This might be a good time to try my giant softraid diff that makes
crypto useful.

On Sat, Jul 19, 2008 at 05:04:44PM +0100, Jonathan Thornburg wrote:
> My laptop (Thinkpad T41p) and I are going to be doing a lot of
> travelling in the next year, so I'm investigating how to
> (cryptographically) improve my security in case of loss/theft/seizure.
> Right now I use cfs (ports) for a few "sensitive" subdirectories, but
> 95+% of my /home is still cleartext to anyone with physical access to
> the laptop.  The same applies for my external backup disks.
> 
> I'm considering putting all of /home under svnd encryption
> (still keeping cfs on top for "sensitive" subdirectories), and I have
> some questions (see below).  I have RTFMs svnd(4), vnconfig(8), and
> mount_vnd(8), and googled my way to some useful web pages, notably
>   http://www.xs4all.nl/~hanb/documents/OpenBSDEncryptedFilesystemHOWTO.html
>   http://mareichelt.de/pub/notmine/linuxbsd-comparison.html
>   http://geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto
> (Some of these web pages seem to be a bit old, (eg) complaining about
> the now-fixed dictionary-attack vulnerability).
> 
> As I understand it, the basic procedure for using svnd is this (starting
> with a brand-new-from-the-computer-store disk sd0, and with steps numbered
> for later reference:
> [1] # fdisk sd0                       ... create single msdos-partition
> [2] # disklabel sd0           ... create single openbsd-partition "a"
> [3] # newfs /dev/sd0a
> [4] # mount -o softdep /dev/sd0a /mnt
> [5] # dd if=/dev/arandom bs=1m of=/mnt/imagefile count=...
> [6] # vnconfig -vck -K 100000 -S /var/saltfile svnd0 /mnt/imagefile
> [7] # disklabel svnd0         ... create encrypted openbsd-partition "a"
> [8] # newfs /dev/svnd0a
> [9] # mount -o rw,nodev,nosuid,softdep -t vnd /dev/svnd0a /home
> 
> Now my questions:
> 1. Are there other Fine Manuals (relevant to svnd) I should Read
>    besides the ones I listed above?
> 2. Where (besides the source code) can I find the svnd encryption
>    algorithm documented?  This would help me research the answer to
>    the next question...
> 3. What are the error propagation properties of the svnd encryption?
>    That is, for example, if a disk/USB/memory error corrupts a single
>    512-byte block in the middle of /dev/sd0a, will that show up as
>    512 bytes of corruption in /dev/svnd0c, or will the entire
>    /dev/svnd0c be corrupted from that point onwards?
> 4. Is there any upper size limit to the size of an encrypted image
>    apart from the kernel 8TB limit and fsck time and memory usage?
>    For example, is there any problem with using the above on (say) a
>    250GB disk?
> 5. Is there any problem with using softdep in steps [4] and [9]?
> 6. Are there any special newfs parameters needed for either the underlying
>    filesystem (step [3]) or the encrypted one (step [8])?  The underlying
>    filesystem will only hold a single huge 'imagefile', whose size won't
>    change after initial creation (step [5]), so I could imagine saving
>    a bit of disk space by configuring very few inodes.  What about the
>    FFS/FFS2 minimum free space threshold (newfs -m) -- with the imagefile
>    preallocated (step [5]), is there any benefit to a nonzero minimum
>    free space threshold?
> 7. How worried should I be about bug kernel/5709 "rapidly creating many
>    small files on crypted svnd locks box", which as of a few minutes
>    ago was/is shown as in state "open"?
> 
> ciao,
> 
> -- 
> -- "Jonathan Thornburg [remove -animal to reply]" <[EMAIL PROTECTED]>
>    t <= 31.Aug.2008: School of Mathematics, U of Southampton, England
>    t >   1.Sep.2008: Dept of Astronomy, Indiana University, Bloomington, USA
>    "Washing one's hands of the conflict between the powerful and the
>     powerless means to side with the powerful, not to be neutral."
>                                       -- quote by Freire / poster by Oxfam

Reply via email to