Displaying 8 results from an estimated 8 matches for "passphar".
Did you mean:
passphare
2020 Feb 24
4
Encrypted container on CentOS VPS
...'root' will have access to that data while mounted,
>>> obviously!
>>
>> More than that: the root user will be able to access data
>> in the future too, since it can steal the key
>> while the data is mounted.
>>
>> Regards.
>>
> With a passphare only?
Attackers don't need the passphrase, they can use the
real key used for encryption (dmsetup table).
Regards.
--
Roberto Ragusa mail at robertoragusa.it
2020 Feb 24
2
Encrypted container on CentOS VPS
...;>> obviously!
>>>>
>>>> More than that: the root user will be able to access data
>>>> in the future too, since it can steal the key
>>>> while the data is mounted.
>>>>
>>>> Regards.
>>>>
>>> With a passphare only?
>>
>> Attackers don't need the passphrase, they can use the
>> real key used for encryption (dmsetup table).
>>
>> Regards.
>>
> So the final word seems to be that even if I create this LUKS-encrypted loop-back file and only mount it when needed, im...
2020 Feb 24
2
Encrypted container on CentOS VPS
On 2020-02-24 10:51, lejeczek via CentOS wrote:
> g) remember!! still at least (depending how you mount it)
> the 'root' will have access to that data while mounted,
> obviously!
More than that: the root user will be able to access data
in the future too, since it can steal the key
while the data is mounted.
Regards.
--
Roberto Ragusa mail at robertoragusa.it
2020 Feb 29
1
Encrypted container on CentOS VPS
...t;> More than that: the root user will be able to access data
>>>>>> in the future too, since it can steal the key
>>>>>> while the data is mounted.
>>>>>>
>>>>>> Regards.
>>>>>>
>>>>> With a passphare only?
>>>> Attackers don't need the passphrase, they can use the
>>>> real key used for encryption (dmsetup table).
>>>>
>>>> Regards.
>>>>
>>> So the final word seems to be that even if I create this LUKS-encrypted loop-back...
2020 Feb 24
0
Encrypted container on CentOS VPS
...ending how you mount it)
>> the 'root' will have access to that data while mounted,
>> obviously!
>
> More than that: the root user will be able to access data
> in the future too, since it can steal the key
> while the data is mounted.
>
> Regards.
>
With a passphare only?
2020 Feb 24
0
Encrypted container on CentOS VPS
...that data while mounted,
>>>> obviously!
>>>
>>> More than that: the root user will be able to access data
>>> in the future too, since it can steal the key
>>> while the data is mounted.
>>>
>>> Regards.
>>>
>> With a passphare only?
>
> Attackers don't need the passphrase, they can use the
> real key used for encryption (dmsetup table).
>
> Regards.
>
So the final word seems to be that even if I create this LUKS-encrypted loop-back file and only mount it when needed, immediately un-mount when no lo...
2020 Feb 24
0
Encrypted container on CentOS VPS
...;>>
>>>>> More than that: the root user will be able to access data
>>>>> in the future too, since it can steal the key
>>>>> while the data is mounted.
>>>>>
>>>>> Regards.
>>>>>
>>>> With a passphare only?
>>>
>>> Attackers don't need the passphrase, they can use the
>>> real key used for encryption (dmsetup table).
>>>
>>> Regards.
>>>
>> So the final word seems to be that even if I create this LUKS-encrypted loop-back file and o...
2002 Feb 06
1
rsync usage... and I did RTFM
Hey folks,
I've been through the rsync documentation, and to the best of my ability,
I dont see how to do exactly what I wish to do. I'd go through the mailing
list archives, but there doesnt seem to be a search function.
Essentially, I need to rsync securely between some sites, but I want logs
written. The problem is, it appears that using rsyncd is the only way to
get logs, but if