When I do dmsetup table [name] --showkey
I see aes-cbc-plain. Then 64 characters. I see the first 40 are the RIPEMD-160 Hash of my password. What are the last 24 characters?
ripemd160_passphrase + ??????
thanks
-j
On Fri, Mar 26, 2010 at 4:58 AM, Milan Broz <mbroz@xxxxxxxxxx> wrote:
Remove key from memory? (google coldboot attack)On 03/26/2010 12:38 AM, Jamaal Speights wrote:
> I am curious about the cryptsetup remove function and its purpose after
> rebooting a system. Is my system still vulnerable to someone else
> mounting my encrypted file if I don't remove the mapping before I
> reboot? When my system comes back up I don't see the mapping in
> /dev/mapping/cryptfile . Also if I do cryptsetup to mount the image
> again I have to re-enter the password. So whats the point of using
> cryptsetup remove when shutting your system down?
Deactivate crypt mapping so underlying storage can safely deactivate
devices (LVM for example)?
Umount underlying filesystem if mappping is to file on it?
...
Milan
_______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt