Re: encrypted swap

David Spreen (david@spreen.de)
Tue, 7 Aug 2001 18:21:04 +0200


On Tue, Aug 07, 2001 at 11:06:36AM -0400, David Maynor wrote:
> But is the 10% perf hit really gaining you anything, expect to quell your
> paranoia. What is next, an encrypted /proc so that possible attackers can't
> gain information about running processes?

This was not the point. I you don't care about your data on disks which
maybe stolen (for example in notebooks) this is okay for me.
My question was only if there's an existing implementation of this.
10 - 30% performance problems are quite acceptable for
good privacy aren't they?

So if I understood you guys correctly it would be possible by
getting random-data at boottime and use them to build a key
(for example with the algorythms from the kerneli patch), which
will be used to encrypt the swapped out data right?

Would be cool to hear from some others who are interested in
such an implementation of crypted swap, maybe we could start
something like that.

Btw. one of the BSDs uses encrypted swap too iirc, how did they
implement?

so long...

David

-- 
  __          _              | David "netzwurm" Spreen      Kiel, Germany
 / _|___  ___| |__  __ _ _ _ | http://www.netzwurm.cc/      david@spreen.de
|  _/ _ \/ _ \ '_ \/ _` | '_|| gnupg key (on keyservers):   C8B6823A
|_| \___/\___/_.__/\__,_|_|  | CellPhone:                   +49 173 3874061

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/