From owner-freebsd-questions@FreeBSD.ORG Wed Jul 30 00:36:48 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 49C1C106566C for ; Wed, 30 Jul 2008 00:36:48 +0000 (UTC) (envelope-from fbsd06+YK=aa2a7b04@mlists.homeunix.com) Received: from fallback-in1.mxes.net (fallback-out1.mxes.net [216.86.168.190]) by mx1.freebsd.org (Postfix) with ESMTP id 1A8678FC15 for ; Wed, 30 Jul 2008 00:36:47 +0000 (UTC) (envelope-from fbsd06+YK=aa2a7b04@mlists.homeunix.com) Received: from mxout-03.mxes.net (mxout-03.mxes.net [216.86.168.178]) by fallback-in1.mxes.net (Postfix) with ESMTP id E2A4D163F84 for ; Tue, 29 Jul 2008 20:20:49 -0400 (EDT) Received: from gumby.homeunix.com. (unknown [87.81.140.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTP id 1F00023E409 for ; Tue, 29 Jul 2008 20:20:44 -0400 (EDT) Date: Wed, 30 Jul 2008 01:20:35 +0100 From: RW To: freebsd-questions@freebsd.org Message-ID: <20080730012035.66564794@gumby.homeunix.com.> In-Reply-To: <20080727101216.GA42938@slackbox.xs4all.nl> References: <3267.84.18.27.248.1217152064.squirrel@mail.dsa.es> <20080727101216.GA42938@slackbox.xs4all.nl> X-Mailer: Claws Mail 3.5.0 (GTK+ 2.12.11; i386-portbld-freebsd7.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Re: Root boot/mount Password? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Jul 2008 00:36:48 -0000 On Sun, 27 Jul 2008 12:12:16 +0200 Roland Smith wrote: > Note that encrypting the partitions where the OS lives is not > particularly usefull; there is nothing secret there. On the contrary, > it would potentially make the encrypted partition vulnerable to a > known plaintext attack. The reason for doing it is to protect the OS from modification. For that to be effective the /boot really needs to be on removable media.