Douglas A. Tutty wrote:
> On Wed, Apr 08, 2009 at 11:26:20AM -0400, H.S. wrote:
>> Douglas A. Tutty wrote:
>>> On Tue, Apr 07, 2009 at 06:17:56PM -0400, H.S. wrote:
>>>> Douglas A. Tutty wrote:
>>>>> On Tue, Apr 07, 2009 at 05:46:31PM -0400, H.S. wrote:
>>>>>> Douglas A. Tutty wrote:
>  
>>> $ cat /proc/swaps:
>>> Filename                    Type            Size    Used    Priority
>>> /dev/mapper/sda2_crypt              partition       979956  0       -1
>>>
>>> $ mount | grep -i /tmp
>>> /dev/mapper/sdb1_crypt on /var/tmp type ext3 (rw,data=journal)
>>> tmpfs on /tmp type tmpfs (rw,size=500m)
>  
>>> There are a limited number of place where a piece of software can leak
>>> info:
>>>
>>> 1.  to /tmp:                Its encrypted
>>> 2.  to /var/tmp:            Its encrypted
>>> 3.  to somewhere on ~/      I have /home encrypted
>>> 4.  left in swap            its encrypted
>>> 5.  in a core dump after a crash:   use ulimit (see man bash) to
>>>                                     limit core dump size to 0
>>>
>>> Of course, the uncrypted data is in memory, so anything that can read
>>> any memory segment can read your data.
>  
>  
>> I am curious, what is the performance cost to have your ~/ and /tmp and
>> /swap encrypted? What kind of machine are you using?
> 
> I see no performance cost and I've done this on a PII-233 on old IDE
> disks and now on a PII-450 with two SCSI disks.
> 
> Think of it this way:  Data has to go out to disk.  That takes a lot of
> time compared to moving data in the memory.  It doesn't take that much
> time to start the encryption process (which can continue while the data
> is streaming to the disk).  I'm sure its more complex than this, but
> that's the idea.
> 
> If I want to have the fastest streaming possible, I'll have a
> non-encrypted partition in a convenient spot, say /var/local/cache but
> I've found that I haven't had a problem without it.  I suppose it may be
> important if you're doing streaming video or something, but you'd want a
> separate raid array for that anyway.
> 
>> Also, since you have to use mount, which requires root privileges, the
>> above method is not possible for a normal (non-root) user, is it?
> 
> These partitions are all mounted on boot.  I set up the encrypted
> partitions during the install (Etch).  Here's fstab:
> <SNIP>
> 
> Thus, its totally transparent to the normal user.  I have to enter the
> pass phrases at boot; I've been too lazy to set it up to only require
> one, so I have to do it three times (one for each encrypted partition)
> (swap doesn't need a passphrase).  LUKS is flexible enough that you
> could use a USB key if you like.
> 
> Doug.
> 
> 

Great! Thanks.


-- 

Please reply to this list only. I read this list on its corresponding
newsgroup on gmane.org. Replies sent to my email address are just
filtered to a folder in my mailbox and get periodically deleted without
ever having been read.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to