DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] linux luks automatic boot with keyfile (INSECURE)
@ 2012-05-25  2:29 Nuno Reis
  2012-05-25  6:20 ` David Christensen
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Nuno Reis @ 2012-05-25  2:29 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 939 bytes --]

Good morning.

I would like to ask you about the best choice to have one or two luks
encrypted partitions to boot automatically between reboots without me to
enter a pass-phrase.
I've made this already, but the way i'm doing it seems to be not very
secure since the keyfile is referenced in /etc/crypttab and the keyfile and
/etc/crypttab both reside on an unencrypted partition. If someone clones my
HDD and connect it to some other system will easily be able to mount the
unencrypted partitions and find the keyfile reference on /etc/crypttab to
get the keyfile and unencrypt the protected partitions right?
So basically my problem is that i want to sell a linux server with some
software i've developed to a datacenter (as an appliance), but i don't want
them to get to my software easily and i can't have a password prompt
between reboots also.
Can you point me out what you think would be the best solution for me?
Thanks.

BR,
Nuno.

[-- Attachment #2: Type: text/html, Size: 1457 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2012-05-25  9:45 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-05-25  2:29 [dm-crypt] linux luks automatic boot with keyfile (INSECURE) Nuno Reis
2012-05-25  6:20 ` David Christensen
2012-05-25  8:11 ` Arno Wagner
2012-05-25  9:37 ` Hp

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox