From: Martin Gregorie on
On Fri, 19 Dec 2008 23:54:17 +0000, Ian Rawlings wrote:

> That's down to what you have a pressing need for I suppose, either
> storing encrypted data in a database or running an encrypted filesytem!
>
After a quick scan of the LUKS website, it looks like the simplest
approach. I've been fairly careful to concentrate sensitive items in one
directory on my main server. Managing reference information on my LAN via
an internal website has really helped to make this approach simple, so in
fact my best move is simply to put that directory in a tiny encrypted
partition and then nuke free space on its current partition with one of
the free-space mungers.

I've bookmarked the LUKS site - thanks for the pointer.

> If you have a linux laptop then I'd be tempted to pursue LUKS first and
> move the laptop across to it (not hard to do) as the risk of losing the
> laptop or it getting stolen can be high and the consequences dire so
> that would be a useful driver for the pretty short learning curve
> involved.
>
I have one, but it almost never travels anywhere - its primarily used as
a quiet terminal for the server. It contains nothing vital that isn't
also replicated on the server. If I do go anywhere with it, it gets a
copy of the reference pages loaded on it, so it should be equally easy to
copy the sensitive stuff to an encrypted partition on it.


--
martin@ | Martin Gregorie
gregorie. | Essex, UK
org |
From: Gordon Henderson on
In article <slrngkno3b.jhj.news06(a)desktop.tarcus.org.uk>,
Ian Rawlings <news06(a)tarcus.org.uk> wrote:
>On 2008-12-19, Gordon Henderson <gordon+usenet(a)drogon.net> wrote:
>
>> I know what a hard link is and what it does, and the difference
>> between that an a symbolic link, and I've never said that backup up
>> to the same server is anything other than accidental deletion
>> prevention.
>
>Certainly, but there are people taking hints from this thread so best
>watch ourselves ;-)

Advice is worth what you pay for it :)

Gordon
From: Theo Markettos on
Martin Gregorie <martin(a)see.sig.for.address.invalid> wrote:
> After a quick scan of the LUKS website, it looks like the simplest
> approach. I've been fairly careful to concentrate sensitive items in one
> directory on my main server. Managing reference information on my LAN via
> an internal website has really helped to make this approach simple, so in
> fact my best move is simply to put that directory in a tiny encrypted
> partition and then nuke free space on its current partition with one of
> the free-space mungers.

Is LUKS the most widespread Linux disc encryption? There seem to be plenty
of old HOWTOs out there, but it's difficult to find out what's the
mainstream.

I must have a read about the crypto (key management etc) at some point. I
went to a talk by Poul Henning-Kemp who did FreeBSD's GBDE disc encryption
which sounds vaguely sane. But it's a pity that each platform has their own
approach.

Theo
From: Ian Rawlings on
On 2008-12-21, Theo Markettos <theom+news(a)chiark.greenend.org.uk> wrote:

> Is LUKS the most widespread Linux disc encryption? There seem to be plenty
> of old HOWTOs out there, but it's difficult to find out what's the
> mainstream.

It seems to be the most popular or most supported, it's part of
cryptsetup now, I think the main advantage of LUKS over other systems
is that it's largely plug and play to the extent that a LUKS partition
can be read by other linux boxes with mainly just the password being
the missing bit of information, all the details such as the encryption
type and key lengths etc are stored in the partition itself. Gentoo
linux even has LUKS as an option in its auto-generated initrd setup so
it's easy to make full disc encrypted systems.

--
Blast off and strike the evil Bydo empire!
http://youtube.com/user/tarcus69
http://www.flickr.com/photos/tarcus/sets/
From: Nix on
On 19 Dec 2008, Martin Gregorie told this:
> - I have a 120 GB 3.5" drive that lives on top of the PC and gets
> a daily .TGZ compressed backup of the whole system from a daily
> cron job. This takes 75 minutes and requires a fairly elaborate
> script that automatically deletes enough of the oldest backups to
> leave room for the next, does the backup and mails me a run report.
> These backups are there to provide protection against finger trouble
> or disk failure. If there's a fire or a major power spike these
> backups will be toast along with the PC.

I'd like to do something similar to this, only keeping it shut down
except when needed. I haven't paid any attention to hardware for nearly
a decade so I have no idea if this is possible, but is there a way to
automatically cut/restore power to something like this under software
control? (I know I could do it with a wall timer, but that can't be told
to turn *off* at the right time, so either it'll run for too long or
cut power in the middle of a backup!)
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9
Prev: Compaq NS5000...
Next: Backup to DVD