public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH encrypted swsusp 0/3] encrypted swsusp image
@ 2005-04-10 23:19 Andreas Steinmetz
  2005-04-11  7:54 ` folkert
  0 siblings, 1 reply; 3+ messages in thread
From: Andreas Steinmetz @ 2005-04-10 23:19 UTC (permalink / raw)
  To: Pavel Machek; +Cc: Linux Kernel Mailinglist

The following patches allow for encryption of the on-disk swsusp image
to prevent data gathering of e.g. in-kernel keys or mlocked data after
resume.

For this purpose the aes cipher must be compiled into the kernel as
module load is not possible at resume time.

A random key is generated at suspend time, stored in the suspend header
on disk and deleted from the header at resume time. If you don't resume
a mkswap on the suspend partition will also delete the temporary key.

Only the data pages are encrypted as only these may contain sensitive data.

This works on my x86_64 laptop (64bit mode) and probably needs testing
on other platforms.
-- 
Andreas Steinmetz                       SPAMmers use robotrap@domdv.de



^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2005-04-11 10:13 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-04-10 23:19 [PATCH encrypted swsusp 0/3] encrypted swsusp image Andreas Steinmetz
2005-04-11  7:54 ` folkert
2005-04-11 10:13   ` Pavel Machek

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox