See diceware.com about choosing really strong passwords. Long phrases or sentences do not really cut it. A ten word diceware phrase puts you in the 128+ bits of entropy range, throw in some extra special characters for good measure and you will be in the 30 char password length range.
But it doesn't make sense to use AES256 if your password has only 128 bits of entropy, right?
>> Is there also a way to check that encrypted swap is working? > "cat /proc/swaps" command should show one or more lines starting with > /dev/loop string.
Unfortunately it does not (it mentions /dev/hda5). What else could I do?
In /etc/fstab (loop=/dev/loop?), I can replace ? with any number from 0 to 7, right?
Jari Ruusu wrote: > The fix is to recompile and boot new kernel using but using different > CONFIG_RELEASE CONFIG_CFGNAME strings.
I discovered that SuSE seems to ignore what comes after the word default, if you simply append something. When I boot 2.6.5-7.95-default-neo1, uname -a returns 2.6.5-7.95-default. However, when I boot 2.6.5-7.95-defneo1, uname -a returns 2.6.5-7.95-defneo1.
Thanks,
Christian
- Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/