Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Sep 2002 06:54:35 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        "Daniel O'Connor" <doconnor@gsoft.com.au>
Cc:        James Gritton <gritton@iserver.com>, hackers@FreeBSD.ORG
Subject:   Re: The poor man's cryptfs 
Message-ID:  <33014.1033016075@critter.freebsd.dk>
In-Reply-To: Your message of "26 Sep 2002 14:20:29 %2B0930." <1033015832.22320.41.camel@chowder.gsoft.com.au> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <1033015832.22320.41.camel@chowder.gsoft.com.au>, "Daniel O'Connor" 
writes:
>On Thu, 2002-09-26 at 14:18, Poul-Henning Kamp wrote:
>> >Have you seen ports/security/vncrypt?
>> 
>> Or src/sys/geom/geom_aes ?
>
>Whoo :)
>
>> I have what I hope is industry-strenght encryption in my development
>> tree with only a few more issues to straigten out before it hits -current.
>
>MFC? 8-)

No way ever.

>Sounds pretty useful..
>How does key management work? (or will work)

The focus is on protecting a the physical disk, a good shot will be
taken at not compromising keys in RAM, but protecting those is not
in the scope.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?33014.1033016075>