On Tue, Mar 13, 2012 at 12:11 PM, Florian Philipp <li...@binarywings.net> wrote:
> Am 13.03.2012 12:55, schrieb Valmor de Almeida:
>> On 03/11/2012 02:29 PM, Florian Philipp wrote:
>>> Am 11.03.2012 16:38, schrieb Valmor de Almeida:
>>>>
>>>> Hello,
>>>>
>>>> I have not looked at encryption before and find myself in a situation
>>>> that I have to encrypt my hard drive. I keep /, /boot, and swap outside
>>>> LVM, everything else is under LVM. I think all I need to do is to
>>>> encrypt /home which is under LVM. I use reiserfs.
>>>>
>>>> I would appreciate suggestion and pointers on what it is practical and
>>>> simple in order to accomplish this task with a minimum of downtime.
>>>>
>>>> Thanks,
>>>>
>>>> --
>>>> Valmor
>>>>
>>>
>>>
>>> Is it acceptable for you to have a commandline prompt for the password
>>> when booting? In that case you can use LUKS with the /etc/init.d/dmcrypt
>>
>> I think so.
>>
>>> init script. /etc/conf.d/dmcrypt should contain some examples. As you
>>> want to encrypt an LVM volume, the lvm init script needs to be started
>>> before this. As I see it, there is no strict dependency between those
>>> two scripts. You can add this by adding this line to /etc/rc.conf:
>>> rc_dmcrypt_after="lvm"
>>>
>>> For creating a LUKS-encrypted volume, look at
>>> http://en.gentoo-wiki.com/wiki/DM-Crypt
>>
>> Currently looking at this.
>>
>>>
>>> You won't need most of what is written there; just section 9,
>>> "Administering LUKS" and the kernel config in section 2, "Assumptions".
>>>
>>> Concerning downtime, I'm not aware of any solution that avoids copying
>>> the data over to the new volume. If downtime is absolutely critical, ask
>>> and we can work something out that minimizes the time.
>>>
>>> Regards,
>>> Florian Philipp
>>>
>>
>> Since I am planning to encrypt only home/ under LVM control, what kind
>> of overhead should I expect?
>>
>> Thanks,
>>
>
> What do you mean with overhead? CPU utilization? In that case the
> overhead is minimal, especially when you run a 64-bit kernel with the
> optimized AES kernel module.

Rough guess: Latency. With encryption, you can't DMA disk data
directly into a process's address space, because you need the decrypt
hop.

Try running bonnie++ on encrypted vs non-encrypted volumes. (Or not; I
doubt you have the time and materials to do a good, meaningful set of
time trials)

-- 
:wq

Reply via email to