Date: Fri, 29 Jul 2005 08:28:30 -0500 From: Eric Anderson <anderson@centtech.com> To: Niki Denev <nike_d@cytexbg.com> Cc: Pawel Jakub Dawidek <pjd@freebsd.org>, current@freebsd.org Subject: Re: GELI - disk encryption GEOM class committed. Message-ID: <42EA2EFE.3030800@centtech.com> In-Reply-To: <42EA205B.2000907@cytexbg.com> References: <20050728205413.GB762@darkness.comp.waw.pl> <42E95E08.80006@datacomm.ch> <42E981B9.5060500@datacomm.ch> <20050729103655.GG609@darkness.comp.waw.pl> <42EA205B.2000907@cytexbg.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Niki Denev wrote: > Pawel Jakub Dawidek wrote: > > +> Booting from Encrypted Root: > >> +> GELI - Works. How'd one load the kernel from an encrypted root >> though? >> >> Kernel has to be loaded from a USB Pen-Drive or a CD-ROM. >> You need to put /boot/ directory in there. GELI will ask for the >> passphrase >> before root file system is mounted. After that you can remove >> Pen-Drive/CD-ROM. >> > > Wouldn't it work if /boot is small separate unencrypted partition? > ( Well, there is the possibility that someone replaces your kernel > with one with keylogger to catch your password next time you type it :)) > I use this method for bootable RAID1+0 with GEOM's stripe and mirror, > and it seems to work great. Maybe you could write up a quick howto on your setup, and post it/submit it to the doc@ team. Eric -- ------------------------------------------------------------------------ Eric Anderson Sr. Systems Administrator Centaur Technology Anything that works is better than anything that doesn't. ------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42EA2EFE.3030800>