Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Jul 2020 20:13:54 +0200 (CEST)
From:      Christian Kratzer <ck-lists@cksoft.de>
To:        Allan Jude <allanjude@freebsd.org>
Cc:        freebsd-fs@freebsd.org
Subject:   Re: gptzfsboot targeting wrong vdev
Message-ID:  <alpine.BSF.2.22.395.2007142010540.82939@nocfra1.cksoft.de>
In-Reply-To: <e6627d93-b61e-a1dd-1b94-9ea9bd9d3d73@freebsd.org>
References:  <alpine.BSF.2.22.395.2007061453250.82939@nocfra1.cksoft.de> <9400f5f0-e267-932c-b1ce-8436748cf2c0@FreeBSD.org> <78024f0d-4889-713e-15a5-56ec6d8d82b3@freebsd.org> <alpine.BSF.2.22.395.2007131155560.82939@nocfra1.cksoft.de> <d1b537da-8a94-4e12-4d45-b4318db2fbb8@freebsd.org> <alpine.BSF.2.22.395.2007131953300.82939@nocfra1.cksoft.de> <e6627d93-b61e-a1dd-1b94-9ea9bd9d3d73@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

Hi,

On Mon, 13 Jul 2020, Allan Jude wrote:
<snipp/>
> So are your SLOG devices not encrypted? That seems like an oversight,
> since any synchronous writes will be written to the SLOG first.

yes the slog devices are not encrypted.  And /boot/keys contains the keys.

All of the above are on the ada0, ada1 m2 ssd devices.

The main threat scenario I am protecting against is disposal of end of
live or broken disks in the main pool.

If I wanted to protect ada0/1 I would need to fall back to booting from
a separate external devices again that also includes the keys.

Greetings
Christian

-- 
Christian Kratzer                   CK Software GmbH
Email:   ck@cksoft.de               Wildberger Weg 24/2
Phone:   +49 7032 893 997 - 0       D-71126 Gaeufelden
Fax:     +49 7032 893 997 - 9       HRB 245288, Amtsgericht Stuttgart
Mobile:  +49 171 1947 843           Geschaeftsfuehrer: Christian Kratzer
Web:     http://www.cksoft.de/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.22.395.2007142010540.82939>