Re: cryptesetup remove question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks. 

When I do dmsetup table [name] --showkey

I see aes-cbc-plain.  Then 64 characters.  I see the first 40 are the RIPEMD-160 Hash of my password.  What are the last 24 characters? 

ripemd160_passphrase + ?????? 

thanks

-j


On Fri, Mar 26, 2010 at 4:58 AM, Milan Broz <mbroz@xxxxxxxxxx> wrote:
On 03/26/2010 12:38 AM, Jamaal Speights wrote:
> I am curious about the cryptsetup remove function and its purpose after
> rebooting a system.  Is my system still vulnerable to someone else
> mounting my encrypted file if I don't remove the mapping before I
> reboot?  When my system comes back up I don't see the mapping in
> /dev/mapping/cryptfile  .  Also if I do cryptsetup to mount the image
> again I have to re-enter the password.  So whats the point of using
> cryptsetup remove when shutting your system down?

Remove key from memory? (google coldboot attack)

Deactivate crypt mapping so underlying storage can safely deactivate
devices (LVM for example)?

Umount underlying filesystem if mappping is to file on it?

...

Milan

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux