Re: Questions about LUKS / LVM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/09/2011 18:00, Karl O. Pinc wrote :
> On 09/19/2011 10:45:52 AM, Robbie Smith wrote:
> 
>> How much of a load on the system would LUKS + LVM be? Is it
>> likely to result in a noticeable drop in performance?
> 
> It all depends, but generally no because cpu is _so_ much
> faster than disk these days.

Indeed, you won't notice it on a modern computer, especially for every
day use. It may be painful for data transfer from one encrypted disk to
another encrypted disk, but you can expect very good rates anyway. It
depends on the cipher you use, on your machine, ...

>> Does entering the key(s) at boot decrypt the whole volume,
>> or just provide a means for the kernel module
>> to decrypt and encrypt on-the-fly?
> 
> The latter.
> 
>> And… how does it work? The documentation makes mention of multiple
>> key-slots; but I'm a little baffled as to how different keys can be
>> used to decrypt the same volume. It is based on symmetric
>> cryptography isn't it?
> 
> Yes, but the master key is encrypted by each key, separately, and 
> that's what your multiple passwords decrypt.
> 
> See the tks-1 paper (iirc) referenced on the wiki for more info.

This is important as it means your disk encryption is basically as
strong as your "weaker key slot". e.g. a very bad password for one key
slot make all other passwords/keys inefficient.

Thanks, Karl, for the link.

Best,
Quentin
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux