I think the point you are missing is that encrypted swap only needs to be
accessible for one power cycle. Thus the computer can generate a key at
swapon using a cryptographically strong random number source. The key is
kept in RAM. When the computer powercycles again, the old key is lost
from RAM, and a new key is generated. The old key, and thus the old
encrypted contents of swap, are permenently lost.
-Ryan
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/