Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Jun 2012 15:39:01 +0200
From:      Aaron Zauner <azet@azet.org>
To:        freebsd-security@freebsd.org
Subject:   Re: Pre-boot authentication / geli-aware bootcode
Message-ID:  <CAN8NK9Entdnp=rmjZ%2BhG4L7A7UrJyqj%2BPM0_oMv4Pfw--53H%2BQ@mail.gmail.com>
In-Reply-To: <CA%2BQLa9Aec82k24YL46dU3zgbozTa8Qmis%2Bn14JpdZAemnaFZfw@mail.gmail.com>
References:  <CA%2BQLa9Aec82k24YL46dU3zgbozTa8Qmis%2Bn14JpdZAemnaFZfw@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
AFAIK you'd need something similary to initrd
(http://en.wikipedia.org/wiki/Initrd), which, to the best of my
knowledge, does not currently exist in freebsd.

so long,
azet

On Mon, Jun 11, 2012 at 2:21 AM, Robert Simmons <rsimmons0@gmail.com> wrote=
:
> Would it be possible to make FreeBSD's bootcode aware of geli encrypted v=
olumes?
>
> I would like to enter the password and begin decryption so that the
> kernel and /boot are inside the encrypted volume. =C2=A0Ideally the only
> unencrypted area of the disk would be the gpt protected mbr and the
> bootcode.
>
> I know that Truecrypt is able to do something like this with its
> truecrypt boot loader, is something like this possible with FreeBSD
> without using Truecrypt?
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.or=
g"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAN8NK9Entdnp=rmjZ%2BhG4L7A7UrJyqj%2BPM0_oMv4Pfw--53H%2BQ>