Well, it is up to you to chose complexity of the password and let the
john to work harder. :)
Choosing bash was a quick solution for executing the job after I'v
logged out, e.g. how else do you umount and vnconfig -u?
I'd like to use default ksh, but quick google-search gave me an answer
- ksh can not exec after logout.
Here I hope someone can point me to the right direction. Using bash
and shells at all isn't a clean solution, but the only I have found at
the time.
Not tested with xdm. Really, non tests at all, only the setup described.
As stated, this is just a concept. Improvements always accepted :)
//maxim
On 28 apr 2009, at 20.25, Nick Guenther wrote:
Interesting. But if I steal your laptop and run jack the ripper on it
then I get your svnd password, don't I?
Using bash seems awkward. Does this work if you're using xdm?
Otherwise, this is very slick. The reason I haven't gotten around to
using encrypted homes is just that it's awkward to do it in .profile
because you'd have to remount your /home/$USER over top, but moving
the mounting code into login(1) avoids that
-Nick
On 28/04/2009, Maxim Bourmistrov <maxim.bourmist...@unixconn.com>
wrote:
... yet another vnd-hack including modified login_passwd, sudo
and .bash_logout:
http://en.roolz.org/Blog/Entries/2009/4/27_Auto_mount_umount_of_encrypted_%24HOME_on_OpenBSD.html
Read first-line warning carefully before usage/flame :).
//maxim