On Mon, Oct 18, 2004 at 10:41:33AM +0200, [EMAIL PROTECTED] wrote:
> VK wrote:
> 
> >Of course, storing key in plain text is less secure.
> >
> Of course.
> 
> So what do people of the real world do? I don't suppose they expect to have

I do not know, never been there :-)

> 
> to attend every server restart do they? Is there some hardware setup 
> which can
> 
> help them with that maybe?

You have to realize this is an inherent problem, not something technical
you can work around. If you want encryption, you have to supply a key.
If you do not want to do that yourself at boot, you have to put it in
the server somehow. Some ways to put it in the server are more secure
than others, but if anyone has physical access to it he got your key.

That said, while I never worked with one, I have a feeling a smartcard
implementation has the potential to be much more secure than a file on
the disk, and still managable. You can also think about software-only
solutions that will be good enough for most people. E.g. you can put
the key on comodity hardware (Disk-on-Key?) that's inaccessible after
bootup (because you rmmoded its driver and prevented further insmoding.
Note that IIRC there is already proof-of-concept code that changes a
running kernel even with modules disabled, though).
-- 
Didi


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to