Hello Paul,
On Wed, 2012-09-19 at 09:37 -0700, Paul Heinlein wrote:
> Management of Full Disk Encryption (FDE) drives is usually handled in
> BIOS or via central Windows application.
I also expected unlocking at boot to be handled by the BIOS/UEFI, but
according to
http://www.trustedcomputinggro
On Sun, 23 Sep 2012, Paul Heinlein wrote:
> To: CentOS mailing list
> From: Paul Heinlein
> Subject: Re: [CentOS] self-encrypting drives
>
> On Sun, 23 Sep 2012, Leonard den Ottolander wrote:
>
>> As the interface for encrypting and locking an SED appears to be the
On Sun, 23 Sep 2012, Leonard den Ottolander wrote:
> As the interface for encrypting and locking an SED appears to be the
> same as for locking a normal drive using the security commands from
> hdparm should in theory work. This is assuming the BIOS pads
> passwords that are smaller than 32 byt
Hello Paul,
On Wed, 2012-09-19 at 09:37 -0700, Paul Heinlein wrote:
> Management of Full Disk Encryption (FDE) drives is usually handled in
> BIOS or via central Windows application.
Indeed. The scenario I mentioned of course does not work when one boots
from the encrypted drive, only if one att
On Tue, 18 Sep 2012, John R Pierce wrote:
whats the state of support for self-encrypting drives in CentOS 6 ?
these are becoming increasingly common on both laptops and for
enterprise storage (particularlly nearline), with features like
instant-erase via key destruction.
Management of Full Dis
Hello John,
On Tue, 2012-09-18 at 18:12 -0700, John R Pierce wrote:
> whats the state of support for self-encrypting drives in CentOS 6 ?
> these are becoming increasingly common on both laptops and for
> enterprise storage (particularlly nearline),
>From what I read on
http://www.trustedco
whats the state of support for self-encrypting drives in CentOS 6 ?
these are becoming increasingly common on both laptops and for
enterprise storage (particularlly nearline), with features like
instant-erase via key destruction.
--
john r pierceN 37, W 122
san
7 matches
Mail list logo