Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Hey there everybody. We have weekly backups which are hand delivered on DVD to a safe-deposit box. I'd like to start encrypting the data such that is protected on it's way to the box, as the DVD's contain some pretty sensitive information.
Anyway, it seems that dm-crypt and luks can make use of a password, a key file, or any combination. The keyfile is really just a glorified password. Take some bytes from dev random, store it in a file, and use it to encrypt and decrypt the device. It does not however seem like I can use public/private keypairs, such that the server thats actually encrypting the devices would only have the public key which would be useless in attempting to decrypt the file.
Does anybody know if I could accomplish this without too much trouble? Is there a reason why this hasn't been implemented directly into cryptsetup/LUKS yet?
Only reason that I'd prefer to do it this way as opposed to simply tar'ing my files and using gpg is that I like the idea of simply popping in the CD and having it prompt me for the password automatically like it does with my USB drive (except in this case it would be asking for the passphrase to the secret key). This way I don't have to go through showing all the people that might be involved how to decrypt and then untar..