Old Passphrases - are they a security threat?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

After reading the FAQ, I’m still unclear on something - if someone knows an old passphrase to my LUKS encrypted partition, then could it somehow be used with the master key to decrypt the drive?

My scenario is this: I’m trying to set up a remote server with an encrypted drive by having tech support run my bash script that will set it all up and the script will have an initial passphrase in it. After that, I’ll SSH in and change the passphrase but wonder if the old one (which they potentially have laying around in the bash file) could be used to compromise the root partition. 

Granted, I know there are other vulnerabilities of this - like it being accessed while running but an encrypted drive is enough to keep out the curious and slightly more determined.

Thanks,
Dan
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt





[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux