Thanks, Gleb. > > so long, > azet > > On Mon, Jun 11, 2012 at 2:21 AM, Robert Simmons <rsimmo...@gmail.com> wrote: > > Would it be possible to make FreeBSD's bootcode aware of geli encrypted > > volumes? > > > > I would like to enter the password and begin decryption so that the > > kernel and /boot are inside the encrypted volume. Ideally the only > > unencrypted area of the disk would be the gpt protected mbr and the > > bootcode. > > > > I know that Truecrypt is able to do something like this with its > > truecrypt boot loader, is something like this possible with FreeBSD > > without using Truecrypt? > > _______________________________________________ > > freebsd-security@freebsd.org mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-security > > To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org" > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org" _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"