1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
mike@××××.org wrote: |
5 |
| 1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12 |
6 |
| will provide this using an encrypted loopback interface. A speedier |
7 |
| compromise is to use encrypted home directories only. I maintain a PAM |
8 |
| module, pam_mount, that mounts encrypted home directories |
9 |
transparently. [ If |
10 |
| you don't mind a shameless plug, there is an article about pam_mount |
11 |
in the |
12 |
| August Linux Journal. ] |
13 |
| |
14 |
| 2. Encrypted swap partition (or no swap at all). This is necessary |
15 |
because |
16 |
| otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux |
17 |
| kernel's encrypted loopback interface can do this. |
18 |
| |
19 |
| 3. An inproved authentication system. Encryption algorithms are useless |
20 |
| if a weak key is used. Therefore it may be desireable to authenticate |
21 |
| when booting and mounting an encrypted root filesystem (or mounting an |
22 |
| encrypted home directory) using a physical token or other strong means. |
23 |
|
24 |
Mike: |
25 |
|
26 |
Thanks for this post... yeah, we've thought about it. A lot :-) |
27 |
|
28 |
Until five months ago, I had been running a Gentoo laptop with an |
29 |
encrypted filesystem for about a year. |
30 |
|
31 |
I had considered things quite carefully, and decided that the only way |
32 |
to sort-of-trust the computer was to encrypt the whole shebang: |
33 |
encrypted root and encrypted swap. This worked just fine, very stable |
34 |
with a 2.4.19 kernel. |
35 |
|
36 |
Then I wanted to move the setup to 2.5/2.6 kernels; the init command for |
37 |
doing so has stumped me. pivot_root simply does not work; there are |
38 |
other ways of doing something with mount -o bind... |
39 |
|
40 |
I have been able to set up, at init time, a GPG-based authentication |
41 |
which mounts the GPG keyring from a USB storage device, a memory stick. |
42 |
(You could also use a boot-CD.) The encryption key for the hard disk is |
43 |
actually a random string, which is signed and kept on the external |
44 |
device; you decrypt this key with your GPG password (which might be a |
45 |
"bas password", given user proclivities...). This extra step provides a |
46 |
means for key escrow, or for multiply-signed keys, so that more than one |
47 |
person can decrypt the key (and thus the hard disk data). This is a good |
48 |
thing, I think, if managed carefully; I don't have more than one |
49 |
signature on my keys so far... |
50 |
|
51 |
Encrypted swap is very easy, relative to the difficulties I've |
52 |
encountered at init time, trying to bring up an encrypted root disk on 2.6. |
53 |
|
54 |
Very much enjoyed the pam_mount article. But I think that for laptops, |
55 |
you need to assume the whole disk will be read by someone, at their |
56 |
leisure, and I really think you need whole-disk encryption to be effective. |
57 |
|
58 |
As soon as I get some manner of linux 2.6 with encrypted root, I will |
59 |
have something to write up. There is a bug in -test3 that b0rks |
60 |
encrypted loopback; I expect there will be more distractions before this |
61 |
is done... |
62 |
|
63 |
- - boyd |
64 |
|
65 |
Boyd Waters |
66 |
watersb on gentoo forums |
67 |
http://www.aoc.nrao.edu/~bwaters |
68 |
|
69 |
|
70 |
-----BEGIN PGP SIGNATURE----- |
71 |
Version: GnuPG v1.2.2 (GNU/Linux) |
72 |
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org |
73 |
|
74 |
iD8DBQE/QE5g0is8k1r0QeURAiIhAJ43h11QfVptn+0PmntyJW+l3BmkkACeORew |
75 |
fFsjLEAA9JYlKfQzKLqDl8M= |
76 |
=YJfU |
77 |
-----END PGP SIGNATURE----- |
78 |
|
79 |
|
80 |
-- |
81 |
gentoo-hardened@g.o mailing list |