[Bug 399298] New: encrypt swap partions by default on every boot using a random key
https://bugzilla.novell.com/show_bug.cgi?id=399298 Summary: encrypt swap partions by default on every boot using a random key Product: openSUSE 11.1 Version: Alpha 0 Platform: All OS/Version: Other Status: NEW Severity: Enhancement Priority: P5 - None Component: Security AssignedTo: security-team@suse.de ReportedBy: funtasyspace@yahoo.com QAContact: qa@suse.de Found By: --- I think for security reasons, swap partitions should be encrypted by default in a way where a RANDOM encryption key is generated on EVERY boot, so users are not required to enter the key on every boot. As the swap partition is also used for hibernation/suspend-to-ram this would raise the problem of not being able to decrypt the hibernation data on the next boot. Therefore I would suggest to automatically create a dedicated, encrypted hibernation file before hibernating and writing the RAM content into this file instead of writing into the swap partition. The key for this encrypted hibernation file should be derived from a password the user is requested to enter immediately after initiating the hibernation process (or by using a fingerprint reader if available for more convenience, but less security). Though, an open question would be a solution for the case, when the user is not present to enter a password or swipe his finger because hibernation is done automatically (after an idle timeout or because of low battery). -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=399298 User pavel@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=399298#c1 Pavel Machek <pavel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |pavel@novell.com --- Comment #1 from Pavel Machek <pavel@novell.com> 2008-06-16 01:30:24 MDT --- (For hibernation, we can actually use RSA so that passphrase is only entered during resume. Stock s2disk should actually support that.) -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=399298 User funtasyspace@yahoo.com added comment https://bugzilla.novell.com/show_bug.cgi?id=399298#c2 --- Comment #2 from Jörg Hermsdorf <funtasyspace@yahoo.com> 2008-06-16 03:37:01 MDT --- Yes, I had this idea, too. We could use a hybrid encryption solution here. On hibernation, generate a random key and encrypt the hibernation file using a symmetrical cipher (e.g. twofish256) and encrypt that autogenerated symmetrical key using an asymmetric cipher (e.g. El-Gamal or RSA). This way, the user does not need to be present when the system hibernates. He only needs to enter the passphrase for his asymmetric private key to decrypt the autogenerated symmetric key which was used to encrypt the hibernation file. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=399298 User lnussel@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=399298#c3 Ludwig Nussel <lnussel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX --- Comment #3 from Ludwig Nussel <lnussel@novell.com> 2009-03-19 03:58:55 MST --- this is not going to happen by default. However the method described here: http://lizards.opensuse.org/2009/03/18/encrypted-root-file-system-on-lvm/ swamp is automatically encrypted also. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com