On 11/10/12, Barry Grumbine <barry.grumb...@gmail.com> wrote:
> On Fri, Nov 9, 2012 at 7:58 PM, hepta tor <hepta...@gmail.com> wrote:
>> Hi
>>
>> Are there any plans to provide some simple ways for full disk
>> encryption in OpenBSD? I now that there are some approaches/tools to
>> encrypt volumes, but I'd like to know if it also possible to encrypt
>> the boot and swap partitions and have simple means for this.
>>
>> In the FAQ it says:
>> "If an attacker has physical access to your system, they win,
>> regardless of the OS on the computer. There are ways to force the use
>> of a password on single-user mode (see ttys(5)), or eliminate the
>> pause on i386/amd64 (see boot.conf), but practically speaking, getting
>> around those tricks is also pretty easy (One way: boot floppy or
>> CDROM, edit or replace password file). You can try to prevent that,
>> but then someone will pull the hard disk out of your computer. Making
>> your computer difficult to manage properly isn't real security, and if
>> you don't have the physical machine secured, you have no real
>> security. "
>>
>> Does this mean that OpenBSD doesn't strive to provide any build-in
>> security when "you don't have the physical machine secured"?
>>
>> thanks!
>> hepta
>>
>
> Read this thread:
> http://marc.info/?l=openbsd-misc&m=135198427413548&w=2
>
> run -current.

Thanks for the pointer. Do you know if there are any guidelines on how
to configure FDE with what's implemented in -current?
At http://geekyschmidt.com/2011/01/19/configuring-openbsd-softraid-fo-encryption
there is a kind of mini tutorial on how to configure softraid for
encryption - does anyone know if this is compatible with what's
implemented in -current?
      -h

Reply via email to