security for failed removal of crypt device?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello, I'm new to the list.

I have a crypt device needs to be reliably unmounted and secured and I'd like to avoid shutting down. Heres what I'm doing in bash to deal with failed commands:


cd /dev/mapper
fuser -km crypt-foo
umount crypt-foo || umount -l crypt-foo
cryptsetup luksClose crypt-foo || rm -f crypt-foo crypt-swap || halt

When it fails on cryptsetup and succeeds at "rm -f crypt-foo", is is the device secure? Meaning it cannot be accessed without entering the key again. This is not counting data that may have been read from the device and left in memory. I assume powering off makes it secure, is that right? Any suggestions?

- Drew

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux