Booting encrypted

Frank Knobbe frank at knobbe.us
Wed Sep 15 17:30:23 PDT 2004


On Tue, 2004-09-07 at 15:22, Steve Watt wrote:
> Having the password compiled in to something that's necessarily clear-text
> on the same media?

Sorry for being late... I'm still catching up on piles of email :)


Instead of having a plaintext password on the same media, how about a
mechanism that reads the CPU's serial number, or some other hardware
dependent number that can not be read by users on a system. If the drive
gets removed from the system, the attacker would have a challenge.

Of course you have to be careful before you replace failed hardware that
is used to derive the key :)  Don't replace the failed CPU before you
decrypted... no wait... uhm...   :)   Okay, how about an offline copy of
the number in case of hardware failure... :)

Seriously though, tying the boot process to a hardware dependent value
that is not accessible from within the booted system might be something
to consider. 

Any thoughts?

Regards,
Frank

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: This is a digitally signed message part
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20040915/1ca47522/attachment.bin


More information about the freebsd-hackers mailing list