On Tue, 2008-11-11 at 01:15 +0900, Osamu Aoki wrote:
> Unless you wish to use PAM, I see no advantage to use login passphrase
> to wrap encryption keys.  I think that really beat the purpose of this
> kernel module in terms of security of data after PC is stolen.

I disagree that it defeats the purpose, but I'm happy to support
alternative use cases.

> This can be made more robust by using independent passphrase to wrap
> key.
> 
> I attach patch here.  It works as:
> 
>   $ ecryptfs-setup-private --wrapping 
> 
> will use independent passphrase to wrap encryption keys.  It asks
> passphrase twice to be sure and reminds you to record it.
> 
> $ ecryptfs-mount-private
> 
> will mount it while asking passphrase.
> 
> (If you use this to set up, PAM thing should not work.)
> 
> Use ecryptfs-rewrap-passphrase when you wish to change wrapping
> passphrase.
> 
> For now, this is good for me and I am happy having making followings for
> desktop:
> 
>  $ mkdir -p ~/Private/Desktop
>  $ ln -sf ../Private/Desktop ~/Desktop/Private
> 
> It may be good idea to add nice conditional zenity dialogue in
> ecryptfs-mount-private to prompt passphrase in GUI.  zenity is gtk
> dialogue.

Thanks for the patch.

I'm making a few changes, and testing it.  I'll post back here with the git log.

:-Dustin

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to