Daily build #1 for i386, using installer build from sid-1/09/07

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Just wondering if the suject line will have the updated loop-aes
to encrypt root, home and user and swap?
I am aware that Max is working on this but not sure if its been completed



rodger
-------- Original-Nachricht --------
> Datum: Sat, 01 Sep 2007 13:34:43 +0300
> Von: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
> An: Jan Klod <janklodvan@xxxxxxxxx>
> CC: linux-crypto@xxxxxxxxxxxx
> Betreff: Re: raid1 with loop-aes

> Jan Klod wrote:
> > Sure, that is a better way! Previously superblock was encrypted too
> > (what information it contains?)
> 
> Info about what component device that device is, and of what MD device.
> 
> > But why should one write:
> > 
> > losetup -d /dev/loop1
> > mount -t ext3 /dev/md0 /mnt -o
> loop=/dev/loop1,encryption=AES128,gpgkey=/etc/foo.gpg
> > 
> > insted of just:
> > 
> > mount /dev/loop1 /mnt ?
> 
> When mount is told to set up loop device, it also updates /etc/mtab so
> that
> umount knows to detach the loop device. Two ways of doing it:
> 
> 1) mount -t ext3 /dev/md0 /mnt -o
> loop=/dev/loop1,encryption=AES128,gpgkey=/etc/foo.gpg
>    umount /mnt
> 
> or
> 
> 2) losetup -e AES128 -K /etc/foo.gpg /dev/loop1 /dev/md0
>    mount -t ext3 /dev/loop1 /mnt
>    umount /mnt
>    losetup -d /dev/loop1
> 
> I prefer the first one. And when mount finds device and mount options from
> /etc/fstab file, you can shrink the commands to:
> 
>    mount /mnt
>    umount /mnt
> 
> > a) in checkroot init script after root partition has been checked insert
> > 
> > ebegin "Starting multi disk array"
> >         /sbin/mdadm -A /dev/md0 /dev/hda2 /dev/hdb4
> 
> If you are using MSDOS style partition tables, then you can change
> partition
> types using fdisk to type FD (Linux raid autodetect). In that case kernel
> will set up those MD devices automatically when kernel boots.
> 
> Works ok for /boot and root file systems, root file system encrypted or
> not.
> At least lilo bootloader can be configured to be linux software RAID1
> aware,
> and it will boot ok from either RAID1 component disk in case other RAID1
> component disk has gone completely dead. I have tested this by
> disconnecting
> a disk. Not sure if lilo bootloader recovers from errors smaller than
> "dead
> disk", such as some reads completed ok and then some read errors.
> 
> > echo "20+ character password" | losetup -p 0 -e AES128 -K /etc/foo.gpg
> /dev/loop1 /dev/md0
> 
> losetup has -P option that reads 65-line cleartext key file that isn't
> wrapped in gpg encryption.
> 
>  head -c 3705 /dev/random | uuencode -m - | head -n 66 | tail -n 65
> >/etc/foo.txt
> 
>  losetup -e AES128 -P /etc/foo.txt /dev/loop1 /dev/md0
> 
> > How big vulnerability is that password written in init file?
> 
> Root file system where those init scripts reside, must be encrypted.
> 
> -- 
> Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9
> DD
> 
> -
> Linux-crypto:  cryptography in and on the Linux system
> Archive:       http://mail.nl.linux.org/linux-crypto/

-- 
Ist Ihr Browser Vista-kompatibel? Jetzt die neuesten 
Browser-Versionen downloaden: http://www.gmx.net/de/go/browser

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux