Hello, I recently had an idea how to improve the security of encrypted devices.
Currently I am using mount_vnd on my X41 notebook and also another system which works really nice. Playing around a bit with mount_vnd and after changing the sources a little it is even possible to decrypt and automount a partition just by inserting an USB stick. The passphrase is compiled in, the saltfile is on the USB stick, the number of rounds is in the script which gets run from /etc/hotplug/attach. Before I get to my real question... the mount_vnd option "rounds". What does it really do and which would be a good value? Does it depend? if so, on what? The size of the saltfile or length of the password? Ok, back to topic. I was thinking about to use a saltfile which consists of the keyfile on the USB stick, but also of some checksum or some other information gathered from the hardware, so it would only be possible to decrypt the partition on the same hardware, so even if you steal or copy the HDD and the USB stick, decrypting would be impossible. Now I am looking for a way to gather unique information about the system. The type of information must exist on every system running OpenBSD, so something like "hw.serialno" can't be used. Also, the information should have the same format and everything even after upgrading to a newer version of OpenBSD, so no dmesg. "pcidump -v" also won't work because the output of two equal ALIX is 100% the same. I was thinking about the MAC address of the first network card, or even all existing network cards in the system, but that information should be too easy to come by. I would go for using the MACs, but I would like to know if anyone here got any better ideas first. :-) Thanks in advance, Michael