On 10/7/07, Timo Myyrd <[EMAIL PROTECTED]> wrote:
> Nick Guenther wrote:
> > On 10/6/07, Timo Myyrd <[EMAIL PROTECTED]> wrote:
> >
> >> I have read the mount_vnd manual page and it describes the mount options
> >> of the image that are needed to succesfully mount the partition on boot
> >> but didn't reveal if there's a method to encrypt whole partition. I know
> >> it will give me small performance hit to encrypt whole partition but it
> >> should be OK. I had all of my HD except the /boot partition encrypted
> >> with Linux and I didn't notice any difference in casual use.
> >>
> >> Currently waiting for the urandom to fill the image...
> >>
> >> Timo
> >>
> >
> > Hm? I don't understand what you don't understand.
> > There's no such thing as a half-encrypted svnd (=partition). If you
> > can mount an encrypted svnd then you have a totally encrypted drive.
> > If you put it in fstab even better, but you need to somehow get it to
> > ask you for a password (-k) or give it a saltfile (-K) from somewhere
> > when it does that (and you better not store that password on the same
> > laptop).
> >
> > -Nick
> >
> >
> >
> I mean that can I encrypt my /dev/sd0g directly instead of creating
> image in it and encrypting and mounting that image as /home.
> I tried to read about the svnd and it only seems to work on files.

Yes, exactly ;)
This is Unix, where everything is a file (or tries to be):
vnconfig /dev/sd0g svnd0

On a tangential note, it's useful to understand what you can do with
ccd(4) if you are creative about it.

-Nick

Reply via email to