From owner-freebsd-hackers@freebsd.org Tue Sep 8 17:42:46 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 78150A003F7 for ; Tue, 8 Sep 2015 17:42:46 +0000 (UTC) (envelope-from rwmaillists@googlemail.com) Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 26B481608 for ; Tue, 8 Sep 2015 17:42:46 +0000 (UTC) (envelope-from rwmaillists@googlemail.com) Received: by wicfx3 with SMTP id fx3so128970159wic.1 for ; Tue, 08 Sep 2015 10:42:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20120113; h=date:from:to:subject:message-id:in-reply-to:references:mime-version :content-type:content-transfer-encoding; bh=Y6FpjWLwQMyEjPzbRaaV91wjkQhyFwinKmEsYTEoTPo=; b=sgK5Bk0WgiRlZmBVGx5fYAg1oskUwn5R8mK8EerEYCYPcTvLwQcaL5k5noH77s/xLh VXAjCBb22oknVfnYDCVyc02/7J0XspCmoXC3CwLZD1yZJ97MgDRO1dFPSwRFcTU1Thxw fUZBK1JtOJJ7MlU4UhfbNqlt9RXtSTVT/xGxvL8vZP6CRn38A/gTQtuxPlTf15foQVS6 wIpkQzy6efy+ctQwC9AUtJm81Pq2cl2gAygQIjfVyMli/y1fIcWp6VgW6D7fH5fBBlH5 F8V6FFoMOpI9OGBVA2km3UXlYgAX/yZ1/p0GKkJbscZeddG/Z0/GHUwYOYtWegXtyiD6 Unwg== X-Received: by 10.194.7.197 with SMTP id l5mr52667273wja.153.1441734164484; Tue, 08 Sep 2015 10:42:44 -0700 (PDT) Received: from gumby.homeunix.com ([90.195.198.255]) by smtp.gmail.com with ESMTPSA id l9sm6915318wiy.10.2015.09.08.10.42.42 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 08 Sep 2015 10:42:43 -0700 (PDT) Date: Tue, 8 Sep 2015 18:42:40 +0100 From: RW To: freebsd-hackers@freebsd.org Subject: Re: Passphraseless Disk Encryption Options? Message-ID: <20150908184240.0c368300@gumby.homeunix.com> In-Reply-To: <8B7FEE2E-500E-49CF-AC5E-A2FA3054B152@gmail.com> References: <8B7FEE2E-500E-49CF-AC5E-A2FA3054B152@gmail.com> X-Mailer: Claws Mail 3.12.0 (GTK+ 2.24.28; amd64-portbld-freebsd10.0) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Sep 2015 17:42:46 -0000 On Tue, 8 Sep 2015 10:22:21 -0700 Analysiser wrote: > Hi, >=20 > I?m trying to perform a whole disk encryption for my boot drive to > protect its data at rest. However I would like to have a mac OS X-ish > full disk encryption that does not explicitly ask for a passphrase > and would boot as normal without manual input of passphrase. I tried > to do it with geli(8) but it seems there is no way I can avoid the > manual interaction. Really curious if there is a way to achieve it? What exactly do you want to do? Without some form of manual interaction disk encryption is pointless.