Re: Using encrypted disks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Apr 09, 2008 at 18:39:42 +0100,
  Anne Wilson <cannewilson@xxxxxxxxxxxxxx> wrote:
> On Wednesday 09 April 2008 17:33:14 Bruno Wolff III wrote:
> > On Wed, Apr 09, 2008 at 12:54:07 +0100,
> >
> >   Anne Wilson <cannewilson@xxxxxxxxxxxxxx> wrote:
> > > That makes sense.  However, at the time I wrote my mind was on my
> > > single-filesystem installation.  It just doesn't feel sensible to have to
> > > give the password twice in this case.
> >
> > It is probably easier to securely delete the password if it can be done
> > right away rather than saving it to potentially be used in other mounts
> > (particularly for filesystems mounted by udev).
> 
> Sorry, Bruno.  I don't understand what you are saying.  Could you explain a 
> bit more, please?

There are ways that keys saved in memory can be leaked (swap, firewire,
starting a new OS without clearing memory). If you are just using the
key immediately and then writing over the area of memory that it was stored
in you can reduce the likeliness of it leaking. Though for disk encryption
this probably isn't that important (except protecting swap) as you are
only protecting the passphrases. The actual keys needed to decrypt the disks
need to be kept in memory.

-- 
fedora-test-list mailing list
fedora-test-list@xxxxxxxxxx
To unsubscribe: 
https://www.redhat.com/mailman/listinfo/fedora-test-list

[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux