Mailinglist Archive: opensuse (2532 mails)

< Previous Next >
Re: [opensuse] decrypting LUKS partitions without passphrase
  • From: "John Andersen" <jsamyth@xxxxxxxxx>
  • Date: Sat, 3 May 2008 19:16:48 -0700
  • Message-id: <60fb01490805031916l6ff6fff4xff72d450380df154@xxxxxxxxxxxxxx>
On Sat, May 3, 2008 at 6:56 PM, Sam Clemens <clemens.sam1@xxxxxxxxx> wrote:
Carlos E. R. wrote:

Hash: SHA1

The Saturday 2008-05-03 at 18:08 -0400, Sam Clemens wrote:

Is there a specific reason you are encrypting swap?

It is standard procedure.

Think: your portable is hibernated and then stolen.


The password to mounted encrypted partition is in clear text in memory,
thus, in the swap. And any thing you may have opened.

Hint.. if you're portable is hibernated, then when the
thief restarts it, all of your partitions are already
mounted with good passwords, and can be perused by
merely doing

$ strings /dev/kmem | more
$ strings /dev/mem | more

Only if you are in a habit of hybernating your lap top while
running as root. Who does that anyway?

To unsubscribe, e-mail: opensuse+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse+help@xxxxxxxxxxxx

< Previous Next >
Follow Ups