On (15/06/2012 15:39), Aaron Zauner wrote:
> AFAIK you'd need something similary to initrd
> (http://en.wikipedia.org/wiki/Initrd), which, to the best of my
> knowledge, does not currently exist in freebsd.

FreeBSD well supports booting from memory disk which can be either
embedded in kernel itself or loaded by boot loader.

I think Robert meant extending loader(8) to load and boot kernel from
geli encrypted file system.

Thanks,
Gleb.

> 
> so long,
> azet
> 
> On Mon, Jun 11, 2012 at 2:21 AM, Robert Simmons <rsimmo...@gmail.com> wrote:
> > Would it be possible to make FreeBSD's bootcode aware of geli encrypted 
> > volumes?
> >
> > I would like to enter the password and begin decryption so that the
> > kernel and /boot are inside the encrypted volume.  Ideally the only
> > unencrypted area of the disk would be the gpt protected mbr and the
> > bootcode.
> >
> > I know that Truecrypt is able to do something like this with its
> > truecrypt boot loader, is something like this possible with FreeBSD
> > without using Truecrypt?
> > _______________________________________________
> > freebsd-security@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-security
> > To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to