Date: Mon, 21 Aug 2006 22:58:35 -0500 From: User1001 <supraexpress@globaleyes.net> To: freebsd-geom@freebsd.org Subject: Re: Verifying GELI disk encryption Message-ID: <44EA80EB.70809@globaleyes.net> In-Reply-To: <44DDF69F.7040104@globaleyes.net> References: <20060808195202.GA1564@garage.freebsd.pl> <f6791cc60608101418r52c42aa0mad896951db5b75a@mail.gmail.com> <f6791cc60608101554w2b10d8a5y9dc87f2198080281@mail.gmail.com> <20060810232255.GE1389@garage.freebsd.pl> <20060811143257.E2260@fledge.watson.org> <20060812100328.GB73241@garage.freebsd.pl> <44DDF69F.7040104@globaleyes.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Defining a small 2MB 'partition' and setting it up for GELI encryption made it easy to use DD to view the raw data (with ghex2) when the partition was detached from GELI. This way, I could be certain that ANY data written to the partition would be read, no matter WHERE it actually resided within the partition. When I first tried this on a new 70+GB DRIVE that had only one file, it was a wee bit difficult to ensure that DD "slice" actually contained the encrypted file that I was expecting. So one "simple way to verify (geli) encryption" is to use it on a small enough space that can be relatively easy to view as raw data. User1001 wrote: > What are some relatively simple ways to verify the encryption of/on a > GELI device?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44EA80EB.70809>