Re: secure use of cryptsetup by non-root

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>> 1) Is 'secure use of cryptsetup by non-root' a supported use case?
> It would be interesting to read an explanation of how you think that *direct* use of 'cryptsetup' by users, ... could be "secure", ....

Are you asking for justification for why this is a valid use case or asking about the technical limitations for said use case?

For the latter, that's what we are discussing.  Allowing non root access to encrypted storage may take a lot of work but since this and upstream limitations are open source we could make it happen. To do that requires understanding, discussion, planning, etc.--even if I end up doing it all myself.  The use case is END USER + ENCRYPTION.  cryptsetup, LUKS, device mapper are means to that end.  Direct use of cryptsetup is only 1 possible path.

Just in case you are asking the former:  allowing non root users secure access to 'features' is generally a way to avoid something like the windows security model where almost everything has to be run as admin to get anything done.  

-- 
JT
_______________________________________________
dm-crypt mailing list -- dm-crypt@xxxxxxxx
To unsubscribe send an email to dm-crypt-leave@xxxxxxxx




[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux