Blueprint changed by Dustin Kirkland:
Definition Status: Approved = Superseded
Whiteboard changed:
+ = Status =
+ * Marking this blueprint superseded, as we have implemented this in a
different way, encrypting swap only when necessary (encrypted-home).
+ -- Dustin Kirkland
+
Discussion
Blueprint changed by Evan Dandrea:
Definition Status: Drafting = Review
Whiteboard changed to:
Discussion Points:
* UDS Buy-in (main use case is hibernate):
* karmic implementation:
* encrypted home in installer - setup swap encryption
(ecryptfs-setup-swap), document hibernation
Blueprint changed by Robbie Williamson:
Definition Status: Review = Approved
--
Encrypted Swap as an Option
https://blueprints.launchpad.net/ubuntu/+spec/server-karmic-encrypted-swap-as-an-option
--
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings
Blueprint changed by Robbie Williamson:
Priority: Undefined = Low
--
Encrypted Swap as an Option
https://blueprints.launchpad.net/ubuntu/+spec/server-karmic-encrypted-swap-as-an-option
--
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or
Blueprint changed by Dustin Kirkland:
Approver: Rick Clark = Robbie Williamson
Assignee: Dustin Kirkland = Evan Dandrea
--
Encrypted Swap as an Option
https://blueprints.edge.launchpad.net/ubuntu/+spec/server-karmic-encrypted-swap-as-an-option
--
Ubuntu-server-bugs mailing list
Blueprint changed by Daniel T Chen:
Whiteboard changed to:
Discussion Points:
* UDS Buy-in (main use case is hibernate):
* karmic implementation:
* encrypted home in installer - setup swap encryption
(ecryptfs-setup-swap), document hibernation incompatibility
* randomly generate key
Blueprint changed by Dustin Kirkland:
Whiteboard changed to:
Discussion Points:
* Suggested design:
* encrypt swap, using a randomly generated key every boot
* by default, use a static wrapping password like ubuntu, and store the
wrapped swap key in LUKS
* teach hibernation resume