Date: Wed, 08 Apr 2009 18:27:33 +0100 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: new_guy <byte8bits@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: geli on exisitng laptop Message-ID: <49DCDE85.2070204@infracaninophile.co.uk> In-Reply-To: <22951183.post@talk.nabble.com> References: <22951183.post@talk.nabble.com>
next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig7FCE5CF9CFBFC5373B191427
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable
new_guy wrote:
> Hi guys,
>=20
> I'd like to use geli to whole disk encrypt a FreeBSD 7.1 laptop I alrea=
dy
> have setup. The laptop is up and working fine and I don't want to screw=
it
> up. It have the default partition layout. I've already used geli to enc=
rypt
> the swap partition.=20
>=20
> The default partitioning at install creates / /tmp /usr and /var. I tho=
ught
> I would start with /tmp as I should be able to fix that if I mess up.=20
>=20
> Some questions...
>=20
> 1. Will each partition have to be mounted with a password?
> 2. What's the most straight-forward way to go about this without screwi=
ng
> up?
>=20
> I already have the eli module loaded in the /boot/loader.conf so I won'=
t
> need to re-compile, etc.
>=20
To convert a partition to geli requires you to wipe out all the contents,=
scribble over the partition with random data to get rid of any remnants o=
f
the unencrypted content, set up the encryption keys and then rebuild the =
file
system and recover the data from backup.
Yes, you will need to supply some sort of secret value to retrieve the=20
encrypted disk contents. This is usually configured to mean typing in a
passphrase at the time the partition is mounted, although it is also poss=
ible
to store crypto keys on a removable medium such as USB key -- you don't =
necessarily have to use a pass phrase in that case, although it's a good =
idea
for the most effective security. Once the partition is mounted, you shou=
ld be
able to take the key out and put it in a safe place and still keep runnin=
g.
Depending on your requirements you can encrypt the whole drive -- which w=
hile
highly secure requires you to have crypto keys etc. on a removable medium=
and
is a little tricky to get working properly -- or you can create a small
unencrypted partition which should contain the kernel and necessary crypt=
o bits
(ie. the contents of /boot at a minimum) and then encrypt things partitio=
n by partition. You will have to type in a pass phrase to mount each dif=
ferent
encrypted partition -- to prevent this becoming too onerous, consider usi=
ng a
'one big partition' layout.
Also note that you should encrypt the swap partition, or someone coming i=
nto
possession of the laptop may be trivially able to recover secret data fro=
m it:
this is pretty automated and can be achieved by simply editing /etc/fstab=
to
change the mount device to eg. /dev/ad0s1b.eli and rebooting -- an epheme=
ral
key is used, so no typing passphrases is required in this instance. Sett=
ing up
a swap-backed tmpmfs will then then give you an encrypted /tmp too.
Cheers,
Matthew
--=20
Dr Matthew J Seaman MA, D.Phil. 7 Priory Courtyard
Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
Kent, CT11 9PW
--------------enig7FCE5CF9CFBFC5373B191427
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.11 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEAREIAAYFAknc3osACgkQ8Mjk52CukIxoZQCfUoCmpTG0xykjCr6ZUcPoPhds
piQAoJE9YPkoV8K2DI2lnFYN8XZzNEii
=88hg
-----END PGP SIGNATURE-----
--------------enig7FCE5CF9CFBFC5373B191427--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?49DCDE85.2070204>
