On Mon, Jul 16, 2007 at 07:08:21PM +0300, Richard Storm wrote:
> This is crappy howto. *encryption* there are as much as creating
> unsecure (without -K)
> single storage volume...
> 
> We are talking about full disk encryption here, like mounting
> encrypted root partition :)
> 
> Problems:
> * vnconfig -K makes use of file images. would be much simplier if it
> could use raw disks.

It can.

> * kernel can't pick up and ask for passphrase for encrypted root file
> system partition.

You are right there.

> * salt + passhrase are used directly to encrypt data, so no easy
> change of passphrase without reformating image... don't know if thats
> a big problem....

That is up to you; you can always use another utility to encrypt the
file used with -K.

> * no possibilities to change algorithms/chipers. guess this isn't big
> problem either, since blowfish is kinda strong :)
> 
> Perhaps if making vnconfig to work with raw devices and putting in
> kernel crypto stuff which could ask for root-fs passphrase, then we
> could have full disk encrypton, except for kernel rc and MBR which
> should reside on unencrypted bootable medium like CD,usb, hdd...

But why encrypt the whole disk? I can see why you'd want to encrypt user
data - say, /home - but why encrypt boring stuff like /usr?

                Joachim

-- 
TFMotD: w (1) - display users who are logged on and what they are doing

Reply via email to