From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from tansi.org (ns.km10532-04.keymachine.de [87.118.102.195]) by mail.saout.de (Postfix) with ESMTP for ; Mon, 19 Apr 2010 18:52:04 +0200 (CEST) Received: from gatewagner.dyndns.org (84-74-164-239.dclient.hispeed.ch [84.74.164.239]) by tansi.org (Postfix) with ESMTPA id 24EB8212804A for ; Mon, 19 Apr 2010 18:52:04 +0200 (CEST) Date: Mon, 19 Apr 2010 18:54:58 +0200 From: Arno Wagner Message-ID: <20100419165458.GA27932@tansi.org> References: <20100419163745.C906144B6C@ws5-1.us4.outblaze.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20100419163745.C906144B6C@ws5-1.us4.outblaze.com> Subject: Re: [dm-crypt] passfrase or dev_random for keyfile of a dmcrypt_swap List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On Mon, Apr 19, 2010 at 05:37:45PM +0100, Si St wrote: > What should be recommended: > > To apply either /dev/random or a passfrase for the establishment of a > keyfile to a swap partition? Allways /dev/random, unless you have a low-entropy scenario, in which you may have to combine it with a stored and updated seed. > I am thinking about a potential crash and the consequences if the swap > partition has to be used for rebuild of something. Then a /dev/random or > if necessary /dev/urandom would not be so good. The swap partition is not used in reconstructing things under Linux. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans If it's in the news, don't worry about it. The very definition of "news" is "something that hardly ever happens." -- Bruce Schneier