crypttab appears to use dm-setup and the various luks internals. Google
luks for more info. Personally I'd expect it to equal or be better than
trucrypt; it uses conventional code and is built-into the kernel (and
has been for some time). I use luks to store all my sensitive files,
using a loopback device and a local file (rather than a block device).
I haven't tested the performance of it, however, for a DBMS or other system.
If you install linux and encrypt the hard drive, it uses luks.
luks is specific to Linux, where truecrypt is not.
*Brandon Gillespie*
SaaS Operations Director, Kuali
[email protected]
801.682.3444
On 10/30/15 3:59 AM, Dan Egli wrote:
While reading about systemd, I saw notice that it has an option to read
information about encrypted devices from /etc/crypttab. That's a new one on
me. I've not heard of that file before. What programs/services use
crypttab, and where could I find more information about them? How do they
compare in security strength to something like trucrypt? Is there a way to
auto-mount a partition that way, since I don't see any way to auto-mount a
partition encrypted via trucrypt (yes, I know of keyfiles vs. passwords,
but from what I can tell you still need to manually run trucrypt to mount
the encrypted container/device. You just don't need to specify a password
to do so)?
Any information is appreciated!
--- Dan
/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/
/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/