Re: Re: HOWTO: Encrypting /home with cryptsetup-luks on Fedora Core 5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Is it really critical? What benefit does one gain if one is confident
in the security of the symmetric cipher?


I personally figure dd if=/dev/zero of=/dev/mapper/home before running
mkfs /dev/mapper/home is sufficient (to protect against issue
mentioned below).

(I don't really know much about file systems, but in my imagination
given a zeroed disk if one were to create a dm-crypt encrypted
filesystem on it, one would be able to ascertain how full the
encrypted partition was (and possibly some vague information about
size/number of files?) by looking at what areas of the disk *hadn't*
have ciphertext written to them. Of course if there exists
sophisticated analysis of the disk surface that can establish when and
to what area of a disk writing had taken place then you'd just have to
grin and bear that slight information leak.)

On 25/05/06, Marc Schwartz <MSchwartz@xxxxxxxxx> wrote:

<snip>

1. Unless I am going blind in my middle age, I did not see a step in
your HOWTO about prefilling the disk partition with random data. This is
Step 1a/b in WOS's wiki entry. Is there a complication when using LVM2
in terms of doing this or is this a missing critical step (perhaps with
some differences in process) in the sequence?

</snip>

---------------------------------------------------------------------
 - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux