From owner-freebsd-security@FreeBSD.ORG Tue Feb 21 01:08:15 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 85FB116A420 for ; Tue, 21 Feb 2006 01:08:15 +0000 (GMT) (envelope-from artifact.one@googlemail.com) Received: from xproxy.gmail.com (xproxy.gmail.com [66.249.82.199]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2279D43D4C for ; Tue, 21 Feb 2006 01:08:15 +0000 (GMT) (envelope-from artifact.one@googlemail.com) Received: by xproxy.gmail.com with SMTP id s16so786867wxc for ; Mon, 20 Feb 2006 17:08:14 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=googlemail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=GCOCK5+SsfdpOuRgc3TOMdAcOQnLQ8lZ9sRE5PD443rpBaXzTLPq4OhXm2AqVh9waxCPZgQka3gGzSHudlXrIh6ZhdrgTnd0GcPMCoGwzdKSoOvg+p4u83QQEpUaG1V9z/LEzT57RKg/T5+Tkmn6XBh7lTYj2swc5Y1xQkTjJc4= Received: by 10.70.21.19 with SMTP id 19mr4178253wxu; Mon, 20 Feb 2006 17:08:14 -0800 (PST) Received: by 10.70.24.9 with HTTP; Mon, 20 Feb 2006 17:08:14 -0800 (PST) Message-ID: <8e96a0b90602201708o17e9f206gaffc410f66b53b5c@mail.gmail.com> Date: Tue, 21 Feb 2006 01:08:14 +0000 From: "mal content" To: freebsd-security@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline X-Mailman-Approved-At: Tue, 21 Feb 2006 01:28:11 +0000 Subject: GELI slice encryption X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Feb 2006 01:08:15 -0000 Hello. I have been investigating a 'secure' Firefox solution. The cache, history and other files are kept on an encrypted slice and swap is encrypted also. The problem I am having is that I know the shell commands required to unmount /tmp, create providers with GELI with one-time keys, remount /tmp, activate swap etc. but I don't know the correct way to get this done automatically on boot. (I'd also like to submit a patch to the manual page to show how to create an encrypted /tmp partition, but that comes later!). thanks, a1