On May 25, 2017 6:06:45 PM GMT+02:00, Rich Freeman <ri...@gentoo.org> wrote:
>On Thu, May 25, 2017 at 10:16 AM, J. Roeleveld <jo...@antarean.org>
>wrote:
>> On May 25, 2017 1:04:07 PM GMT+02:00, Kai Krakow
><hurikha...@gmail.com> wrote:
>>>Am Thu, 25 May 2017 08:34:10 +0200
>>>schrieb "J. Roeleveld" <jo...@antarean.org>:
>>>
>>>> It is possible. I have it set up like that on my laptop.
>>>> Apart from a small /boot partition. The whole drive is encrypted.
>>>> Decryption keys are stored encrypted in the initramfs, which is
>>>> embedded in the kernel.
>>>
>>>And the kernel is on /boot which is unencrypted, so are your
>encryption
>>>keys. This is not much better, I guess...
>>
>> A file full of random characters is encrypted using GPG.
>> Unencrypted, this is passed to cryptsetup.
>>
>> The passphrase to decrypt the key needs to be entered upon boot.
>> How can this be improved?
>>
>
>The need to enter a passphrase was the missing bit here.  I thought
>you were literally just storing the key in the clear.
>
>As far as I can tell gpg symmetric encryption does salting and
>iterations by default, so you're probably fairly secure.  I'm not sure
>if the defaults were always set up this way - if you set up that file
>a long time ago you might just want to check that, unless your
>passphrase is really complex.

Not sure how long ago this was. I'm planning on redoing the whole laptop in the 
near future anyway.

If anyone knows of a better way (that works without TPM) I would like to hear 
about it.

--
Joost
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Reply via email to