Re: Result of supplying an incorrect passphrase?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jul 15, 2009 at 8:23 PM, Matt Rosales<ttammar@xxxxxxxxx> wrote:
> On a somewhat related note, I was thinking it would be cool to build in a
> self-destruct mechanism into cryptsetup- IE if a specific password is
> entered twice, have it destroy the keyblock of the encrypted disk. Thoughts?

Probably pointless. Could help against the most unskilled of attackers.
(One's who didn't make a copy of your disk and had never read/knew of
cryptsetup features and had not conceived software would do such a
thing).

FWIW I do know the OpenPGP card used to lock itself on entering the
wrong pin too many times. So using a cryptotoken and a password could
achieve a similar outcome (with the advantage that now your attacker
has the expensive task of defeating your token).

-- Roscoe

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux