[Pkg-loop-aes-commits] r1346 - /branches/loop-aes-utils/initramfs-integration/debian/README

lmamane at users.alioth.debian.org lmamane at users.alioth.debian.org
Sat Dec 16 07:11:12 CET 2006


Author: lmamane
Date: Sat Dec 16 07:11:12 2006
New Revision: 1346

URL: http://svn.debian.org/wsvn/pkg-loop-aes/?sc=1&rev=1346
Log:
Recomment keeping keys out of encrypted partition

Modified:
    branches/loop-aes-utils/initramfs-integration/debian/README

Modified: branches/loop-aes-utils/initramfs-integration/debian/README
URL: http://svn.debian.org/wsvn/pkg-loop-aes/branches/loop-aes-utils/initramfs-integration/debian/README?rev=1346&op=diff
==============================================================================
--- branches/loop-aes-utils/initramfs-integration/debian/README (original)
+++ branches/loop-aes-utils/initramfs-integration/debian/README Sat Dec 16 07:11:12 2006
@@ -38,7 +38,11 @@
   mkinitramfs to "auto" or "yes". The recommended setting is "auto".
   It checks at initramfs creation time if your root device in
   /etc/fstab has a "loop=/dev/loopN" option. You can also forcibly
-  activate the support with "yes" or force it off with "no".
+  activate the support with "yes" or force it off with "no". An
+  example of a reason to force it off would be because you have custom
+  scripts to handle a specific situation in your initramfs
+  (e.g. reading the keys from a removable media, from the network,
+  ...).
 
   Wether you set INITRAMFS_LOOPAES in the shell before running
   mkinitramfs or in /etc/initramfs-tools/initramfs.conf, don't forget
@@ -69,4 +73,20 @@
   the initramfs, obviously. For example:
   "loopaesopts=loop=/dev/loop5,encryption=AES,gpgkey=/keys/rootkeyfile.gpg"
 
+  To minimise risks of losing access to your computer in case of
+  root-on-loopaes, it is recommended to keep your (password-protected)
+  keys to your root partition elsewhere than in the said partition. In
+  this manner, you can still access your partition even if the keys
+  don't get copied into the initramfs for a reason or another
+  (configuration error, bug in our code, ...). /boot/keys is a good
+  choice. It also doesn't reduce security as keys will be in the
+  initramfs in /boot during normal operations anyway. Combine this
+  with INITRAMFS_LOOPAES=yes to always have the necessary modules and
+  loop-aes utilities available in the initramfs shell and/or being
+  able to use the loopaesopts kernel command-line option.
+
+  When doing the boot manually from the initramfs shell, remember you
+  don't have the loop-aes-utils version of mount; you need to use
+  losetup and then "mount /dev/loopN /root".
+
  -- Max Vozeler <xam at debian.org> and Lionel Elie Mamane <lmamane at debian.org>




More information about the Pkg-loop-aes-commits mailing list