On Ät 14-04-05 09:39:04, Herbert Xu wrote: > On Thu, Apr 14, 2005 at 01:24:31AM +0200, Pavel Machek wrote: > > > > > The ssh keys are *encrypted* in the swap when dmcrypt is used. > > > When the swap runs over dmcrypt all writes including those from > > > swsusp are encrypted. > > > > Andreas is right. They are encrypted in swap, but they should not be > > there at all. And they are encrypted by key that is still available > > after resume. Bad. > > The dmcrypt swap can only be unlocked by the user with a passphrase, > which is analogous to how you unlock your ssh private key stored > on the disk using a passphrase.
Once more: Andreas' implementation destroys the key during resume. dm-crypt does not even know resume happened, so it can't destroy key. (And it would also render system useless). Pavel -- Boycott Kodak -- for their patent abuse against Java. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/