Alle 13:53, domenica 31 luglio 2005, Alexander Skwar ha scritto:
>
> How?
>
> /bin/crypsetup < file-with-passphrase
>
> Where does the attacker see the passphrase?
>
> Oh. You took my example way too literally. *echo*ing the password
> is an extremely bad idea. You're of course right. But in reality
> I of course don't do that. Further, I said, that the password can
> be piped to cryptsetup.

I did it: 
I wrote in /etc/con.d/local.start:
echo
ebegin "Loading Shared device"
/root/cshared.sh
eend $? "Failed to load Shared device"
and the script cshared.sh is:

#!/bin/bash
/bin/cryptsetup -h ripemd160 -c aes create disc_hda /dev/hda3
/bin/mount /shared

In the boot, the system stops at the local init service and wait your 
password, just press enter and the system continues to boot!
Luigi
-- 
Public key GPG(0x073A0960) on http://keyserver.linux.it/

Attachment: pgpki3Rr1WXzV.pgp
Description: PGP signature

Reply via email to