On Fri, Feb 01, 2008 at 03:16:47PM +0100, Michael wrote:
> Hi,
> 
> thanks for your fast answer.
> 
> Raimo Niskanen schrieb:
> > Interesting idea, but I wonder if it is necessary...
> 
> Maybe not necessary, but still something I'd like to try. So, any ideas?
> 
> > Again, if I remember correctly; if your salt is random enough,
> > it need not be secret. It is just used to randomize your password.
> > 
> > Attackers come with pre-calculated dictionaries and try
> > to crack your password, and if the salt is unknow to the
> > attacker until he/she gets into the system he/she will
> > have to re-calculate the whole dictionary with the 
> > now known salt and rounds. And if the rounds is high
> > enough re-calculating a dictionary will not be feasible.
> 
> Well, since I want to have the partition to be automagically mounted
> when I insert the USB stick (with the saltfile), having the HDD (with
> the modified mount_vnd on it) and the USB stick would be enough to
> decrypt it.

Aha, automagically as in not supplying a password. Then the password
also has to be with the saltfile, or in cleartext in the mount
script (hotplugd I guess). So the password is known if
you have the HDD and the USB stick. In effect, the saltfile
is the password.

Have I finally got it?

So therefore you need an unique and constant signature
of your hardware... to become the salt and password.

Sounds a bit like what M$ does to see when you install XP on
too many hardwares. Find as many serial numbers and
product IDs of things on your motherboard through 
existing hardware monitors, and run them through MD5 or SHA.

Better or more specific ideas, anyone? Especially
on which interesting hardware info utilities there are.


> 
> 
> Michael

-- 

/ Raimo Niskanen, Erlang/OTP, Ericsson AB

Reply via email to