> This is weird, when I last tried I didn't experience any problem and all
> required packages were installed. Which install mode did you use, from
> what media (if you have the download url that would be even better) ?

I used jigdo-lite to expand the .jigdo file found on the official page,
http://www.debian.org/CD/jigdo-cd/#which
-> CD i386
http://cdimage.debian.org/debian-cd/6.0.1a/i386/jigdo-cd/debian-6.0.1a-i386-CD-1.jigdo

(which has md5sum
c29fb09ac0db3c23a95cb236f5adde78  debian-6.0.1a-i386-CD-1.jigdo)

it yielded this sha256sum:
8ffbbe6cea9598fe1b964c7d7ff8e7a76871fbc69a439919ade7fbb7b7397f00
debian-6.0.1a-i386-CD-1.iso

then I used unetbootin (either 471-2 (stable) or 549-1 (testing),
don't remember which) to write it to a USB flash stick, from which I
booted my Acer Aspire One D255E netbook. I used the default boot
entry, then the manual partitioner. (You can find more details about
how I ran the installer on the bug report I linked at the top of this
thread.)

> No that I know of, and I wouldn't use luks if it was caching the
> pass-phrase leaving it accessible for "reuse". I think that would defeat
> the purpose.

(Well, in an attempt to cut down on the number of passwords that I'm
having to deal with, I installed this machine with the luks
passphrases == root password.

My purpose is to prevent data exposure after theft of the netbook, and
I don't care about the risk of recovery from RAM sticks being frozen
with liquid nitrogene. Then, assuming that the cache is properly
written (only accessible by root), the only risk I see is that a local
hijacker that got root access for a short time or with a limited
bandwidth connection could just read the passphrase, and then after
stealing the laptop decrypt the whole disk at leisure, instead of
being limited by the amount of decrypted data he could manage to copy
(without discovery) without physical stealing. Fair enough, but I'm
currently more worried about my limited brain memory for storing
secure passphrases.)

> You can use decrypt_derived or random key for the swap
> partition for instance,

I'm doing that on two other machines, but IIRC this isn't compatible
with s2disk, which I might want to use on the netbook.

> Or store the key on a different media
> plugged-in at boot time

Yeah, I'm still sometimes thinking about such solutions, also for
normal login; but USB port connectors would be worn out rather quickly
I guess, and still less convenient than typing a password. Wondering
about bluetooth. I guess near field communication would more
appropriate. (I stopped using my fingerprint reader because it wasn't
working reliably enough. And I know it's not secure anyway.)

Christian.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/banlktikzvzih_mdih_xyuusdwxffkku...@mail.gmail.com

Reply via email to