Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Tue, 29 May 2001 [EMAIL PROTECTED] wrote: I see it as more than this. I see it as ensuring that the data on the disk does not get accessed by anyone never intended to see it. (physically, of course). I guess this would mostly be cool for thwarting things like police raids, Although in

Re: root fs/crypted

2001-05-30 Thread Ethan Benson
On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: SAWFASP^* as laws around the globe are forged to weak personal privacy, police knocking on one's door, because of portscanning a previously hacked website, and - i don't have to tell those of you, which are reading slashdot - as

Re: root fs/crypted

2001-05-30 Thread paul
Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? Are there real truth serums? hehe, Paul Ethan Benson wrote: On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: SAWFASP^* as laws around the globe are forged to weak

Re: root fs/crypted

2001-05-30 Thread Jan Niehusmann
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The passphrase could be changed automatically on every system boot, and the new

Re: root fs/crypted

2001-05-30 Thread Jon Leonard
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Wed, 30 May 2001, Jon Leonard wrote: I'm not aware of any actual implementations, unfortunately. http://www.mcdonald.org.uk/StegFS/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: [cut] but that only works at startup. if the system is running, having the entire disk encrypted is no different than the fact it's all in hex already. an individual user based encryption means all you have to do is logout, not

Re: root fs/crypted

2001-05-30 Thread Jim Zajkowski
On Wed, May 30, 2001 at 02:30:48AM -0700, Jon Leonard wrote: I'm not aware of any actual implementations, unfortunately. Rubberhose, www.rubberhose.org, implements deniable crypto, exactly as you described. --Jim -- Jim Zajkowski System Administrator ITCS Contract Services -- To

Re: root fs/crypted

2001-05-30 Thread Jim Breton
On Tue, May 29, 2001 at 11:54:29PM -0800, Ethan Benson wrote: trouble is when your dealing with corrupt/fascist/evil government/regimes encryption isn't going to do you much good, either they will throw you in prison for refusing to disclose the decryption key or worse they will use methods

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Zak Kipling wrote: Although in some countries (eg Britain) you can be required by law to disclose the decryption keys, and imprisoned if you fail to do so. The only way around this is to use a steganographic approach where, in the absence of the passphrase for a given

Re: root fs/crypted

2001-05-30 Thread Aaron Dewell
Having a crypto install option (even if it's a little more complex to get) is still better than not having one. At this point, all one can do is encrypt a filesystem off of a non- encrypted root partition. Like removable media or something else that is mounted by hand. There are some

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Tue, 29 May 2001 [EMAIL PROTECTED] wrote: I see it as more than this. I see it as ensuring that the data on the disk does not get accessed by anyone never intended to see it. (physically, of course). I guess this would mostly be cool for thwarting things like police raids, Although in

Re: root fs/crypted

2001-05-30 Thread Ethan Benson
On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: SAWFASP^* as laws around the globe are forged to weak personal privacy, police knocking on one's door, because of portscanning a previously hacked website, and - i don't have to tell those of you, which are reading slashdot - as

Re: root fs/crypted

2001-05-30 Thread paul
Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? Are there real truth serums? hehe, Paul Ethan Benson wrote: On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: SAWFASP^* as laws around the globe are forged to weak

Re: root fs/crypted

2001-05-30 Thread Jan Niehusmann
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The passphrase could be changed automatically on every system boot, and the new

Re: root fs/crypted

2001-05-30 Thread Jon Leonard
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Wed, 30 May 2001, Jon Leonard wrote: I'm not aware of any actual implementations, unfortunately. http://www.mcdonald.org.uk/StegFS/

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread clemens
On Tue, May 29, 2001 at 08:02:50PM -0700, Paul Lowe wrote: I like this. Would it be difficult to modify Debian, so that upon install, it creates an encrypted root volume and starts things off the right way? 3 things are needed to that upon installation: - losetup -e your favourite chiper

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: [cut] but that only works at startup. if the system is running, having the entire disk encrypted is no different than the fact it's all in hex already. an individual user based encryption means all you have to do is logout, not

Re: root fs/crypted

2001-05-30 Thread clemens
it should also be possible to include basic network support into the initrd to enable 'entering' a password remote. we can't support all methods allowed by /etc/network/interfaces (ppp/wvdial should be omitted..) but static/dhcp/bootp are possible. there authorization process could beneath

Re: root fs/crypted

2001-05-30 Thread Jim Zajkowski
On Wed, May 30, 2001 at 02:30:48AM -0700, Jon Leonard wrote: I'm not aware of any actual implementations, unfortunately. Rubberhose, www.rubberhose.org, implements deniable crypto, exactly as you described. --Jim -- Jim Zajkowski System Administrator ITCS Contract Services

Re: root fs/crypted

2001-05-30 Thread Jim Breton
On Tue, May 29, 2001 at 11:54:29PM -0800, Ethan Benson wrote: trouble is when your dealing with corrupt/fascist/evil government/regimes encryption isn't going to do you much good, either they will throw you in prison for refusing to disclose the decryption key or worse they will use methods

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Zak Kipling wrote: Although in some countries (eg Britain) you can be required by law to disclose the decryption keys, and imprisoned if you fail to do so. The only way around this is to use a steganographic approach where, in the absence of the passphrase for a given set

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Aaron Dewell wrote: Having a crypto install option (even if it's a little more complex to get) is still better than not having one. I agree. I just wanted to remind people that we would need two sets of install disks if we were to bundle crypto into the installation

Re: root fs/crypted

2001-05-29 Thread Paul Lowe
I like this. Would it be difficult to modify Debian, so that upon install, it creates an encrypted root volume and starts things off the right way? -Original Message- From: clemens [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Date: Tuesday, May 29, 2001 6:04 PM Subject: root

RE: root fs/crypted

2001-05-29 Thread Curt Howland
ability to read everything hmmm. Curt- -Original Message- From: Paul Lowe [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 30, 2001 12:03 To: clemens; [EMAIL PROTECTED] Subject: Re: root fs/crypted I like this. Would it be difficult to modify Debian, so that upon install, it creates

Re: root fs/crypted

2001-05-29 Thread paul
: Wednesday, May 30, 2001 12:03 To: clemens; [EMAIL PROTECTED] Subject: Re: root fs/crypted I like this. Would it be difficult to modify Debian, so that upon install, it creates an encrypted root volume and starts things off the right way? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED

Re: root fs/crypted

2001-05-29 Thread Paul Lowe
I like this. Would it be difficult to modify Debian, so that upon install, it creates an encrypted root volume and starts things off the right way? -Original Message- From: clemens [EMAIL PROTECTED] To: debian-security@lists.debian.org debian-security@lists.debian.org Date: Tuesday, May

RE: root fs/crypted

2001-05-29 Thread Curt Howland
to read everything hmmm. Curt- -Original Message- From: Paul Lowe [mailto:[EMAIL PROTECTED] Sent: Wednesday, May 30, 2001 12:03 To: clemens; debian-security@lists.debian.org Subject: Re: root fs/crypted I like this. Would it be difficult to modify Debian, so that upon install