On Wed, Mar 05, 2014 at 17:48, Giancarlo Razzolini wrote:
>     Thank you for your reply. I am tending for the generic solution for
> unlocking it via network. Not using console nor any hardware assist. On
> linux, using initramfs + busybox + dropbear + some other hacks, it works
> quite well and secure, since you unlock it through ssh.

That sounds like something less than full disk encryption.

I'd just do what you had to do before boot supported encryption. Put
/home or wherever your data is in softraid, mark it 0 0 in fstab, and
then after you boot, login and bioctl/mount it manually.

I think FDE is useful on a notebook/desktop where you may reboot
somewhat frequently, but always have console access. It's easier and
it spares me from typing my password half way through the boot sequence.

On a server, this is only making things harder for no additional
security. You don't know when initramfs sshd actually starts, so you're
going to what, ping it until you get an answer? Protect the things that
are important, leave the rest alone.

The only advice would be to start fewer daemons in rc. Just start
sshd. Then start mail or web server or whatever later, assuming you
want their data encrypted. This is a five line shell script that
means you're still running OpenBSD, not bizarro almost but not really
OpenBSD.


Reply via email to