Gentlepeople,

After playing with it on a secondary machine, I'm looking to transition
from my Arch-setup to Qubes.

I am traditionally choosing to encrypt my file systems using serpent
(considered the strongest entry into the AES competition with slightly
worse speed than the finally choosen Rijndael algorithm) and the
following partitioning:
- UEFI-required EFI System Partition, 512MB, EFI System
- /boot partition (to be encrypted), 512MB, Linux filesystem
- SWAP partition (to be encrypted using a random key), size of RAM
(`free -m`) + 1 MiB, Linux filesystem
- tmp partition (to be encrypted using a random key), 2GB, Linux
filesystem

All but the UEFI partition are being encrypted. '/boot' uses a keyfile
resident in '/' (appropriate grub configuration) and thus PW-protectded 
through the encryption of '/'.

Questions:
1) Does that make sense (for Qubes)?
2) Am I missing something necessary?
3) Is there documentation on custom disk encryption and if no: where in
the installation process would I break out (how) to the CLI to get it
done?

Thanks for any hints.

Sincerely, Joh


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/038dcac4b42e2852a4d3d7a0644fc8251ea1dc4c.camel%40graumannschaft.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to