-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The Monday 2007-09-24 at 08:19 +0100, richard (MQ) wrote:

> Carlos E. R. wrote:
> 
> > Ah! Before I forget: I wrote to '/etc/sysconfig/kernel' this line:
> > 
> > MODULES_LOADED_ON_BOOT="cryptoloop twofish"
> > 
> > I think this should work to load those two modules instead of using 
> > boot.local
> 
> It will, but it will be over-written on upgrade. The point about
> /etc/boot.local is that it is (supposed to be!) protected when upgrading
> (and is also easy to backup / restore manually). Same applies to a
> number of other files with similar names (I think this is specific to
> OpenSuSE ?)

Mmmm...

If it is overwritten on upgrade, it is a bug and should be reported. Files 
in that directory are parsed. For instance, I ended with an almost broken 
/etc/sysconfig/SuSEfirewall2 after several cascaded upgrades; I had to 
locate the original file, copy it over, and add my changes with and 
editor. I still have to do the same for the cups config file, there have 
been chages which didn't apply.

Yes, there are a number of files in /etc/init.d that belong to the user 
and are not replaced. At most, they would be moved to file.rpmold or 
somthing like that.


  To keep slightly on topic for this list, I was scared/confused by the 
  comentary on encription changes appearing in the release notes of RC1.

  (The rest of this email is probably OT for this list)


> > My procedure is simpler. First I create an empty file:
> > 
> > nimrodel:~ # nice dd if=/dev/zero of=crypta_f_dvd \
> > bs=1MB count=4700
> ...
> 
> > I didn't think to randomize it, as I suppose the encryption thing will do 
> > its 
> > work. The file has the exact size of a DVD image. Then I encrypt it via 
> > loop:
> 
> As a general principle, you should use a fresh (different) random set
> for each such encrypted file / disc, so that an attacker has less to go
> on when trying to crack it (e.g. by comparing encrypted files & looking
> for correlations). The extra security is probably rather irrelevant here...

However, I suppose that when creating the filesystem on top, and after the 
encription, almost every original byte will be overwritten. Or that's what 
I thought, at least. Those that are untouched contains no data of the 
present backup and are irrelevant. Maybe in my case they contain data from 
the previous backup.


Well, to be really secure, you have to keep a very long key in another 
media, like a memory card. To get back the data, you need then the 
encrypted data, the usb key, and the password: they need to stole both and 
force the password out of you, which is quite difficult to happen for a 
normal thief. 

However, I'm unsure how to create those beasties. Documentation seems to 
be scarce and written for crackers.



> > And I create the XFS filesystem on the loop device:
> 
> Just out of interest - why XFS?

Heh! :-)

Good question.

Well, I choosed it because it has the lowest directory and fixed structure 
reserved ahead of time. Less reserved sectors, more space for your data. I 
think they are reserved and created as you write your files.

Reiserfs, for instance, is the worst in this respect: so much so that the 
utilities usually refuse to prepare a reiserfs smaller than 100 MB.

Ext2 is good, but ext3 has to keep a journal somewhere (xfs too, I think). 
Difficult to create a plain ext2 without journal by mistake: I tried.

I did some measurements storing some quite large files and it came out 
that xfs had the biggest free space left, so that I could store 12 of my 
data sets instead of 11, meaning less DVDs were needed.

The snag is that I can not mount simultaneously one of those DVDs and the 
backup image: it appears XFS has some kind of ID, and it refuses to mount 
because there is already one XFS filesystem with that ID mounted.

And I do not know what will happen the day I get a scratch on a DVD: will 
it be mountable? O repairable?


> > The problem nowdays is that DVDs are too small for making backups of a 300 
> > GiB 
> > HD :-(
> 
> Quite so. Even HD DVDs (when they finally become mainstream) are tiny in
> comparison.

Yes... my normal backups go to an usb HD enclosure now.

- -- 
Cheers,
       Carlos E. R.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQFG95DqtTMYHG2NR9URAiPWAJ4jwW6lOxsYjpG23XIkNkNV+EagHQCdEEUi
6Y0V3OFxQjEBKXGhDtd4Uo8=
=8RDr
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to