On 21/06/2006 Andrew Pimlott wrote:
> > first, LUKS devices with random key are possible, you just need to store
> > the random key after luksFormat, to reuse it for luksOpen. afterwards
> > you can shred/wipe the key.
> 
> True, but this can't be configured in crypttab, which makes it
> effectively unavailable.  Moreover, it wouldn't provide much additional
> safety.  Presumably, a hypothetical "luksrandom" keyword in crypttab
> would mean: check that it's a luks partition, than re-luksFormat and
> luksOpen with the same random key.  The problem is, this would happily
> trash any normal (non-randomly-keyed) luks partition.  So you really
> want an explicit marker that says "I am disposable".

do you see any advantages in providing this? i don't like the idea of
invoking luksFormat automatically in any case.

> > > However it may still be overkill.  I would be happy enough if there were
> > > a check for randomly keyed swap partitions that verifies that the source
> > > device is 1) not a formatted, unencrypted volume and 2) not Luks.
> > > That's still a good measure of safety.
> > 
> > yes, that's exactly what i suggested as well. in my opinion, up to now all
> > other proposed checks are compromises which have disadvantages as well.
> 
> Cool.  So you would special case a key of /dev/*random, and perform only
> those two checks?  In other words, would my existing configuration
> 
>     swap    /dev/hda2 /dev/urandom  swap
> 
> start working again?  That sounds like a nice resolution.

that's the plan.

...
 jonas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to