Bug#517471: ability to configure the random key encryption of tmp partitions during installaion

2009-03-13 Thread M. McGowan
Sorry, I sent this to the wrong address.

---

On 3/1/09, M. McGowan m.mcgowan...@googlemail.com wrote:
 On 2/28/09, Max Vozeler x...@debian.org wrote:
 reassign 517471 partman-crypto
 thanks

 On Fri, Feb 27, 2009 at 06:25:23PM -0500, M. McGowan wrote:
 It is possible to encrypt loop-aes and dm-crypt tmp (like /tmp or
 /var/tmp) partitions with a random key at boot time, but the Debian
 installer will not configure this. The installer will only configure
 swap partitions like that.

 Have you tried configuring the partition with a
 random key, and then setting Use as of the encrypted
 partition to e.g. ext2 ?

 The installer should take care of setting the fstab/
 crypttab flags as appropriate for tmp.

 If that doesn't work, it would indicate a bug we need
 to fix in partman-crypto. It is supposed to work for
 both loop-AES and dm-crypt.

  Max

 For dm-crypt, I get an error that says, You have chosen a random key
 type for SCSI2 (0,0,0), partition #6 (sdb) but requested the
 partitioner to create a file system on it.

 Using a random key type means that the partition data is going to be
 destroyed upon each reboot. This should only be used for swap
 partitions.

 Are you sure you want to use a random key?

 Loop-aes gives me the usual, The kernel was unable to re-read the
 partition table on /dev/loop0 (Invalid argument). This means Linux
 won't know anything about the modifications you made until you reboot.
 You should reboot your computer before doing anything with
 /dev/loop0.




-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#517471: ability to configure the random key encryption of tmp partitions during installaion

2009-02-28 Thread M. McGowan
  On 2/27/09, M. McGowan m.mcgowan...@googlemail.com wrote:
  package: debian-installer
  severity: wishlist
 version: 20090123

Sorry about the spelling error in the subject, installaion should be
installation.



-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#517471: ability to configure the random key encryption of tmp partitions during installaion

2009-02-28 Thread Max Vozeler
reassign 517471 partman-crypto
thanks

On Fri, Feb 27, 2009 at 06:25:23PM -0500, M. McGowan wrote:
 It is possible to encrypt loop-aes and dm-crypt tmp (like /tmp or
 /var/tmp) partitions with a random key at boot time, but the Debian
 installer will not configure this. The installer will only configure
 swap partitions like that.

Have you tried configuring the partition with a
random key, and then setting Use as of the encrypted 
partition to e.g. ext2 ?

The installer should take care of setting the fstab/
crypttab flags as appropriate for tmp.

If that doesn't work, it would indicate a bug we need 
to fix in partman-crypto. It is supposed to work for
both loop-AES and dm-crypt.

Max




-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Processed: Re: Bug#517471: ability to configure the random key encryption of tmp partitions during installaion

2009-02-28 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 517471 partman-crypto
Bug#517471: ability to configure the random key encryption of tmp partitions  
during installaion
Bug reassigned from package `debian-installer' to `partman-crypto'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#517471: ability to configure the random key encryption of tmp partitions during installaion

2009-02-27 Thread M. McGowan
package: debian-installer
severity: wishlist

It is possible to encrypt loop-aes and dm-crypt tmp (like /tmp or
/var/tmp) partitions with a random key at boot time, but the Debian
installer will not configure this. The installer will only configure
swap partitions like that.

Creating a random key at each boot is more secure than using the same
one, since then data will be securely deleted when the key is deleted,
which normally happens at shutdown. (For exceptions, read about cold
boot attacks.) Random keys also spare the user the trouble of having
to type a password at each boot and worrying about the security of the
key and the password.

A possible workaround is to configure the would-be tmp partitions as
swap partitions during the installation process, and manually
configure them to be tmp partitions after the first boot of the new
Debian system.


An fstab entry for a loop-aes encrypted swap partition, with a new
random key at each boot, looks like this.
/dev/sda6   noneswap
sw,loop=/dev/loop0,encryption=serpent256 0   0

An fstab entry for a loop-aes encrypted tmp partition, with a new
random key at each boot, looks like this.
/dev/sda7   /tmpext2
defaults,loop=/dev/loop1,encryption=serpent256,phash=random/1777 0
  0

More detailed documentation about loop-aes can be found in the losetup
manual page.


Similar functionality is available for dm-crypt.

A crypttab entry for a dm-crypt encrypted swap partition, with a new
random key at each boot, looks like this.
sda7_crypt /dev/sda6 /dev/random cipher=serpent-cbc-essiv:sha256,size=256,swap

Here is the fstab entry.
/dev/mapper/sda6_crypt none swapsw0   0

A crypttab entry for a dm-crypt encrypted tmp partition, with a new
random key at each boot, looks like this.
sda7_crypt /dev/sda7 /dev/random
cipher=serpent-cbc-essiv:sha256,size=256,tmp=ext2

Here is the fstab entry.
/dev/mapper/sda7_crypt /tmp ext2defaults0   0

More detailed information about dm-crypt can be found in the manual
pages cryptsetup and crypttab.


Personally, I prefer to use loop-aes for this application for the
following reasons:
* It has a multi-key mode in which it uses 64 keys plus an additional
65th key, which makes it more secure.
* It seems to be faster during boot time. Dm-crypt seems to take a
long time creating the ext2 partitions.
* dm-crypt might be more supported by Linux, but it is just a tmp
partition, so if a kernel upgrade breaks loop-aes, there will be no
data loss.



-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org