|
Bugzilla – Full Text Bug Listing |
| Summary: | encrypt swap partions by default on every boot using a random key | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.1 | Reporter: | Jörg Hermsdorf <funtasyspace> |
| Component: | Security | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Enhancement | ||
| Priority: | P5 - None | ||
| Version: | Alpha 0 | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Jörg Hermsdorf
2008-06-11 14:42:54 UTC
(For hibernation, we can actually use RSA so that passphrase is only entered during resume. Stock s2disk should actually support that.) Yes, I had this idea, too. We could use a hybrid encryption solution here. On hibernation, generate a random key and encrypt the hibernation file using a symmetrical cipher (e.g. twofish256) and encrypt that autogenerated symmetrical key using an asymmetric cipher (e.g. El-Gamal or RSA). This way, the user does not need to be present when the system hibernates. He only needs to enter the passphrase for his asymmetric private key to decrypt the autogenerated symmetric key which was used to encrypt the hibernation file. this is not going to happen by default. However the method described here: http://lizards.opensuse.org/2009/03/18/encrypted-root-file-system-on-lvm/ swamp is automatically encrypted also. |