-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Pupeno wrote:

>>I use the dm-crypt from the kernel....
> 
> I've read that it is unsecure and I also read that it is not yet vory well 
> suported.

You read wrong. Dm-crypt *is* the encryption technique now used in the
kernel, and it wasn't chosen out of a hat. What you do with it can make
it insecure though, like a postit with the password attached to the
monitor ;-)

As for being supported, well if something is actually in the kernel
itself (without patches), then it IS fully supported. Dm-crypt is fully
supported since linux 2.6.4

Basically, as with any encryption, your secret is as safe as your
password. There are of course tools to help you make your password even
harder to crack, like hashalot, which basically sends your password
though a pipe which hashes it into "greek" ;-)

> I know I don't need a key, but I do want a key (stored in a remobable modia) 
> encripted with a passphrase I will be able to change, or best, my wife can 
> have the key protected with a different passphrase than I do.
> Beyond that, encripting with a key is much better than doing that with a 
> passphrase because the passphrase can be cracked (dictionary attack) while 
> the key-encripted that can't.

It seems what you are looking for with your "key" is probably a GPG key
needed to unlock your drive. This is definitely possible, but you will
have to do the research yourself. I do know there are tutorials to use
gpg keys with encryption passsords etc... and iirc there was a tutorial
for loop-AES too on their site. If you need this is another story. I
know that gpg can have two separate kleys to do the same thing, so I
presume separate keys and passwords are an option, but I have never
ventured down that lane, as I'm not that paranoid. I use gpg myself for
mailing, and encrypting certain files themselves, but I'm not paranoid
enough to encrypt all my files with such heavy encryption. In fact, not
even the US military is that bad. They now use 256bit AES encryption,
which is the default of dm-crypt, and from an atricle I read it still
would take them a couple of decades to crack.

I use dm-crypt on all three of my machines (laptop, workstation and
server), but none of them are fully encrypted ~ just partitions (and in
one case a looped back file acting as partition). All are mounted with a
simple #bash script I wrote to create the decrypted device link, ask to
password, mount the device link to the filesystem. This means that none
of this is found in /etc/fstab either. Users who are allowed to mount
(use that script) are added into sudoers.

Good luck ...
Ralph
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (MingW32)

iD8DBQFC6dctAWKxH5yWMT8RAttKAJ0Y+NErA8lbji5HwzG+tPWbvnbzRACfYD4t
DuFFNkZcURq3r41wHxjVuBM=
=slBW
-----END PGP SIGNATURE-----

-- 
gentoo-user@gentoo.org mailing list

Reply via email to