Richard Fish wrote:
> On 8/19/06, Stefan G. Weichinger <[EMAIL PROTECTED]> wrote:
>> Would you recommend to use the initramfs from the HOWTO, or might there
>> be another way of doing it, staying closer at the genkernel-way of
>> doing it?
> 
> Well genkernel also allows you to specify a custom linuxrc
> (--linuxrc=).  This is probably the route I would take with genkernel.
> The default is in /usr/share/genkernel/generic/linuxrc, which you can
> use for inspiration.  Generally that script does everything that you
> will want to do, just not in the order you want to do it in.
> 
> You have a few options for this setup.  If you don't mind typing your

[...] Great infos, thank you. I will look through them in more detail as
soon as I have recovered from getting my current setup done.

My main concern in this context is the question:

How to maintain the encrypted partitions over time?
What do I have to do/remind when I want to use a newer kernel?

The maintenance-steps should be clear, as I for sure don't want to go
through all of this everytime a new kernel is released. Or even worse,
lose data ... (backups are done regularly, *yes*)

So this was the/one reason to ask for the genkernel-way.

>> Are there any comparisons between the speed of using
>> aes-cbc-essiv:sha256, 128bit and
>> aes-cbc-essiv:sha256, 256bit ?
> 
> I don't have any comparisons, but it should be easy enough for you to
> create.  Just setup a bare (not luks) mapping and do:
> 
> dd if=/dev/mapper/crypt_foo of=/dev/null bs=64k count=49152
> 
> This will read 3G of 'encrypted' data from the drive.  You can do this
> without affecting any data on the disk, as long as you do *not*
> luksFormat it.  Remember to keep an eye on the CPU usage of this with
> vmstat or top as well.

Maybe I give this a try after writing this ...

>> /dev/mapper/root is active:
>>   cipher:  serpent-cbc-essiv:sha256
> 
> Generally I've found AES to be slightly faster...

I found this link at the end of the used HOWTO:

http://www.saout.de/tikiwiki/tiki-index.php?page=UserPageChonhulio

It also shows that AES is faster than Serpent, and additionally that,
contrary to the Serpent-Algo, AES with 128 bits is faster than AES with
a 256bit key.

I will think about this a bit more before I move my data into place.

>> and the performance seems OK to me. But it could always be better ;)
>> I will have a look through the docs to see the security-implications of
>> using "only" 128bit.
> 
> Just be sure to keep in mind the type of data you have and who you are
> trying to defend against.  Researching encryption on the net is a
> quick way to get irrationally paranoid.  The bottom line is that
> everything can be broken given enough time and money.
> 
> So if you work for the CIA and keep the secret identies of all spies
> and informants on your laptop, well, then dm-crypt is not sufficient
> to begin with.  If you work for my investment brokerage and have all
> your customers' financial records on your disk, I want you to use
> 256-bit encryption.  If it is just your bank records and personal
> emails, use whatever you want.

No CIA, no. IT-consultant, trying to keep customer-related data
protected. As well as my own business-related data.

Sounds like AES-256 then.

Thanks a lot for your infos,
greets,
Stefan
-- 
gentoo-user@gentoo.org mailing list

Reply via email to