From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from <gentoo-user+bounces-136247-garchives=archives.gentoo.org@lists.gentoo.org>) id 1S7V1c-0005q8-A1 for garchives@archives.gentoo.org; Tue, 13 Mar 2012 16:56:41 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id ECCA7E0C00; Tue, 13 Mar 2012 16:56:26 +0000 (UTC) Received: from mail-bk0-f53.google.com (mail-bk0-f53.google.com [209.85.214.53]) by pigeon.gentoo.org (Postfix) with ESMTP id 80BE3E0923 for <gentoo-user@lists.gentoo.org>; Tue, 13 Mar 2012 16:54:43 +0000 (UTC) Received: by bkwj4 with SMTP id j4so715861bkw.40 for <gentoo-user@lists.gentoo.org>; Tue, 13 Mar 2012 09:54:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=NWN8xbtSjljOtCEl124+R0HnmAI/TrH/YcM6oJGJbKk=; b=vJoSe92exDG2eRY7VRoen5Tv4DkMukPdWQRWqhvsnX3gLmL52ujATilUHdP0kwspDR JnQ5UtZxkEcNBlF5E9INa1KM9oRmGE4B9eRrBOFYJoGOrah4UDyeBQ5OfmX1G60lJhV+ 6OpXl0tKkGmj4O4aSuUizDz6vRr1ZPUPa2eMI3ILZeDT1OZQX8rg5ItPlE6T4Y+R2wJI aQxsSzsOMdb2CV2fjgaS+XaLr/HNJDi/W1ausvSfAp+s84p8JbT6oWWqv7ki3Y4eYGzU HhP4sqpELnhiAFLE/hyWCggFCt/qks56xeslGBb9EJ6cq3zewoZMHWef9MSwtPt55jRp y4mA== Precedence: bulk List-Post: <mailto:gentoo-user@lists.gentoo.org> List-Help: <mailto:gentoo-user+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-user+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-user+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-user.gentoo.org> X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Received: by 10.204.149.198 with SMTP id u6mr6713651bkv.138.1331657682596; Tue, 13 Mar 2012 09:54:42 -0700 (PDT) Received: by 10.204.168.17 with HTTP; Tue, 13 Mar 2012 09:54:42 -0700 (PDT) In-Reply-To: <4F5F7AA4.7030501@binarywings.net> References: <4F5CC6F5.6020303@gmail.com> <4F5CEF0D.5050801@binarywings.net> <4F5F35C1.8070301@gmail.com> <4F5F71C3.6070206@binarywings.net> <CA+czFiBRUP2Er3+oVHFYPrMBEwDT7mv6H=ur1NE15AcY46BUpA@mail.gmail.com> <4F5F7AA4.7030501@binarywings.net> Date: Tue, 13 Mar 2012 12:54:42 -0400 Message-ID: <CA+czFiCftdEiYMp-qaHCbEc9cD1zoJ__d_qKW8M5EiNdOo4bsw@mail.gmail.com> Subject: Re: [gentoo-user] hard drive encryption From: Michael Mol <mikemol@gmail.com> To: gentoo-user@lists.gentoo.org Content-Type: text/plain; charset=UTF-8 X-Archives-Salt: 8dce7e38-ea5a-4d33-88f2-9b67171944b3 X-Archives-Hash: 4eb28d15b72d34521727f043400e0289 On Tue, Mar 13, 2012 at 12:49 PM, Florian Philipp <lists@binarywings.net> wrote: > Am 13.03.2012 17:26, schrieb Michael Mol: >> On Tue, Mar 13, 2012 at 12:11 PM, Florian Philipp <lists@binarywings.net> wrote: >>> Am 13.03.2012 12:55, schrieb Valmor de Almeida: >>>> On 03/11/2012 02:29 PM, Florian Philipp wrote: >>>>> Am 11.03.2012 16:38, schrieb Valmor de Almeida: >>>>>> >>>>>> Hello, >>>>>> >>>>>> I have not looked at encryption before and find myself in a situation >>>>>> that I have to encrypt my hard drive. I keep /, /boot, and swap outside >>>>>> LVM, everything else is under LVM. I think all I need to do is to >>>>>> encrypt /home which is under LVM. I use reiserfs. >>>>>> >>>>>> I would appreciate suggestion and pointers on what it is practical and >>>>>> simple in order to accomplish this task with a minimum of downtime. >>>>>> >>>>>> Thanks, >>>>>> >>>>>> -- >>>>>> Valmor >>>>>> >>>>> >>>>> >>>>> Is it acceptable for you to have a commandline prompt for the password >>>>> when booting? In that case you can use LUKS with the /etc/init.d/dmcrypt >>>> >>>> I think so. >>>> >>>>> init script. /etc/conf.d/dmcrypt should contain some examples. As you >>>>> want to encrypt an LVM volume, the lvm init script needs to be started >>>>> before this. As I see it, there is no strict dependency between those >>>>> two scripts. You can add this by adding this line to /etc/rc.conf: >>>>> rc_dmcrypt_after="lvm" >>>>> >>>>> For creating a LUKS-encrypted volume, look at >>>>> http://en.gentoo-wiki.com/wiki/DM-Crypt >>>> >>>> Currently looking at this. >>>> >>>>> >>>>> You won't need most of what is written there; just section 9, >>>>> "Administering LUKS" and the kernel config in section 2, "Assumptions". >>>>> >>>>> Concerning downtime, I'm not aware of any solution that avoids copying >>>>> the data over to the new volume. If downtime is absolutely critical, ask >>>>> and we can work something out that minimizes the time. >>>>> >>>>> Regards, >>>>> Florian Philipp >>>>> >>>> >>>> Since I am planning to encrypt only home/ under LVM control, what kind >>>> of overhead should I expect? >>>> >>>> Thanks, >>>> >>> >>> What do you mean with overhead? CPU utilization? In that case the >>> overhead is minimal, especially when you run a 64-bit kernel with the >>> optimized AES kernel module. >> >> Rough guess: Latency. With encryption, you can't DMA disk data >> directly into a process's address space, because you need the decrypt >> hop. >> > > Good call. Wouldn't have thought of that. > >> Try running bonnie++ on encrypted vs non-encrypted volumes. (Or not; I >> doubt you have the time and materials to do a good, meaningful set of >> time trials) >> > > Yeah, that sounds like something for which you need a very dull winter > day. Besides, I've already lost a poorly cooled HDD on a benchmark. Sounds like something we can do at my LUG at one of our weekly socials. The part I don't know is how to set this kind of thing up and how to tune it; I don't want it to be like Microsoft's comparison of SQL Server against MySQL from a decade or so ago, where they didn't tune MySQL for their bench workload. -- :wq