Pupeno wrote:
I use the dm-crypt from the kernel....
I've read that it is unsecure and I also read that it is not yet vory well
suported.
Dm-crypt is fairly well supported, since it is in the kernel, but I find
it to be harder to setup and less 'flexible' than loop-AES (the changing
passphrase thing, for example).
It provides rougly the equivalent security as loop-AES in "single-key"
mode (where a single key is used to encrypt every block). loop-AES also
supports multi-key mode, where 64 different keys are used to encrypt the
blocks. Multi-key makes certain kinds of attacks (specifically,
watermark) more difficult, but is slower.
However, I seem to recall reading somewhere in the last couple of weeks
that dm-crypt was also getting multi-key support...maybe in the
mm-kernel, or for 2.6.13...
Now, I doubt that most people actually _need_ the extra security of
multi-key encryption. Personally I run loop-AES in single-key mode
because it is faster than multi-key. Plus someone willing to go through
the effort of cracking multi-key encryption would find it much easier to
simply make a credible physical threat, and I will happily give them my
password!! :-)
I know I don't need a key, but I do want a key (stored in a remobable modia)
encripted with a passphrase I will be able to change, or best, my wife can
have the key protected with a different passphrase than I do.
Beyond that, encripting with a key is much better than doing that with a
passphrase because the passphrase can be cracked (dictionary attack) while
the key-encripted that can't.
Well, technically, anything can be cracked given enough time and
computing power.
For using different passwords, this is possible. You would need to
encrypt the same key file with gpg to two different .gpg files....your
wife can use one, and you can use the other. If the key files are
stored on separate pieces of removable media, then you each have your
own "keys" to the system.
-Richard
--
[email protected] mailing list