[ale] Filesystem encryption

Michael Trausch mike at trausch.us
Wed Oct 13 20:26:49 EDT 2010


If you are willing to trust such a thing. I would much rather control the
security parameters, and not use the easiest biometric to forge...

After all, it is too easy to lift and reuse someone's fingerprint. Just too
easy.

--
Sent from my G2.
On Oct 13, 2010 7:03 PM, "Greg Freemyer" <greg.freemyer at gmail.com> wrote:
> Does using an encrypting hard drive count?
>
> I'm not sure about servers, but lots of laptops now have harddrives
> with built in encryption engines.
>
> The bios on those laptops tend to ask the user for a password (or
> fingerprint) that is fed into the drive so it can be booted from.
>
> Here's the first one I found via google:
> http://www-307.ibm.com/pc/support/site.wss/MIGR-71843.html
>
> Greg
>
> On Wed, Oct 13, 2010 at 4:32 PM, Jim Butler
> <jimbutler1234567890 at gmail.com> wrote:
>>  Hi Linux People!
>> I have a question and am looking for some experienced suggestions.
>> I saw a server recently that had filesystem encryption applied to the
>> entire root filesystem volume.
>> Although I am not sure, I do believe that the encryption scheme probably
>> was not loopback (cryptoloop) because the server did not have a key
>> stored on an external device. My understanding of loopback encryption is
>> that the kernel and initrd have to be stored on at least some kind of
>> un-encrypted media in order to boot to at least a small level sufficient
>> to ask for the pass-key to decrypt/mount the filesystem.
>> If the encryption scheme wasn't loopback encryption, what could it have
>> been? What ways are popular right now for encrypting an entire root
>> filesystem without using a thumbdrive or other external storage??
>> If someone can help me identify what this was, maybe I can read up on it
>> and implement it on one of my own servers.
>>
>> Thanks in advance,
>> Jim Butler
>> Linux Network Administrator.
>>
>> _______________________________________________
>> Ale mailing list
>> Ale at ale.org
>> http://mail.ale.org/mailman/listinfo/ale
>> See JOBS, ANNOUNCE and SCHOOLS lists at
>> http://mail.ale.org/mailman/listinfo
>>
>
>
>
> --
> Greg Freemyer
> Head of EDD Tape Extraction and Processing team
> Litigation Triage Solutions Specialist
> http://www.linkedin.com/in/gregfreemyer
> CNN/TruTV Aired Forensic Imaging Demo -
>
http://insession.blogs.cnn.com/2010/03/23/how-computer-evidence-gets-retrieved/
>
> The Norcross Group
> The Intersection of Evidence & Technology
> http://www.norcrossgroup.com
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20101013/2ba2b022/attachment.html 


More information about the Ale mailing list