Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Jul 2000 16:12:17 -0700 (PDT)
From:      Kris Kennaway <kris@FreeBSD.org>
To:        Mike Silbersack <silby@silby.com>
Cc:        Adrian Chadd <adrian@FreeBSD.ORG>, Terje Elde <terje@elde.net>, Robert Watson <rwatson@FreeBSD.ORG>, Sheldon Hearn <sheldonh@uunet.co.za>, =?iso-8859-1?Q?Joachim_Str=F6mbergson?= <watchman@ludd.luth.se>, Greg Lewis <glewis@trc.adelaide.edu.au>, freebsd-security@FreeBSD.ORG
Subject:   Re: Status of FreeBSD security work? Audit, regression and crypto swap?
Message-ID:  <Pine.BSF.4.21.0007241608300.20680-100000@freefall.freebsd.org>
In-Reply-To: <Pine.BSF.4.21.0007241556510.5736-100000@achilles.silby.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 24 Jul 2000, Mike Silbersack wrote:

> Encrypting at that low of a level wouldn't be very useful in the long
> run.  For an encrypted filesystem to be truly useful, each user's files
> are encrypted with their own key.  A partition-wide encryption doesn't
> protect anything if you get root hacked on your box.

Except this breaks the Unix filesystem semantic that you can read other
people's files (if they have to provide their key manually and it is not
pre-available), which is probably necessary for system operation. Unless
all of the keys were available in the kernel without user intervention and
stored persistently (perhaps encrypted by a master key), which sort of
defeats the purpose unless you have somewhere "better" to store the key
table than on disk.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007241608300.20680-100000>