Just wondering if the suject line will have the updated loop-aes to encrypt root, home and user and swap? I am aware that Max is working on this but not sure if its been completed rodger -------- Original-Nachricht -------- > Datum: Sat, 01 Sep 2007 13:34:43 +0300 > Von: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx> > An: Jan Klod <janklodvan@xxxxxxxxx> > CC: linux-crypto@xxxxxxxxxxxx > Betreff: Re: raid1 with loop-aes > Jan Klod wrote: > > Sure, that is a better way! Previously superblock was encrypted too > > (what information it contains?) > > Info about what component device that device is, and of what MD device. > > > But why should one write: > > > > losetup -d /dev/loop1 > > mount -t ext3 /dev/md0 /mnt -o > loop=/dev/loop1,encryption=AES128,gpgkey=/etc/foo.gpg > > > > insted of just: > > > > mount /dev/loop1 /mnt ? > > When mount is told to set up loop device, it also updates /etc/mtab so > that > umount knows to detach the loop device. Two ways of doing it: > > 1) mount -t ext3 /dev/md0 /mnt -o > loop=/dev/loop1,encryption=AES128,gpgkey=/etc/foo.gpg > umount /mnt > > or > > 2) losetup -e AES128 -K /etc/foo.gpg /dev/loop1 /dev/md0 > mount -t ext3 /dev/loop1 /mnt > umount /mnt > losetup -d /dev/loop1 > > I prefer the first one. And when mount finds device and mount options from > /etc/fstab file, you can shrink the commands to: > > mount /mnt > umount /mnt > > > a) in checkroot init script after root partition has been checked insert > > > > ebegin "Starting multi disk array" > > /sbin/mdadm -A /dev/md0 /dev/hda2 /dev/hdb4 > > If you are using MSDOS style partition tables, then you can change > partition > types using fdisk to type FD (Linux raid autodetect). In that case kernel > will set up those MD devices automatically when kernel boots. > > Works ok for /boot and root file systems, root file system encrypted or > not. > At least lilo bootloader can be configured to be linux software RAID1 > aware, > and it will boot ok from either RAID1 component disk in case other RAID1 > component disk has gone completely dead. I have tested this by > disconnecting > a disk. Not sure if lilo bootloader recovers from errors smaller than > "dead > disk", such as some reads completed ok and then some read errors. > > > echo "20+ character password" | losetup -p 0 -e AES128 -K /etc/foo.gpg > /dev/loop1 /dev/md0 > > losetup has -P option that reads 65-line cleartext key file that isn't > wrapped in gpg encryption. > > head -c 3705 /dev/random | uuencode -m - | head -n 66 | tail -n 65 > >/etc/foo.txt > > losetup -e AES128 -P /etc/foo.txt /dev/loop1 /dev/md0 > > > How big vulnerability is that password written in init file? > > Root file system where those init scripts reside, must be encrypted. > > -- > Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 > DD > > - > Linux-crypto: cryptography in and on the Linux system > Archive: http://mail.nl.linux.org/linux-crypto/ -- Ist Ihr Browser Vista-kompatibel? Jetzt die neuesten Browser-Versionen downloaden: http://www.gmx.net/de/go/browser - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/