On Jun 2, 2014, at 17:52, "J. Roeleveld" <[email protected]> wrote:
> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote: >> On Jun 2, 2014, at 16:40, "J. Roeleveld" <[email protected]> wrote: >>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote: >>>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick <[email protected]> wrote: >>>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote: >>>>>> The second option does sound what I am looking for. Basically, if I >>>>>> log >>>>>> out but leave my computer on, leave home, some crook/NSA type breaks in >>>>>> and tries to access something or steals my whole puter, they would just >>>>>> get garbage for data. That seems to fit the second option best. >>>>> >>>>> If they steal your computer they will have to power it off, unless you >>>>> are kind enough to leave them a large enough UPS to steal along with it, >>>>> so any encryption will be equally effective. >>>> >>>> If you're worried about casual thieves then just about any kind of >>>> properly-implemented encryption will stop them. >>>> >>>> If you're worried about a government official specifically tasked with >>>> retrieving your computer, my understanding is that it is SOP these >>>> days to retrieve your computer without powering it off for just this >>>> reason. They won't use your UPS to do it. Typically they remove the >>>> plug just far enough to expose the prongs, slide in a connector that >>>> connects it to a UPS, and then they pull it out the rest of the way >>>> now powered by the UPS. >>>> >>>> See something like: >>>> http://www.cru-inc.com/products/wiebetech/hotplug_field_kit/ >>> >>> Hmm... Those are nice, but can be easily built yourself with an >>> off-the-shelf UPS. >>> >>>> Presumably somebody who is determined will also have the means to >>>> retrieve the contents of RAM once they seize your computer. Besides >>>> directlly accessing the memory bus I think most motherboards are not >>>> designed to be secure against attacks from PCI/firewire/etc. >>> >>> Hmm... add something to auto-shutdown the computer when a hotplug event >>> occurs on any of the internal ports and remove support for unused ports >>> from the kernel. >>> >>> I wonder how they'd keep a computer from initiating a shutdown procedure >>> or >>> causing a kernel panic when it looses (wireless) connection to another >>> device that is unlikely to be moved when powered up? >> >> Well i have a switch in the door of the server room. It opens when you open >> the door. That signals the kernel to wipe all the encryption keys from >> kernel memory. Without the keys there is no access to the disks. After that >> another kernel is executed which wipes the memory of the old kernel. If you >> just pull the plug memory will stay in its state for an unspecified time. > > You don't happen to have a howto on how to set that up? Well i have a deamon running and a self made logic device in COM-port. Very simple. It has a single serial-parallel converter to do simple IO. Currently it just controls one relay that powers the network-devices. >> Swap uses random keys. >> >> network switches and routers get power only after firewall-server is up and >> running. > > networked powersockets? A normal logic port and a transistor and then relay that controls power to the sockets of the network-devices :) >> There is no easy way to enter the room without wipeing the encryption keys. >> Booting up the server requires that a boot disk is brought to the computer >> to decrypt the boot drive. Grub2 can do this easily. This is to prevent >> some one to tamper eith a boot loader. >> >> System is not protected against hardware tamperment. The server room is an >> RF-cage. >> >> I consoder this setup quite secure. > > Makes me wonder what it is you are protecting your server from. :) Well just a hobby. I wanted to play with electronics. The server controls my heating, locks of the house, lights, airconditioning, fire-alarm and burglar-alarm. Gentoo-powered house... -- -Matti

