This is crappy howto. *encryption* there are as much as creating
unsecure (without -K)
single storage volume...

We are talking about full disk encryption here, like mounting
encrypted root partition :)

Problems:
* vnconfig -K makes use of file images. would be much simplier if it
could use raw disks.
* kernel can't pick up and ask for passphrase for encrypted root file
system partition.
* salt + passhrase are used directly to encrypt data, so no easy
change of passphrase without reformating image... don't know if thats
a big problem....
* no possibilities to change algorithms/chipers. guess this isn't big
problem either, since blowfish is kinda strong :)

Perhaps if making vnconfig to work with raw devices and putting in
kernel crypto stuff which could ask for root-fs passphrase, then we
could have full disk encrypton, except for kernel rc and MBR which
should reside on unencrypted bootable medium like CD,usb, hdd...

Thats how I understand it....

On 7/16/07, Adriaan <[EMAIL PROTECTED]> wrote:
On 7/15/07, Richard Storm <[EMAIL PROTECTED]> wrote:
> I am very interested in full disk encryption too.
> I guess it comes slowly, since there now is mount_vnd in -current,
> maybe could make use of it.
> If you find out something, give me know :)
>


http://geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto

=Adriaan=

Reply via email to