On Thu, Nov 6, 2008 at 10:27 AM, Xavier Nicollet <[EMAIL PROTECTED]> wrote:
> Le 06 novembre 2008 à 09:58, Gregory Maxwell a écrit:
>> The latter would need to be a probably need to be a secret-keyed HMAC
>> to prevent watermarking attacks and information leakage, [...]
>
> Dm-crypt on every disks seems a good alternative, doesn't it ?
> You would use dm-crypt for your swap anyway.
>
> Did I miss something ?

Dmcrypt is fine but a rather blunt tool: It's all or nothing, and only
a single key.  It also can not store a unique nonce per block update,
which may create some (theoretical) security weaknesses.  The whole
thing will need to be mounted with keys in memory even when you only
care about a few files. (so someone who gains access to the system
could access high security files even if the system was just being
used for web-browsing at the time)

With a more intelligent you could have per-subvolume keying, or even
better per-file allowing the encrypted filesystem to contain a mix of
files with differing security classes.

Take a look at http://ecryptfs.sourceforge.net/ for an example of a
more-sophisticated filesystem encryption feature set.

At the least I think it would be useful if btrfs provided dmcrypt
functionality per subvolume, though full ecryptfs level functionality
would be quite interesting.
N�����r��y����b�X��ǧv�^�)޺{.n�+����{�n�߲)����w*jg��������ݢj/���z�ޖ��2�ޙ����&�)ߡ�a�����G���h��j:+v���w��٥

Reply via email to