Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Feb 2013 09:47:36 +0100
From:      Damien Fleuriot <ml@my.gd>
To:        Paul Schenkeveld <freebsd@psconsult.nl>
Cc:        "hackers@freebsd.org" <hackers@freebsd.org>
Subject:   Re: Chicken and egg, encrypted root FS on remote server
Message-ID:  <BB9AA8EB-442E-4041-9CF2-92B16B8C9D2D@my.gd>
In-Reply-To: <20130220074655.GA59952@psconsult.nl>
References:  <20130220065810.GA25027@psconsult.nl> <C69A03DB-D861-4400-96B4-2DF5925CB4FC@DataIX.net> <20130220074655.GA59952@psconsult.nl>

index | next in thread | previous in thread | raw e-mail


On 20 Feb 2013, at 08:46, Paul Schenkeveld <freebsd@psconsult.nl> wrote:

> On Wed, Feb 20, 2013 at 02:42:57AM -0500, Jason Hellenthal wrote:
>> Just a thought with no working example but…
>> 
>> bootp / tftp - from a remote secured management frame to TX a key filesytem to unlock your rootfs.
>> 
>> Could be something as simple as a remote wireless adhoc server with a 64GB thumbdrive to hold your data or just enough to tell the system where to get it.
>> 
>> Considering a key can be any length string of a sort just to say but... Serve the rootfs key directly from a TXT out of a secured DNS zone only visible to so said machines.
> 
> Thank you but manual entry of the passprase is a prerequisite here so
> serving the key automatically is not an option.
> 
> With kind regards,
> 
> Paul Schenkeveld
> 

What about getting a remote console like HP's ILO or Dell's DRAC ?

You get to login remotely, you can use some degree of access control... you can even remote boot.

help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?BB9AA8EB-442E-4041-9CF2-92B16B8C9D2D>