Alle 13:53, domenica 31 luglio 2005, Alexander Skwar ha scritto: > > How? > > /bin/crypsetup < file-with-passphrase > > Where does the attacker see the passphrase? > > Oh. You took my example way too literally. *echo*ing the password > is an extremely bad idea. You're of course right. But in reality > I of course don't do that. Further, I said, that the password can > be piped to cryptsetup.
I did it: I wrote in /etc/con.d/local.start: echo ebegin "Loading Shared device" /root/cshared.sh eend $? "Failed to load Shared device" and the script cshared.sh is: #!/bin/bash /bin/cryptsetup -h ripemd160 -c aes create disc_hda /dev/hda3 /bin/mount /shared In the boot, the system stops at the local init service and wait your password, just press enter and the system continues to boot! Luigi -- Public key GPG(0x073A0960) on http://keyserver.linux.it/
pgpki3Rr1WXzV.pgp
Description: PGP signature