Re: Encrypted Raid1 or Raid 1 of encrypted devices?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jul 14, 2011 at 9:01 PM, Arno Wagner <arno@xxxxxxxxxxx> wrote:
...
> I thing your risk model is wrong. Basically it covers attacks
> were the attacker has access to only the storage and at the same
> time can actually do something serious with data manipulation.
> That is a rather unlikely scenario for disk encryption. Note that
> for communication encryption, this is a real and valid scenario.

Given the prevalence of of iSCSI, FC and similar, I wouldn't say it's
all that unlikely.

I for one would quite like assurances that network block device
providers couldn't impact my security. But, I imagine I'll have to
wait a while longer...

-- Roscoe
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux