On Tue, Sep 4, 2012 at 2:18 PM, Florian Philipp <li...@binarywings.net> wrote:
> Am 04.09.2012 19:37, schrieb Hinnerk van Bruinehsen:
>> On 04.09.2012 15:48, "Roland Häder" wrote:
>>> I think I made a (tollerateable) mistake:
>>
>>> My hard drive has two partitions: - sda1 - encrypted swap - sda2 -
>>> encrypted root
>>
>>> How should it boot? One way could be by external media (e.g.
>>> stick), other is from hard drive. But that is encrypted. So I must
>>> leave a small area left for kernel, initrd, System.map and maybe
>>> config.
>>
>>> So the page at [1] is a little wrong because it misses the boot
>>> partition, so the new layout should be: - sda1 - unencrypted boot
>>> (/boot) partition - sda2 - encrypted swap (at least as double as
>>> your RAM) (crypt-swap) - sda3 - encrypted root (crypt-root)
>>
>>> Can someone update this?
>>
>>> Regards, Roland
>>
>>> [1]: http://wiki.gentoo.org/wiki/DM-Crypt
>>
>>
>> In theory grub2 is able to open a luks-encrypted volume though it
>> seems to have some disadvantages: you'll need to enter the passphrase
>> (or pass the keyfile) two times, because grub itself needs to decrypt
>> the volume to get the later stages from the encrypted volume and
>> afterwards the decryption in the bootprocess itself takes place.
>>
>> I can't give any real advice about it though, because I use an
>> unencrypted boot partition. Depending on your needs it could be an
>> increase of security, because you can stop an attacker from injecting
>> malicious code into your kernel (or replace it completely).
>>
>> WKR
>> Hinnerk
>
>
> For personal use, I see no point in using an encrypted boot partition.
> An attacker needs physical or root access to change the kernel or initrd
> in order to get to your encrypted data. In both cases, you are hosed
> anyway (keyloggers, etc.).

Now you've got me pondering cryptographically-verified input devices.
But perhaps a paired USB key fob with a challenge/response setup would
be reasonable.


-- 
:wq

Reply via email to