Mailinglist Archive: opensuse-security (232 mails)

< Previous Next >
robustness of encrypted partitions
  • From: Malte Gell <malte.gell@xxxxxx>
  • Date: Thu, 6 Oct 2005 16:54:08 +0200
  • Message-id: <200510061654.08668.malte.gell@xxxxxx>
Hi there,

I guess encrypted partitions / files (mounted as encrypted virtual disk)
are vulnerable regarding unclean unmounts, so does using the "sync"
option add much more safety to encrypted partitions / files?

And if I use an encrypted file as a virtual disk via loop device, does
it make much sense to use e.g. e2fsck on such a file? If it doesn't, I
think it would be sensible to use "tune2fs -c 0 -i 0" to avoid any fs
checks?

Thanks
Malte

< Previous Next >
Follow Ups