Re: setting up partition before cryptsetup

2006-07-20 Thread Dave Patterson
* Dave Patterson [EMAIL PROTECTED] [2006-07-19 21:31:19 +0700]:

 
 A how-to here:
 
 http://www.debianhelp.org/node/1074
 
Has been changed to:

http://www.debianhelp.org/node/1116


-- 
Cheers,

  Dave 


signature.asc
Description: Digital signature


Re: setting up partition before cryptsetup

2006-07-19 Thread Dave Patterson
* [EMAIL PROTECTED] [EMAIL PROTECTED] [2006-07-19 12:02:42 -]:

 Do I need to make an extra, unused partition when I install Debian on
 a new computer, before I try to use cryptsetup to add an encrypted
 filesystem?
 
It depends on how you want to do this.  If you want a completely encrypted
filesystem with swap, yes.

A how-to here:

http://www.debianhelp.org/node/1074

This one takes GRUB completely off the hard drive, and you boot Debian with
a USB key.  Modify it according to your tastes.

-- 
Cheers,

  Dave 


signature.asc
Description: Digital signature


Re: setting up partition before cryptsetup

2006-07-19 Thread Digby Tarvin
On Wed, Jul 19, 2006 at 09:31:19PM +0700, Dave Patterson wrote:
 * [EMAIL PROTECTED] [EMAIL PROTECTED] [2006-07-19 12:02:42 -]:
 
  Do I need to make an extra, unused partition when I install Debian on
  a new computer, before I try to use cryptsetup to add an encrypted
  filesystem?
  
 It depends on how you want to do this.  If you want a completely encrypted
 filesystem with swap, yes.
 
 A how-to here:
 
 http://www.debianhelp.org/node/1074
 
 This one takes GRUB completely off the hard drive, and you boot Debian with
 a USB key.  Modify it according to your tastes.

As far as I know, the debian procedure requires encryption of whole
filesystems. It is up to you how many of your partitions are
encrypted. If you don't have at least one unencrypted filesystem
on the disk then you will of course need some removable media to
boot off.

The /etc/crypttab file contains the list of encrypted filesystems 
to be configured (by default during boot) resulting in a new
device with the unencrypted partition, which can then be mounted
via an entry in /etc/fstab. 

In my opinion it is more secure to keep confidential data in a
dedicated encrypted partition which is only initialised and mounted
when really needed. If you are really paranoid, you can remove your
network connection whenever the secred data is mounted.

If you have the entire system encrypted and mount everything at boot,
then your data is only safe with the computer is turned off. A hacker
who gains root has everything...

If you don't want to encrypt entire partitions, then look at CFS,
which uses loopback NFS hooks to create personal encrypted file trees
on a per user basis. Users can create their own encrypted directories
without needing root access once it is installed.

Regards,
DigbyT
-- 
Digby R. S. Tarvin  digbyt(at)digbyt.com
http://www.digbyt.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: setting up partition before cryptsetup

2006-07-19 Thread Dave Patterson
* Digby Tarvin [EMAIL PROTECTED] [2006-07-19 15:58:19 +0100]:

 
 In my opinion it is more secure to keep confidential data in a
 dedicated encrypted partition which is only initialised and mounted
 when really needed. If you are really paranoid, you can remove your
 network connection whenever the secred data is mounted.
 
 If you have the entire system encrypted and mount everything at boot,
 then your data is only safe with the computer is turned off. A hacker
 who gains root has everything...

The flipside to that is the cracker that searches journals on journalled
filesystems for sensitive data (keys for encrypted partitions, even the
sensitive document itself).

A healthy dose of paranoia is in order here.  Look at how you plan to
manage your encrypted data.

-- 
Cheers,

  Dave 


signature.asc
Description: Digital signature


Re: setting up partition before cryptsetup

2006-07-19 Thread Digby Tarvin
On Wed, Jul 19, 2006 at 11:17:33PM +0700, Dave Patterson wrote:
 * Digby Tarvin [EMAIL PROTECTED] [2006-07-19 15:58:19 +0100]:
  
  In my opinion it is more secure to keep confidential data in a
  dedicated encrypted partition which is only initialised and mounted
  when really needed. If you are really paranoid, you can remove your
  network connection whenever the secred data is mounted.
  
  If you have the entire system encrypted and mount everything at boot,
  then your data is only safe with the computer is turned off. A hacker
  who gains root has everything...
 
 The flipside to that is the cracker that searches journals on journalled
 filesystems for sensitive data (keys for encrypted partitions, even the
 sensitive document itself).
 
 A healthy dose of paranoia is in order here.  Look at how you plan to
 manage your encrypted data.

I'm not sure that I see how any of the sensitive data would find its way
into the journal of a an unencrypted filesystem? Unless of course
anyone were silly enough to copy stuff there...

Two extra caveats I neglected to mention is:
1. I create 'secure' users with home directories in the secure home
partition. When I access secure data, I mount the partition and
then have to log in as my secure alter-ego. This is very important
to ensure that your browser caches etc are also encrypted.

The secure users shouldn't have write access to any unencrypted
filesystem, including /tmp, to prevent inadvertant data compromise.

I use a swap backed memory based filesystem for /tmp - ramfs or tmpfs,
I can never remember which is which :-/

2. If the data is very sensitive, either encrypt your swap partition
or disable it when the secure partition is mounted.

Regards,
DigbyT
-- 
Digby R. S. Tarvin  digbyt(at)digbyt.com
http://www.digbyt.com


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]