Re: encrypted root fs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 16 Aug 2004 01:03:17 +1000, Russell Coker <russell@xxxxxxxxxxxx> wrote:
> The aim of this work is to have a system that boots from removable media and
> uses encryption for all block devices so that if it is stolen no data will be
> lost and so someone who gets temporary access to the hardware will have a
> much more difficult time of trying to crack it.

If the goal is for an encrypted filesystem- why not just have a script
interface early on in the boot process to prompt for a password for
the encrypted file system - in order to mount the encrypted ones?  Or
maybe a boot option grub could pass to the kernel to unencrypt the
partitions to mount?  This is a concept- I know that a boot option
would be plaintext after the system booted, and you would not want to
save it in your grub config plaintext either.

In your design would you rely on physical secuity (not to lose the USB
key), the H.D. being encrypted,  and UNIX security of the password- or
is there a pin/password similar to smart card and pin involved during
boot(multi factor authentication)?

I like the idea!

--Josiah



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux