From owner-freebsd-hackers@FreeBSD.ORG Tue Sep 7 20:03:52 2004 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0375416A4CE for ; Tue, 7 Sep 2004 20:03:52 +0000 (GMT) Received: from ds.netgate.net (ds.netgate.net [205.214.170.232]) by mx1.FreeBSD.org (Postfix) with ESMTP id E843E43D5C for ; Tue, 7 Sep 2004 20:03:51 +0000 (GMT) (envelope-from ctodd@chrismiller.com) Received: (qmail 30594 invoked from network); 7 Sep 2004 20:03:51 -0000 Received: from vp4.netgate.net (ibrew@205.214.170.248) by ds.netgate.net with SMTP; 7 Sep 2004 20:03:51 -0000 Date: Tue, 7 Sep 2004 13:03:51 -0700 (PDT) From: ctodd@chrismiller.com X-X-Sender: ibrew@vp4.netgate.net To: freebsd-hackers@freebsd.org Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Subject: Booting encrypted X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Sep 2004 20:03:52 -0000 Has any work been done to boot from an encrypted filesystem, or otherwise modify the loader to support GBDE with a "compiled-in" passphrase? The purpose would be to prevent reverse engineering of an appliance based on FreeBSD. Thoughts, ideas? Thanks! Chris