On Fri, Nov 13, 2009 at 02:50:40PM +0100, elias r. wrote:

> Am 11/01/2009 09:36 AM, schrieb Joachim Schipper:
> >On Sat, Oct 31, 2009 at 09:52:06AM -0400, Brad Tilley wrote:
> >>On Sat, Oct 31, 2009 at 9:30 AM, Joachim Schipper
> >><joac...@joachimschipper.nl>  wrote:
> >[My (Joachim's) message, snipped by Brat:
> >Encrypting just /home is dangerous. Do you know where vi(1) keeps its
> >backup files? Are you *sure* that's the only application that works like
> >that? And that nothing ever uses /tmp?
> >
> >Realistically, / cannot be encrypted since you need some files to boot,
> >and /usr can probably reasonably be kept unencrypted. Everything else -
> >/home, /tmp, /var - needs encryption (or not, but in that case nothing
> >does).]
> >>>You should also be careful to note that /root is not encrypted under this 
> >>>scheme.
> >>
> >>The title says it all. Like most normal people, I keep data in /home.
> >>I don't care about meta data that might be in /tmp and I do not wish
> >>to encrypt /. This is not an effort to avoid law-enforcement or
> >>encrypt every bit on the disk, only to provide some privacy for the
> >>vast majority of my data should the laptop be lost or stolen and
> >>end-up in a pawn shop. Encrypting /home does that, nothing more.
> >
> >You snipped everything except a tangential note and then responded to
> >the rest of the message. Bad form.
> >
> >I can't tell whether you miss the point or are arguing that a 90%
> >solution is good enough.
> >
> >In the first case: try it. Run vi(1) on some file. Observe the file full
> >of zeroes in /var/tmp/vi.recover. Edit some stuff in the file. Observe
> >the file full of snippets of your original file in /var/tmp/vi.recover.
> >Generalize this behaviour to many other applications.
> >
> >In the second case: OpenBSD isn't about 90% solutions, and this sort of
> >thing is exactly why "HOWTO"-style documents are regarded with deep
> >suspicion here. If 90% is good enough for you, go ahead - but don't tell
> >others to do it that way. Not even with a huge flashing banner saying
> >'this is a bad idea' at the top.
> >
> >             Joachim
> >
> 
> Especially because OpenBSD isn't about 90% solutions i still don't
> understand why nobody seems to be interested in finding a solution for
> encrypting entire / (except sth like the /boot partition like it is in
> (yeah, i know...) linux + luks.
> E.g. certificates are normally stored in /etc and in most
> encryption-cases you would surely like to protect them, too.

What's the point of encrypting certificates? They only contain
information that is public.

        -Otto

Reply via email to